All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] net/usb: rtl8150: allocate URB transfer_buffer and setup_packet separately
@ 2013-08-07 13:36 Jussi Kivilinna
  2013-08-08 15:14 ` Petko Manolov
  0 siblings, 1 reply; 5+ messages in thread
From: Jussi Kivilinna @ 2013-08-07 13:36 UTC (permalink / raw)
  To: netdev; +Cc: Greg Kroah-Hartman, linux-usb, Petko Manolov, David S. Miller

rtl8150 allocates URB transfer_buffer and setup_packet as part of same
structure 'struct async_req'. This can cause same cacheline to be DMA-mapped
twice with same URB. This can lead to memory corruption on some systems.

Patch make allocation of these buffers separate.

Use of 'struct async_req' was introduced by recent commit 4d12997a9b "drivers:
net: usb: rtl8150: concurrent URB bugfix".

Patch is only compile tested.

Cc: <stable@vger.kernel.org>
Signed-off-by: Jussi Kivilinna <jussi.kivilinna@iki.fi>
---
 drivers/net/usb/rtl8150.c |   48 +++++++++++++++++++++++----------------------
 1 file changed, 25 insertions(+), 23 deletions(-)

diff --git a/drivers/net/usb/rtl8150.c b/drivers/net/usb/rtl8150.c
index 6cbdac6..c353bfd 100644
--- a/drivers/net/usb/rtl8150.c
+++ b/drivers/net/usb/rtl8150.c
@@ -142,11 +142,6 @@ struct rtl8150 {
 
 typedef struct rtl8150 rtl8150_t;
 
-struct async_req {
-	struct usb_ctrlrequest dr;
-	u16 rx_creg;
-};
-
 static const char driver_name [] = "rtl8150";
 
 /*
@@ -170,12 +165,12 @@ static int set_registers(rtl8150_t * dev, u16 indx, u16 size, void *data)
 
 static void async_set_reg_cb(struct urb *urb)
 {
-	struct async_req *req = (struct async_req *)urb->context;
 	int status = urb->status;
 
 	if (status < 0)
 		dev_dbg(&urb->dev->dev, "%s failed with %d", __func__, status);
-	kfree(req);
+	kfree(urb->setup_packet); /* dr */
+	kfree(urb->transfer_buffer); /* rx_creg */
 	usb_free_urb(urb);
 }
 
@@ -183,25 +178,27 @@ static int async_set_registers(rtl8150_t *dev, u16 indx, u16 size, u16 reg)
 {
 	int res = -ENOMEM;
 	struct urb *async_urb;
-	struct async_req *req;
+	struct usb_ctrlrequest *dr;
+	u16 *rx_creg;
+
+	dr = kmalloc(sizeof(*dr), GFP_ATOMIC);
+	rx_creg = kmalloc(sizeof(*rx_creg), GFP_ATOMIC);
+	if (!dr || !rx_creg)
+		goto err;
 
-	req = kmalloc(sizeof(struct async_req), GFP_ATOMIC);
-	if (req == NULL)
-		return res;
 	async_urb = usb_alloc_urb(0, GFP_ATOMIC);
-	if (async_urb == NULL) {
-		kfree(req);
-		return res;
-	}
-	req->rx_creg = cpu_to_le16(reg);
-	req->dr.bRequestType = RTL8150_REQT_WRITE;
-	req->dr.bRequest = RTL8150_REQ_SET_REGS;
-	req->dr.wIndex = 0;
-	req->dr.wValue = cpu_to_le16(indx);
-	req->dr.wLength = cpu_to_le16(size);
+	if (async_urb == NULL)
+		goto err;
+
+	*rx_creg = cpu_to_le16(reg);
+	dr->bRequestType = RTL8150_REQT_WRITE;
+	dr->bRequest = RTL8150_REQ_SET_REGS;
+	dr->wIndex = 0;
+	dr->wValue = cpu_to_le16(indx);
+	dr->wLength = cpu_to_le16(size);
 	usb_fill_control_urb(async_urb, dev->udev,
-	                     usb_sndctrlpipe(dev->udev, 0), (void *)&req->dr,
-			     &req->rx_creg, size, async_set_reg_cb, req);
+			     usb_sndctrlpipe(dev->udev, 0), (void *)dr,
+			     rx_creg, size, async_set_reg_cb, NULL);
 	res = usb_submit_urb(async_urb, GFP_ATOMIC);
 	if (res) {
 		if (res == -ENODEV)
@@ -209,6 +206,11 @@ static int async_set_registers(rtl8150_t *dev, u16 indx, u16 size, u16 reg)
 		dev_err(&dev->udev->dev, "%s failed with %d\n", __func__, res);
 	}
 	return res;
+
+err:
+	kfree(dr);
+	kfree(rx_creg);
+	return res;
 }
 
