Message ID | 20231016-wilc1000_tx_oops-v2-1-8d1982a29ef1@bootlin.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:612c:2908:b0:403:3b70:6f57 with SMTP id ib8csp3314533vqb; Mon, 16 Oct 2023 01:29:04 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGxZYxL6e9OizbphdFlATlIainoQlSmPQPCmTjyHdc4jI/IiQLtXvJiyvySBMNeSbrcvWUx X-Received: by 2002:a05:6a21:a587:b0:163:c167:964a with SMTP id gd7-20020a056a21a58700b00163c167964amr41592674pzc.1.1697444943939; Mon, 16 Oct 2023 01:29:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697444943; cv=none; d=google.com; s=arc-20160816; b=OxtX2qGoQbPQ9uf62pZQbhsBG1d81HlxsFNIKZ1lUUdaUBdplUAm0hjyQdjI4Rpy91 kDVEiK1NqQWaLob8yJPaRqeCz8JMaKY2Bv679cBuwn9xhFR5mHlM33GZdK3XmiDSSAx2 jhG2lWAzzWL9/pXMwOmfrUDnH+0KMlKQV5CRCf1SUkXwZKS9yB/YdKuwI66qxrderBnT Va/cb2lW+JinJ/AhKqaDjDUCvtMr01PK+jrnxmAN24n4YXlxQsE3y5aOOlrNvTLhqpVH 3b9KuhpqQyDk4PH72F9Es47URu7XmYPsy11mrWQ1VhkDP50X7z9bWAVUFHyGJycLttXf lN4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:message-id:content-transfer-encoding :mime-version:subject:date:from:dkim-signature; bh=SVxISp8EXisyvjENbAcGjSMMTvh4tZlsbQG1yYDAdZ0=; fh=FifMxdmAabxddcTJcu/IJ831cQ+An41Q2z4v9nUh6AY=; b=dccKnNw3bGIx0PredTP6/HC9SRsM9ycLUAyJTtFBWebJIOHce2ifq7MGVT/Ev0u21M xQUcTHWaQTW79RPG/DcqJTD9r8uGMhX7t/s9+IvTXdkK1lD+gOpxRUE/WjNgw33W2lgS xTMHCNU1Kbs4dFO1FNCbtN5tqWKN5ekT04RC6TAXqVVwsyizLOFEjC+9u4EIiIUyEKdH PZ5yfAFyFedyHctee+dz6+TdZeOrZy2pNe4dfOl1YjhmGOXPRb5lSTmu4n+lhZuCSPx9 1je0n9A/kbM28TftoIMFB6Nl7jrBJSPzaCW+3zPUQ3OFHAXv8C8OrwE9RyXXBe7aUlSR I8zA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=BSPXJVwX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id x8-20020a170902ec8800b001c74ae78c7bsi7881169plg.377.2023.10.16.01.29.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Oct 2023 01:29:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=BSPXJVwX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id C42BF80D07C8; Mon, 16 Oct 2023 01:29:01 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230112AbjJPI2u (ORCPT <rfc822;hjfbswb@gmail.com> + 18 others); Mon, 16 Oct 2023 04:28:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52734 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229574AbjJPI2s (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Mon, 16 Oct 2023 04:28:48 -0400 Received: from relay2-d.mail.gandi.net (relay2-d.mail.gandi.net [IPv6:2001:4b98:dc4:8::222]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D8372A1; Mon, 16 Oct 2023 01:28:45 -0700 (PDT) Received: by mail.gandi.net (Postfix) with ESMTPSA id 0DF594000E; Mon, 16 Oct 2023 08:28:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bootlin.com; s=gm1; t=1697444924; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=SVxISp8EXisyvjENbAcGjSMMTvh4tZlsbQG1yYDAdZ0=; b=BSPXJVwX5YVN5V39vWwzgM8VgRieb1KreLtKFZHvCcHcZQAX74m393ugWyZWSJhPA4z6Ii mjJVi5I2z11VmdhhwjZX/8tUhrYM02lbDkemLGRWm0yk8SiL/4HlYqc++Ec80X6FWL3FS1 HK1VEilQaX0k3PciT650WUqBW5lR6fs/i0HFFx28Gg82QIdA/QRjVHj52ZinkFMgc9O+bk xlV4wcIDQJXISdC9WaVc2JV+9hlRv9kQoI0HK6Jx8nvpv5M8LEmG2+LAumIO2I0R0DFufM i57mWA/9dtul5a9Z2wuFzK2tqLcg2a2HGg/CAXxZdWmtPpzh+R6Y3FBpugxHnA== From: =?utf-8?q?Alexis_Lothor=C3=A9?