1. 09 4月, 2021 37 次提交
  2. 05 4月, 2021 3 次提交
    • G
      misc: Add Synopsys DesignWare xData IP driver · e8a30eef
      Gustavo Pimentel 提交于
      Add Synopsys DesignWare xData IP driver. This driver enables/disables
      the PCI traffic generator module pertain to the Synopsys DesignWare
      prototype.
      Signed-off-by: NGustavo Pimentel <gustavo.pimentel@synopsys.com>
      Link: https://lore.kernel.org/r/daa1efe23850e77d6807dc3f371728fc0b7548b8.1617016509.git.gustavo.pimentel@synopsys.comSigned-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      e8a30eef
    • T
      misc: vmw_vmci: explicitly initialize vmci_datagram payload · b2192cfe
      Tetsuo Handa 提交于
      KMSAN complains that vmci_check_host_caps() left the payload part of
      check_msg uninitialized.
      
        =====================================================
        BUG: KMSAN: uninit-value in kmsan_check_memory+0xd/0x10
        CPU: 1 PID: 1 Comm: swapper/0 Tainted: G    B             5.11.0-rc7+ #4
        Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
        Call Trace:
         dump_stack+0x21c/0x280
         kmsan_report+0xfb/0x1e0
         kmsan_internal_check_memory+0x202/0x520
         kmsan_check_memory+0xd/0x10
         iowrite8_rep+0x86/0x380
         vmci_guest_probe_device+0xf0b/0x1e70
         pci_device_probe+0xab3/0xe70
         really_probe+0xd16/0x24d0
         driver_probe_device+0x29d/0x3a0
         device_driver_attach+0x25a/0x490
         __driver_attach+0x78c/0x840
         bus_for_each_dev+0x210/0x340
         driver_attach+0x89/0xb0
         bus_add_driver+0x677/0xc40
         driver_register+0x485/0x8e0
         __pci_register_driver+0x1ff/0x350
         vmci_guest_init+0x3e/0x41
         vmci_drv_init+0x1d6/0x43f
         do_one_initcall+0x39c/0x9a0
         do_initcall_level+0x1d7/0x259
         do_initcalls+0x127/0x1cb
         do_basic_setup+0x33/0x36
         kernel_init_freeable+0x29a/0x3ed
         kernel_init+0x1f/0x840
         ret_from_fork+0x1f/0x30
      
        Uninit was created at:
         kmsan_internal_poison_shadow+0x5c/0xf0
         kmsan_slab_alloc+0x8d/0xe0
         kmem_cache_alloc+0x84f/0xe30
         vmci_guest_probe_device+0xd11/0x1e70
         pci_device_probe+0xab3/0xe70
         really_probe+0xd16/0x24d0
         driver_probe_device+0x29d/0x3a0
         device_driver_attach+0x25a/0x490
         __driver_attach+0x78c/0x840
         bus_for_each_dev+0x210/0x340
         driver_attach+0x89/0xb0
         bus_add_driver+0x677/0xc40
         driver_register+0x485/0x8e0
         __pci_register_driver+0x1ff/0x350
         vmci_guest_init+0x3e/0x41
         vmci_drv_init+0x1d6/0x43f
         do_one_initcall+0x39c/0x9a0
         do_initcall_level+0x1d7/0x259
         do_initcalls+0x127/0x1cb
         do_basic_setup+0x33/0x36
         kernel_init_freeable+0x29a/0x3ed
         kernel_init+0x1f/0x840
         ret_from_fork+0x1f/0x30
      
        Bytes 28-31 of 36 are uninitialized
        Memory access of size 36 starts at ffff8881675e5f00
        =====================================================
      
      Fixes: 1f166439 ("VMCI: guest side driver implementation.")
      Cc: <stable@vger.kernel.org>
      Signed-off-by: NTetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
      Link: https://lore.kernel.org/r/20210402121742.3917-2-penguin-kernel@I-love.SAKURA.ne.jpSigned-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      b2192cfe
    • T
      misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct · 376565b9
      Tetsuo Handa 提交于
      KMSAN complains that the vmci_use_ppn64() == false path in
      vmci_dbell_register_notification_bitmap() left upper 32bits of
      bitmap_set_msg.bitmap_ppn64 member uninitialized.
      
        =====================================================
        BUG: KMSAN: uninit-value in kmsan_check_memory+0xd/0x10
        CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.11.0-rc7+ #4
        Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
        Call Trace:
         dump_stack+0x21c/0x280
         kmsan_report+0xfb/0x1e0
         kmsan_internal_check_memory+0x484/0x520
         kmsan_check_memory+0xd/0x10
         iowrite8_rep+0x86/0x380
         vmci_send_datagram+0x150/0x280
         vmci_dbell_register_notification_bitmap+0x133/0x1e0
         vmci_guest_probe_device+0xcab/0x1e70
         pci_device_probe+0xab3/0xe70
         really_probe+0xd16/0x24d0
         driver_probe_device+0x29d/0x3a0
         device_driver_attach+0x25a/0x490
         __driver_attach+0x78c/0x840
         bus_for_each_dev+0x210/0x340
         driver_attach+0x89/0xb0
         bus_add_driver+0x677/0xc40
         driver_register+0x485/0x8e0
         __pci_register_driver+0x1ff/0x350
         vmci_guest_init+0x3e/0x41
         vmci_drv_init+0x1d6/0x43f
         do_one_initcall+0x39c/0x9a0
         do_initcall_level+0x1d7/0x259
         do_initcalls+0x127/0x1cb
         do_basic_setup+0x33/0x36
         kernel_init_freeable+0x29a/0x3ed
         kernel_init+0x1f/0x840
         ret_from_fork+0x1f/0x30
      
        Local variable ----bitmap_set_msg@vmci_dbell_register_notification_bitmap created at:
         vmci_dbell_register_notification_bitmap+0x50/0x1e0
         vmci_dbell_register_notification_bitmap+0x50/0x1e0
      
        Bytes 28-31 of 32 are uninitialized
        Memory access of size 32 starts at ffff88810098f570
        =====================================================
      
      Fixes: 83e2ec76 ("VMCI: doorbell implementation.")
      Cc: <stable@vger.kernel.org>
      Signed-off-by: NTetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
      Link: https://lore.kernel.org/r/20210402121742.3917-1-penguin-kernel@I-love.SAKURA.ne.jpSigned-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      376565b9