diff options
| author | Pratyush Brahma <[email protected]> | 2024-10-04 09:04:28 +0000 |
|---|---|---|
| committer | Will Deacon <[email protected]> | 2024-10-29 15:28:06 +0000 |
| commit | 229e6ee43d2a160a1592b83aad620d6027084aad (patch) | |
| tree | a1c2fb093daacec9ef1810e6f26a290ada213e58 /drivers/usb/cdns3/cdns3-imx.c | |
| parent | iommu/io-pgtable-arm: Add self test for the last page in the IAS (diff) | |
| download | kernel-229e6ee43d2a160a1592b83aad620d6027084aad.tar.gz kernel-229e6ee43d2a160a1592b83aad620d6027084aad.zip | |
iommu/arm-smmu: Defer probe of clients after smmu device bound
Null pointer dereference occurs due to a race between smmu
driver probe and client driver probe, when of_dma_configure()
for client is called after the iommu_device_register() for smmu driver
probe has executed but before the driver_bound() for smmu driver
has been called.
Following is how the race occurs:
T1:Smmu device probe T2: Client device probe
really_probe()
arm_smmu_device_probe()
iommu_device_register()
really_probe()
platform_dma_configure()
of_dma_configure()
of_dma_configure_id()
of_iommu_configure()
iommu_probe_device()
iommu_init_device()
arm_smmu_probe_device()
arm_smmu_get_by_fwnode()
driver_find_device_by_fwnode()
driver_find_device()
next_device()
klist_next()
/* null ptr
assigned to smmu */
/* null ptr dereference
while smmu->streamid_mask */
driver_bound()
klist_add_tail()
When this null smmu pointer is dereferenced later in
arm_smmu_probe_device, the device crashes.
Fix this by deferring the probe of the client device
until the smmu device has bound to the arm smmu driver.
Fixes: 021bb8420d44 ("iommu/arm-smmu: Wire up generic configuration support")
Cc: [email protected]
Co-developed-by: Prakash Gupta <[email protected]>
Signed-off-by: Prakash Gupta <[email protected]>
Signed-off-by: Pratyush Brahma <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
[will: Add comment]
Signed-off-by: Will Deacon <[email protected]>
Diffstat (limited to 'drivers/usb/cdns3/cdns3-imx.c')
0 files changed, 0 insertions, 0 deletions