= <alexis.lothore@bootlin.com> Date: Mon, 16 Oct 2023 10:29:52 +0200 Subject: [PATCH v2] wifi: wilc1000: use vmm_table as array in wilc struct MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Message-Id: <20231016-wilc1000_tx_oops-v2-1-8d1982a29ef1@bootlin.com> X-B4-Tracking: v=1; b=H4sIAH/0LGUC/2WNQQ6CMBBFr0JmbU2nFRVW3sMQImWUSbBDWoIYw t2tJK5cvpf89xeIFJgilNkCgSaOLD6B2WXgupt/kOI2MRhtLGo06sW9Q611Pc61yBBVfnZUIJG lwkKaDYHuPG/Ja5W44zhKeG8PE37tL2b/YxMqVPZ0xIaaIjeH9tKIjD37vZMnVOu6fgBHdRWEs gAAAA== To: Claudiu Beznea <claudiu.beznea@tuxon.dev>, Kalle Valo <kvalo@kernel.org>, Michael Walle <mwalle@kernel.org> Cc: linux-wireless@vger.kernel.org, linux-kernel@vger.kernel.org, Thomas Petazzoni <thomas.petazzoni@bootlin.com>, Ajay Singh <ajay.kathat@microchip.com>, stable@vger.kernel.org, =?utf-8?q?A?= =?utf-8?q?lexis_Lothor=C3=A9?= <alexis.lothore@bootlin.com> X-Mailer: b4 0.12.3 X-GND-Sasl: alexis.lothore@bootlin.com X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Mon, 16 Oct 2023 01:29:01 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1779628129299737083 X-GMAIL-MSGID: 1779900029973069346 |
Series |
[v2] wifi: wilc1000: use vmm_table as array in wilc struct
|
|
Commit Message
Alexis Lothoré
Oct. 16, 2023, 8:29 a.m. UTC
From: Ajay Singh <ajay.kathat@microchip.com> Enabling KASAN and running some iperf tests raises some memory issues with vmm_table: BUG: KASAN: slab-out-of-bounds in wilc_wlan_handle_txq+0x6ac/0xdb4 Write of size 4 at addr c3a61540 by task wlan0-tx/95 KASAN detects that we are writing data beyond range allocated to vmm_table. There is indeed a mismatch between the size passed to allocator in wilc_wlan_init, and the range of possible indexes used later: allocation size is missing a multiplication by sizeof(u32) Fixes: 40b717bfcefa ("wifi: wilc1000: fix DMA on stack objects") Cc: stable@vger.kernel.org Signed-off-by: Ajay Singh <ajay.kathat@microchip.com> Signed-off-by: Alexis Lothoré <alexis.lothore@bootlin.com> --- Changes in v2: - keep dedicated dynamic allocation for vmm_table - Link to v1: https://lore.kernel.org/r/20231013-wilc1000_tx_oops-v1-1-3761beb9524d@bootlin.com --- drivers/net/wireless/microchip/wilc1000/wlan.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- base-commit: ea12d85cbfd6b08fff40a4fefccc011b6cfadf8e change-id: 20231012-wilc1000_tx_oops-58ce91ee3e93 Best regards,
Comments
Am 2023-10-16 10:29, schrieb Alexis Lothoré: > From: Ajay Singh <ajay.kathat@microchip.com> > > Enabling KASAN and running some iperf tests raises some memory issues > with > vmm_table: > > BUG: KASAN: slab-out-of-bounds in wilc_wlan_handle_txq+0x6ac/0xdb4 > Write of size 4 at addr c3a61540 by task wlan0-tx/95 > > KASAN detects that we are writing data beyond range allocated to > vmm_table. > There is indeed a mismatch between the size passed to allocator in > wilc_wlan_init, and the range of possible indexes used later: > allocation > size is missing a multiplication by sizeof(u32) > > Fixes: 40b717bfcefa ("wifi: wilc1000: fix DMA on stack objects") > Cc: stable@vger.kernel.org > Signed-off-by: Ajay Singh <ajay.kathat@microchip.com> > Signed-off-by: Alexis Lothoré <alexis.lothore@bootlin.com> Reviewed-by: Michael Walle <mwalle@kernel.org> -michael