 static int read_mii_word(rtl8150_t * dev, u8 phy, __u8 indx, u16 * reg)

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH] net/usb: rtl8150: allocate URB transfer_buffer and setup_packet separately
  2013-08-07 13:36 [PATCH] net/usb: rtl8150: allocate URB transfer_buffer and setup_packet separately Jussi Kivilinna
@ 2013-08-08 15:14 ` Petko Manolov
       [not found]   ` <alpine.DEB.2.10.1308081809120.4258-WOI+tvYbpdBn9MRfDTB0XAC/G2K4zDHf@public.gmane.org>
  0 siblings, 1 reply; 5+ messages in thread
From: Petko Manolov @ 2013-08-08 15:14 UTC (permalink / raw)
  To: Jussi Kivilinna; +Cc: netdev, Greg Kroah-Hartman, linux-usb, David S. Miller

On Wed, 7 Aug 2013, Jussi Kivilinna wrote:

> rtl8150 allocates URB transfer_buffer and setup_packet as part of same 
> structure 'struct async_req'. This can cause same cacheline to be 
> DMA-mapped twice with same URB. This can lead to memory corruption on 
> some systems.

I can see performance impact due to the double mapping.  However, memory 
corruption seems a bit too much for sane cache and DMA controllers.  Out 
of interest - which is the architecture that will potentially corrupt the 
memory.


cheers,
Petko

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] net/usb: rtl8150: allocate URB transfer_buffer and setup_packet separately
       [not found]   ` <alpine.DEB.2.10.1308081809120.4258-WOI+tvYbpdBn9MRfDTB0XAC/G2K4zDHf@public.gmane.org>
@ 2013-08-08 19:43     ` Jussi Kivilinna
  2013-08-09 18:50       ` Petko Manolov
  0 siblings, 1 reply; 5+ messages in thread
From: Jussi Kivilinna @ 2013-08-08 19:43 UTC (permalink / raw)
  To: Petko Manolov
  Cc: netdev-u79uwXL29TY76Z2rM5mHXA, Greg Kroah-Hartman,
	linux-usb-u79uwXL29TY76Z2rM5mHXA, David S. Miller

On 08.08.2013 18:14, Petko Manolov wrote:
> On Wed, 7 Aug 2013, Jussi Kivilinna wrote:
> 
>> rtl8150 allocates URB transfer_buffer and setup_packet as part of same 
>> structure 'struct async_req'. This can cause same cacheline to be 
>> DMA-mapped twice with same URB. This can lead to memory corruption on 
>> some systems.
> 
> I can see performance impact due to the double mapping.  However, memory 
> corruption seems a bit too much for sane cache and DMA controllers.  Out 
> of interest - which is the architecture that will potentially corrupt the 
> memory.

rtlwifi driver had similar structure to allocate both setup_packet and transfer_buffer in single go (overlapping dma-mapping cachelines) and this caused problems on ARM/sunxi. Problems means: memory corruptions at random locations, device freezes and lock-ups.

