Received: by 2002:a05:7412:9c07:b0:fa:6e18:a558 with SMTP id lr7csp775405rdb; Sun, 28 Jan 2024 08:23:00 -0800 (PST) X-Google-Smtp-Source: AGHT+IHYczGUrKGZ7De9o2JKbUazyTs3BR1LKWJoU/MlnSkASt99l8677DycHKwhbMDJF7YjkWxJ X-Received: by 2002:a05:620a:5593:b0:783:bd38:aca6 with SMTP id vq19-20020a05620a559300b00783bd38aca6mr4124572qkn.82.1706458980279; Sun, 28 Jan 2024 08:23:00 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706458980; cv=pass; d=google.com; s=arc-20160816; b=hhGfR/gvyE3N22cBZXSwiTYljbjXObz4YZs/1GTI/p+OAha69Xh46APZG7tkQg7hZ1 pP3D3zZ1dxm7mBaYiOd02vahYf2wtSfRH2mxIVzOHQo0W/wwhJ1RIwDZQdUi7peAyJzr dp99GPliYq/OzABIOlv2rODGNABmH3NwgnM8S2vhIlByga3qcegGgHnoj74q5FBsk0N4 /U5eqJBxNoWddFTAZsUZ0nCX9Zv9+H5CXPn6cGTLl5S9vt/cU/WlvnwZeMKMiU++n7m0 CGvgxGWY/nDZkTgieNoNVDmkvkOwu4h68t4ysbRNk+LH9Dy0xzdGYngU4+kzDme23tfq M0mg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=5gELpJSJF8I/cj+Mv2wi9Fh/zoGnBj9cdildJZ0yhS8=; fh=iZfm/gcGJV1cfyJeb+RF2OgycA734Dur8ArdvVtZqtM=; b=b0Tp/3tjx7/wJd/qArfO2hgRDrwOnnYbMu6Gs6cM7gtlHd862Jks/9wJmsVSCSkBND a/PIpdLpQNk4nr6Tb+uTh/1WvZt7M2oGRaBTrexr/kEXg1z+QTWeOuoZGWfAPWsaOmvH +bMFM7bjN5DAQKs6JGPCT0YW1mTLmORDCSkOv8S6kLGjmfaJDKpIhEqzRQwdpoGf8Hxk n5iiykCcwtjq5QY4iBrA2EKrt3YhjP1xqjFftG23krxQJ6ze65GyZH7/tw4RDEoXI6Jn 1TSsIdFfcUb3ZqUOt0d4X+nsDNySX806+Q++rGsjVL3ruqn+Z3GPHa2tckg++cRwpa4g N+gQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=uHYsHaPx; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-41723-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-41723-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id pa15-20020a05620a830f00b0078393cb6533si5604419qkn.243.2024.01.28.08.23.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 28 Jan 2024 08:23:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-41723-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=uHYsHaPx; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-41723-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-41723-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 0E4611C21BF4 for ; Sun, 28 Jan 2024 16:23:00 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 270C45A7B3; Sun, 28 Jan 2024 16:13:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="uHYsHaPx" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2E70C3C689; Sun, 28 Jan 2024 16:13:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706458399; cv=none; b=prrKRmFHUS99u9mAnxPnGlC5s5u6YiHg1qlKg+OjDjsgKPeDQxhFs9dtHpkdz+ITES+BkVgcDDDTGEvY2oTrnmPhOp2jdqdgZ/ngECUYxCm/IkCkCEUdD9ItXp4hD3q1kJS5jE3/YB5DZKb1X9bP4u0t8kYdO/l4ED24sblpfTQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706458399; c=relaxed/simple; bh=U807NorrK8y1/+2cpw7jGe33DmiraCPD82GRDLlcu2w=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=tsdelF3SsBX/dSoVCASe4biQEpzERjU9EXZ+zOuxeOS/F570oRIGy5xo6FWacXws41cMqGPIL57p1RRJ6X3JoVqzugeiP21KvAMnc1prFq/6U60d0iQq8nl/DxWl6nUhbTaMjNoV1E4jbcnUGYrQQu500SPN5qSLzJJz/Rjp7x8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=uHYsHaPx; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0BE2AC43390; Sun, 28 Jan 2024 16:13:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706458399; bh=U807NorrK8y1/+2cpw7jGe33DmiraCPD82GRDLlcu2w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uHYsHaPxbAaP2B07g65eTEJQ47DBBnMO5MlVM5FItKAYB0ggK1Tn3LRn/WFR9huAF 8rMouHkeG2Vv8uiQv8qBIJpCe6yrFf3mitirNBfhe+hPw2gnh0L+ab9PQnFnW516le TNP0ZBe/aP5Z7ijkP9CeiYrmZMIO8WN3En+XQkRj/g3VTNLBnoTLBbWdSJcGRitT1Z gg6KG4hnrma0ceyP3heP9WjqltmiEvOuEm/bFW95Jx6+h3MaIIyb0W3Ju5N7+I01eB gxvQ2os3QY6zeoWIxNrYCUtqxuJjAZHYYv/zRJ5yFjrynFsBxd61TxsnntVmG6NvO6 yC1uR/P2ReXUQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Daniel Stodden , Bjorn Helgaas , Logan Gunthorpe , Dmitry Safonov , Sasha Levin , kurt.schwemmer@microsemi.com, linux-pci@vger.kernel.org Subject: [PATCH AUTOSEL 6.6 02/31] PCI: switchtec: Fix stdev_release() crash after surprise hot remove Date: Sun, 28 Jan 2024 11:12:32 -0500 Message-ID: <20240128161315.201999-2-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240128161315.201999-1-sashal@kernel.org> References: <20240128161315.201999-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.6.14 Content-Transfer-Encoding: 8bit From: Daniel Stodden [ Upstream commit df25461119d987b8c81d232cfe4411e91dcabe66 ] A PCI device hot removal may occur while stdev->cdev is held open. The call to stdev_release() then happens during close or exit, at a point way past switchtec_pci_remove(). Otherwise the last ref would vanish with the trailing put_device(), just before return. At that later point in time, the devm cleanup has already removed the stdev->mmio_mrpc mapping. Also, the stdev->pdev reference was not a counted one. Therefore, in DMA mode, the iowrite32() in stdev_release() will cause a fatal page fault, and the subsequent dma_free_coherent(), if reached, would pass a stale &stdev->pdev->dev pointer. Fix by moving MRPC DMA shutdown into switchtec_pci_remove(), after stdev_kill(). Counting the stdev->pdev ref is now optional, but may prevent future accidents. Reproducible via the script at https://lore.kernel.org/r/20231113212150.96410-1-dns@arista.com Link: https://lore.kernel.org/r/20231122042316.91208-2-dns@arista.com Signed-off-by: Daniel Stodden Signed-off-by: Bjorn Helgaas Reviewed-by: Logan Gunthorpe Reviewed-by: Dmitry Safonov Signed-off-by: Sasha Levin --- drivers/pci/switch/switchtec.c | 25 +++++++++++++++++-------- 1 file changed, 17 insertions(+), 8 deletions(-) diff --git a/drivers/pci/switch/switchtec.c b/drivers/pci/switch/switchtec.c index 5b921387eca6..1804794d0e68 100644 --- a/drivers/pci/switch/switchtec.c +++ b/drivers/pci/switch/switchtec.c @@ -1308,13 +1308,6 @@ static void stdev_release(struct device *dev) { struct switchtec_dev *stdev = to_stdev(dev); - if (stdev->dma_mrpc) { - iowrite32(0, &stdev->mmio_mrpc->dma_en); - flush_wc_buf(stdev); - writeq(0, &stdev->mmio_mrpc->dma_addr); - dma_free_coherent(&stdev->pdev->dev, sizeof(*stdev->dma_mrpc), - stdev->dma_mrpc, stdev->dma_mrpc_dma_addr); - } kfree(stdev); } @@ -1358,7 +1351,7 @@ static struct switchtec_dev *stdev_create(struct pci_dev *pdev) return ERR_PTR(-ENOMEM); stdev->alive = true; - stdev->pdev = pdev; + stdev->pdev = pci_dev_get(pdev); INIT_LIST_HEAD(&stdev->mrpc_queue); mutex_init(&stdev->mrpc_mutex); stdev->mrpc_busy = 0; @@ -1391,6 +1384,7 @@ static struct switchtec_dev *stdev_create(struct pci_dev *pdev) return stdev; err_put: + pci_dev_put(stdev->pdev); put_device(&stdev->dev); return ERR_PTR(rc); } @@ -1644,6 +1638,18 @@ static int switchtec_init_pci(struct switchtec_dev *stdev, return 0; } +static void switchtec_exit_pci(struct switchtec_dev *stdev) +{ + if (stdev->dma_mrpc) { + iowrite32(0, &stdev->mmio_mrpc->dma_en); + flush_wc_buf(stdev); + writeq(0, &stdev->mmio_mrpc->dma_addr); + dma_free_coherent(&stdev->pdev->dev, sizeof(*stdev->dma_mrpc), + stdev->dma_mrpc, stdev->dma_mrpc_dma_addr); + stdev->dma_mrpc = NULL; + } +} + static int switchtec_pci_probe(struct pci_dev *pdev, const struct pci_device_id *id) { @@ -1703,6 +1709,9 @@ static void switchtec_pci_remove(struct pci_dev *pdev) ida_free(&switchtec_minor_ida, MINOR(stdev->dev.devt)); dev_info(&stdev->dev, "unregistered.\n"); stdev_kill(stdev); + switchtec_exit_pci(stdev); + pci_dev_put(stdev->pdev); + stdev->pdev = NULL; put_device(&stdev->dev); } -- 2.43.0