Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp3059181pxb; Tue, 12 Jan 2021 05:28:56 -0800 (PST) X-Google-Smtp-Source: ABdhPJx5pie5U4JuIWp5ajEENnTAALLndBPpT+IDI2eRplbTRUVf6SFp3NVLME7+2qYlg06U2X2j X-Received: by 2002:a50:d5c1:: with SMTP id g1mr3562005edj.299.1610458135809; Tue, 12 Jan 2021 05:28:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610458135; cv=none; d=google.com; s=arc-20160816; b=hkN6MSW20ZzsKxWaxQ4iSm+OpuQDTwkTj4QAdOlzsba/Tnbo7i/fNCzhYNtMfPGaOL xkIzAz/HByOsoCDV5F2KJOihEVBvjMKJ/ooCHl2Fl9yimsfoYNZdX1QbAIpvXHgiRWe0 3OU43hObCa2yA4+u7+25X7sypJXQJBgw2t6qi8mOxt5lvg/BWAobbfcAqit23dR+ss5j C1dIWQOYMA9/rlric/qsMh3y6bMtoJb7bUhkfTGWd/XiNeN+ohvxNA134U2M19hjoI13 rJoYX2OaL4tP7irD3L50+qShdwrseoB0lsfgaRFsDT/wQFK1MOqfYEEyvrEhoJEqh0/z l14w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=Kh5LyW8yLqXU4xYG8C2ZYVAuEFzZuyR2H9md0auF1c4=; b=tRUdx8bOSqS5sbYC7XtJwVvd3ggsmGag2AVqlfRU0UWPHMK9tW+b7yR2k7NDPyO9vo MRCik1ZoQw4y0rhvv9OwbsxxXBOFap3EZlfIxoBZfqVyE/n0P8x/qqmNefrBxgT4hynu bqO8Z6hg5v0qBuctJp6TKBOPj/SdoUCx0uj19ZaGyAHMP2OMkKaQBHcxhRd3mnCaOGJi UPd75I8RehTykvu/9ltuudpcfweDO9fk5h2F0Bv1yZ6B33fLz15Mw+BKdc7PTNX0Z5/n c5FiPc3yOx5uLI7Kf6orOZCcOPW/OuBV43I0CdF0+KYPlNTMhNTuYx2nb0BFjcSYgble V4Qw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y13si1102802ejw.564.2021.01.12.05.28.31; Tue, 12 Jan 2021 05:28:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730865AbhALNZi (ORCPT + 99 others); Tue, 12 Jan 2021 08:25:38 -0500 Received: from mx2.suse.de ([195.135.220.15]:55848 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726774AbhALNZh (ORCPT ); Tue, 12 Jan 2021 08:25:37 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id EC221ACAC; Tue, 12 Jan 2021 13:24:55 +0000 (UTC) From: Takashi Iwai To: linux-wireless@vger.kernel.org Cc: netdev@vger.kernel.org, Luca Coelho , Kalle Valo Subject: [PATCH 1/2] iwlwifi: dbg: Don't touch the tlv data Date: Tue, 12 Jan 2021 14:24:48 +0100 Message-Id: <20210112132449.22243-2-tiwai@suse.de> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20210112132449.22243-1-tiwai@suse.de> References: <20210112132449.22243-1-tiwai@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org The commit ba8f6f4ae254 ("iwlwifi: dbg: add dumping special device memory") added a termination of name string just to be sure, and this seems causing a regression, a GPF triggered at firmware loading. Basically we shouldn't modify the firmware data that may be provided as read-only. This patch drops the code that caused the regression and keep the tlv data as is. Fixes: ba8f6f4ae254 ("iwlwifi: dbg: add dumping special device memory") BugLink: https://bugzilla.suse.com/show_bug.cgi?id=1180344 BugLink: https://bugzilla.kernel.org/show_bug.cgi?id=210733 Signed-off-by: Takashi Iwai --- As an alternative fix, the debug print could be with the printf length specifier to limit the size to IWL_FW_INIT_MAX_NAME, as found in the bugzilla entries above, too. I chose a simpler (partial) revert here instead. drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c | 7 ------- 1 file changed, 7 deletions(-) diff --git a/drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c b/drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c index a654147d3cd6..a80a35a7740f 100644 --- a/drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c +++ b/drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c @@ -180,13 +180,6 @@ static int iwl_dbg_tlv_alloc_region(struct iwl_trans *trans, if (le32_to_cpu(tlv->length) < sizeof(*reg)) return -EINVAL; - /* For safe using a string from FW make sure we have a - * null terminator - */ - reg->name[IWL_FW_INI_MAX_NAME - 1] = 0; - - IWL_DEBUG_FW(trans, "WRT: parsing region: %s\n", reg->name); - if (id >= IWL_FW_INI_MAX_REGION_ID) { IWL_ERR(trans, "WRT: Invalid region id %u\n", id); return -EINVAL; -- 2.26.2