-Jussi

> 
> 
> cheers,
> Petko
> 

--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] net/usb: rtl8150: allocate URB transfer_buffer and setup_packet separately
  2013-08-08 19:43     ` Jussi Kivilinna
@ 2013-08-09 18:50       ` Petko Manolov
  2013-08-10  7:38         ` Jussi Kivilinna
  0 siblings, 1 reply; 5+ messages in thread
From: Petko Manolov @ 2013-08-09 18:50 UTC (permalink / raw)
  To: Jussi Kivilinna; +Cc: netdev, Greg Kroah-Hartman, linux-usb, David S. Miller

On Thu, 8 Aug 2013, Jussi Kivilinna wrote:

> On 08.08.2013 18:14, Petko Manolov wrote:
> > On Wed, 7 Aug 2013, Jussi Kivilinna wrote:
> > 
> >> rtl8150 allocates URB transfer_buffer and setup_packet as part of same 
> >> structure 'struct async_req'. This can cause same cacheline to be 
> >> DMA-mapped twice with same URB. This can lead to memory corruption on 
> >> some systems.
> > 
> > I can see performance impact due to the double mapping.  However, memory 
> > corruption seems a bit too much for sane cache and DMA controllers.  Out 
> > of interest - which is the architecture that will potentially corrupt the 
> > memory.
> 
> rtlwifi driver had similar structure to allocate both setup_packet and 
> transfer_buffer in single go (overlapping dma-mapping cachelines) and 
> this caused problems on ARM/sunxi. Problems means: memory corruptions at 
> random locations, device freezes and lock-ups.

Broken controllers?..

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] net/usb: rtl8150: allocate URB transfer_buffer and setup_packet separately
  2013-08-09 18:50       ` Petko Manolov
@ 2013-08-10  7:38         ` Jussi Kivilinna
  0 siblings, 0 replies; 5+ messages in thread
From: Jussi Kivilinna @ 2013-08-10  7:38 UTC (permalink / raw)
  To: Petko Manolov; +Cc: netdev, Greg Kroah-Hartman, linux-usb, David S. Miller

On 09.08.2013 21:50, Petko Manolov wrote:
> On Thu, 8 Aug 2013, Jussi Kivilinna wrote:
> 
>> On 08.08.2013 18:14, Petko Manolov wrote:
>>> On Wed, 7 Aug 2013, Jussi Kivilinna wrote:
>>>
>>>> rtl8150 allocates URB transfer_buffer and setup_packet as part of same 
>>>> structure 'struct async_req'. This can cause same cacheline to be 
>>>> DMA-mapped twice with same URB. This can lead to memory corruption on 
>>>> some systems.
>>>
>>> I can see performance impact due to the double mapping.  However, memory 
>>> corruption seems a bit too much for sane cache and DMA controllers.  Out 
>>> of interest - which is the architecture that will potentially corrupt the 
>>> memory.
>>
>> rtlwifi driver had similar structure to allocate both setup_packet and 
>> transfer_buffer in single go (overlapping dma-mapping cachelines) and 
>> this caused problems on ARM/sunxi. Problems means: memory corruptions at 
>> random locations, device freezes and lock-ups.
> 
> Broken controllers?..
> 

At first I thought so too, but I discussed about this at linux-usb, and answer
was that driver which uses same (dma/-)cacheline for multiple buffers is buggy..
  http://marc.info/?l=linux-usb&m=137130407121137&w=2 (at end)
  http://marc.info/?l=linux-usb&m=137137080902265&w=2
  http://marc.info/?l=linux-usb&m=137242422120782&w=2

-Jussi

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2013-08-10  7:38 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-08-07 13:36 [PATCH] net/usb: rtl8150: allocate URB transfer_buffer and setup_packet separately Jussi Kivilinna
2013-08-08 15:14 ` Petko Manolov
     [not found]   ` <alpine.DEB.2.10.1308081809120.4258-WOI+tvYbpdBn9MRfDTB0XAC/G2K4zDHf@public.gmane.org>
2013-08-08 19:43     ` Jussi Kivilinna
2013-08-09 18:50       ` Petko Manolov
2013-08-10  7:38         ` Jussi Kivilinna

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.