Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp5955269rwr; Tue, 9 May 2023 08:21:16 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4sIx0+FDI+Pz4FIto+ZySJzW1JRQVv4VJK1RnPv7/lt4/3LlP4FzIeNA32Q1bOZzFChvmT X-Received: by 2002:a05:6a20:8e14:b0:101:3c60:6794 with SMTP id y20-20020a056a208e1400b001013c606794mr3204054pzj.2.1683645675679; Tue, 09 May 2023 08:21:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683645675; cv=none; d=google.com; s=arc-20160816; b=SHs7NoH1dsaTSqwB1wAGZdehuAztmIlYB2I/hDu8Dy8o/UZDyyS1JAhfbfj2t5dBHI NdEePkbjbqGB0nH3vn26jDLOcIFG8XxUA0w9Dz1260JEWAfDH2QTPQJcWhkJwBStKovi bW3NcjJlxukxgsFO+D61m2kkSebdVfVOg/rx+zwfQmt30GuYYuJbPdtAZYEgeJrS1A50 X8/CXp66+wY6iKUV35iorAOQ5Ah+5Vrl/2f1kTl8PbRkGovLCY4Z+MPr5IiZBxtOFglC mgWTRDqeK0ZCA6fhA5hKunKgLhT48xf4oOoSf4TMtdUpqVTtbfS2NxUROtE+USjDD74a wj5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=8klV+VoLJ4dc0O7j09QhyzJh+di0r0mWgf9gTQhFltQ=; b=gYr3Oskrf/bOOJjBQy0WqnDOVwNdRXgzTsCnH1rSvmGWXwSMnlGj/mYaGFlfF0yAx4 8enh6Kru79fOxRHZtqw1GWW7DgPYkv0S6pkCoFklN/I7I38BY7MoVQCI4WBlBiyXBBDk sepjpMG8BaG9d8SiSPD3440GRiI7vl3AbWxL8TnSJ7FZuHVpCt9n4RSQo5AECa5ODwjx iMzGZQ9iJGKJYCtDWrYcLCd3s7Jicz5C7LWtLE8QknX/POW/5GgkE401mPnzQK/vDXki 1iocJynJJRoIykExEmQcMm8RuAGs/qFGebzIVXYZKyt+BHt/I4SBuNxIjNIuX79oQyAR pzYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=D17WbPDl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a28-20020a637f1c000000b0052502825c67si1789549pgd.387.2023.05.09.08.21.00; Tue, 09 May 2023 08:21:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=D17WbPDl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236012AbjEIPNs (ORCPT + 99 others); Tue, 9 May 2023 11:13:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39178 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235664AbjEIPNr (ORCPT ); Tue, 9 May 2023 11:13:47 -0400 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A7FED44AC; Tue, 9 May 2023 08:13:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1683645224; x=1715181224; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=sDIaRhN9LwUxhy8X7r7FslkiOl4KGP7DqZP3VkptV7U=; b=D17WbPDl5viGwTJ0ndZm1m8n/00/GDY/YOaf9cP0tHtlDqiDT8tOIUvN QnCmvn4cnh7n6uSlNV0hM+9/n5Df8DOBewYMBwykoC0KtWb9xplLVbi13 s9N3dMp3mTDFvMKnajyOZYQ0j7kCYvOTj5xWqtf5uxCJGGCgxC0mbuoeQ vJ/3Dl8LSTxtpskHlPzVgElXYpdPCszrcvT49E/gQt0k7tDMaU4sZVX5Q 22zwuo7WEYOPOIT31llPlde9g4lV7ypwpiG9pz4wqG4/llXlu9+hlYHWx gVMESM1AdHb+Ct7ADkHfL2lwYl0QYAX9vOHGHCmdl4jdZh23/zNNrLgz/ w==; X-IronPort-AV: E=McAfee;i="6600,9927,10705"; a="329580623" X-IronPort-AV: E=Sophos;i="5.99,262,1677571200"; d="scan'208";a="329580623" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 May 2023 08:13:44 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10705"; a="873220589" X-IronPort-AV: E=Sophos;i="5.99,262,1677571200"; d="scan'208";a="873220589" Received: from dcovax-mobl.amr.corp.intel.com (HELO [10.212.97.226]) ([10.212.97.226]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 May 2023 08:13:43 -0700 Message-ID: Date: Tue, 9 May 2023 08:13:42 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0 Thunderbird/102.10.0 Subject: Re: [PATCH] dmaengine: idxd: Fix passing freed memory in idxd_cdev_open() Content-Language: en-US To: Harshit Mogalapalli Cc: error27@gmail.com, kernel-janitors@vger.kernel.org, dan.carpenter@linaro.org, Fenghua Yu , Vinod Koul , dmaengine@vger.kernel.org, linux-kernel@vger.kernel.org References: <20230509060716.2830630-1-harshit.m.mogalapalli@oracle.com> From: Dave Jiang In-Reply-To: <20230509060716.2830630-1-harshit.m.mogalapalli@oracle.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/8/23 11:07 PM, Harshit Mogalapalli wrote: > Smatch warns: > drivers/dma/idxd/cdev.c:327: > idxd_cdev_open() warn: 'sva' was already freed. > > When idxd_wq_set_pasid() fails, the current code unbinds sva and then > goes to 'failed_set_pasid' where iommu_sva_unbind_device is called > again causing the above warning. > [ device_user_pasid_enabled(idxd) is still true when calling > failed_set_pasid ] > > Fix this by removing additional unbind when idxd_wq_set_pasid() fails > > Fixes: b022f59725f0 ("dmaengine: idxd: add idxd_copy_cr() to copy user completion record during page fault handling") > Signed-off-by: Harshit Mogalapalli Acked-by: Dave Jiang Thank you! > --- > This is purely based on static analysis. Only compile tested. > --- > drivers/dma/idxd/cdev.c | 1 - > 1 file changed, 1 deletion(-) > > diff --git a/drivers/dma/idxd/cdev.c b/drivers/dma/idxd/cdev.c > index ecbf67c2ad2b..d32deb9b4e3d 100644 > --- a/drivers/dma/idxd/cdev.c > +++ b/drivers/dma/idxd/cdev.c > @@ -277,7 +277,6 @@ static int idxd_cdev_open(struct inode *inode, struct file *filp) > if (wq_dedicated(wq)) { > rc = idxd_wq_set_pasid(wq, pasid); > if (rc < 0) { > - iommu_sva_unbind_device(sva); > dev_err(dev, "wq set pasid failed: %d\n", rc); > goto failed_set_pasid; > }