On 10/16/2023 1:29 AM, Alexis Lothoré wrote: > From: Ajay Singh <ajay.kathat@microchip.com> > > Enabling KASAN and running some iperf tests raises some memory issues with > vmm_table: > > BUG: KASAN: slab-out-of-bounds in wilc_wlan_handle_txq+0x6ac/0xdb4 > Write of size 4 at addr c3a61540 by task wlan0-tx/95 > > KASAN detects that we are writing data beyond range allocated to vmm_table. > There is indeed a mismatch between the size passed to allocator in > wilc_wlan_init, and the range of possible indexes used later: allocation > size is missing a multiplication by sizeof(u32) > > Fixes: 40b717bfcefa ("wifi: wilc1000: fix DMA on stack objects") > Cc: stable@vger.kernel.org > Signed-off-by: Ajay Singh <ajay.kathat@microchip.com> > Signed-off-by: Alexis Lothoré <alexis.lothore@bootlin.com> > --- > Changes in v2: > - keep dedicated dynamic allocation for vmm_table > - Link to v1: https://lore.kernel.org/r/20231013-wilc1000_tx_oops-v1-1-3761beb9524d@bootlin.com > --- > drivers/net/wireless/microchip/wilc1000/wlan.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/net/wireless/microchip/wilc1000/wlan.c b/drivers/net/wireless/microchip/wilc1000/wlan.c > index 58bbf50081e4..e4113f2dfadf 100644 > --- a/drivers/net/wireless/microchip/wilc1000/wlan.c > +++ b/drivers/net/wireless/microchip/wilc1000/wlan.c > @@ -1492,7 +1492,7 @@ int wilc_wlan_init(struct net_device *dev) > } > > if (!wilc->vmm_table) > - wilc->vmm_table = kzalloc(WILC_VMM_TBL_SIZE, GFP_KERNEL); > + wilc->vmm_table = kzalloc(WILC_VMM_TBL_SIZE * sizeof(u32), GFP_KERNEL); this is probably OK since the values are constant, but kcalloc() is generally preferred > > if (!wilc->vmm_table) { > ret = -ENOBUFS; > > --- > base-commit: ea12d85cbfd6b08fff40a4fefccc011b6cfadf8e > change-id: 20231012-wilc1000_tx_oops-58ce91ee3e93 > > Best regards,
Hello Jeff, On 10/16/23 17:26, Jeff Johnson wrote: > On 10/16/2023 1:29 AM, Alexis Lothoré wrote: >> diff --git a/drivers/net/wireless/microchip/wilc1000/wlan.c >> b/drivers/net/wireless/microchip/wilc1000/wlan.c >> index 58bbf50081e4..e4113f2dfadf 100644 >> --- a/drivers/net/wireless/microchip/wilc1000/wlan.c >> +++ b/drivers/net/wireless/microchip/wilc1000/wlan.c >> @@ -1492,7 +1492,7 @@ int wilc_wlan_init(struct net_device *dev) >> } >> if (!wilc->vmm_table) >> - wilc->vmm_table = kzalloc(WILC_VMM_TBL_SIZE, GFP_KERNEL); >> + wilc->vmm_table = kzalloc(WILC_VMM_TBL_SIZE * sizeof(u32), GFP_KERNEL); > > this is probably OK since the values are constant, but kcalloc() is generally > preferred Ok, I can submit a new version with kcalloc. One thing that I do not understand however is why checkpatch.pl remains silent on this one. I guess it should raise the ALLOC_WITH_MULTIPLY warning here. I tried to dive into the script to understand why, but I drowned in regexes (and Perl, with which I am not familiar with). Could it be because of both sides being constant ? Thanks, Alexis
On 10/16/2023 2:23 PM, Alexis Lothoré wrote: > Hello Jeff, > > On 10/16/23 17:26, Jeff Johnson wrote: >> On 10/16/2023 1:29 AM, Alexis Lothoré wrote: >>> diff --git a/drivers/net/wireless/microchip/wilc1000/wlan.c >>> b/drivers/net/wireless/microchip/wilc1000/wlan.c >>> index 58bbf50081e4..e4113f2dfadf 100644 >>> --- a/drivers/net/wireless/microchip/wilc1000/wlan.c >>> +++ b/drivers/net/wireless/microchip/wilc1000/wlan.c >>> @@ -1492,7 +1492,7 @@ int wilc_wlan_init(struct net_device *dev) >>> } >>> if (!wilc->vmm_table) >>> - wilc->vmm_table = kzalloc(WILC_VMM_TBL_SIZE, GFP_KERNEL); >>> + wilc->vmm_table = kzalloc(WILC_VMM_TBL_SIZE * sizeof(u32), GFP_KERNEL); >> >> this is probably OK since the values are constant, but kcalloc() is generally >> preferred > > Ok, I can submit a new version with kcalloc. One thing that I do not understand > however is why checkpatch.pl remains silent on this one. I guess it should raise > the ALLOC_WITH_MULTIPLY warning here. I tried to dive into the script to > understand why, but I drowned in regexes (and Perl, with which I am not familiar > with). Could it be because of both sides being constant ? I also drown when looking at checkpatch.pl -- so many "write-only" regexes! But I think the following is what excludes your patch: $r1 =~ /^[A-Z_][A-Z0-9_]*$ It is a compile-time constant so the compiler can flag on overflow, so it's your call to modify or not. /jeff
On 10/17/23 00:51, Jeff Johnson wrote: > On 10/16/2023 2:23 PM, Alexis Lothoré wrote: >> Hello Jeff, >> >> On 10/16/23 17:26, Jeff Johnson wrote: >>> On 10/16/2023 1:29 AM, Alexis Lothoré wrote: >>> this is probably OK since the values are constant, but kcalloc() is generally >>> preferred >> >> Ok, I can submit a new version with kcalloc. One thing that I do not understand >> however is why checkpatch.pl remains silent on this one. I guess it should raise >> the ALLOC_WITH_MULTIPLY warning here. I tried to dive into the script to >> understand why, but I drowned in regexes (and Perl, with which I am not familiar >> with). Could it be because of both sides being constant ? > > I also drown when looking at checkpatch.pl -- so many "write-only" regexes! But > I think the following is what excludes your patch: > $r1 =~ /^[A-Z_][A-Z0-9_]*$ > > It is a compile-time constant so the compiler can flag on overflow, so it's your > call to modify or not. Thanks for taking a look. I have tried to tweak those lines to see if it makes checkpatch raise the warning, without success. Anyway, I agree with your initial statement, let's keep the code base homogeneous and replace kzalloc with kcalloc > /jeff
diff --git a/drivers/net/wireless/microchip/wilc1000/wlan.c b/drivers/net/wireless/microchip/wilc1000/wlan.c index 58bbf50081e4..e4113f2dfadf 100644 --- a/drivers/net/wireless/microchip/wilc1000/wlan.c +++ b/drivers/net/wireless/microchip/wilc1000/wlan.c @@ -1492,7 +1492,7 @@ int wilc_wlan_init(struct net_device *dev) } if (!wilc->vmm_table) - wilc->vmm_table = kzalloc(WILC_VMM_TBL_SIZE, GFP_KERNEL); + wilc->vmm_table = kzalloc(WILC_VMM_TBL_SIZE * sizeof(u32), GFP_KERNEL); if (!wilc->vmm_table) { ret = -ENOBUFS;