/* * Copyright (C) 2003-2008 Takahiro Hirofuchi * * This is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, * USA. */ #ifndef __USBIP_STUB_H #define __USBIP_STUB_H #include #include #include #include #include #include #define STUB_BUSID_OTHER 0 #define STUB_BUSID_REMOV 1 #define STUB_BUSID_ADDED 2 #define STUB_BUSID_ALLOC 3 struct stub_device { struct usb_device *udev; struct usbip_device ud; __u32 devid; /* * stub_priv preserves private data of each urb. * It is allocated as stub_priv_cache and assigned to urb->context. * * stub_priv is always linked to any one of 3 lists; * priv_init: linked to this until the comletion of a urb. * priv_tx : linked to this after the completion of a urb. * priv_free: linked to this after the sending of the result. * * Any of these list operations should be locked by priv_lock. */ spinlock_t priv_lock; struct list_head priv_init; struct list_head priv_tx; struct list_head priv_free; /* see comments for unlinking in stub_rx.c */ struct list_head unlink_tx; struct list_head unlink_free; wait_queue_head_t tx_waitq; }; /* private data into urb->priv */ struct stub_priv { unsigned long seqnum; struct list_head list; struct stub_device *sdev; struct urb *urb; int unlinking; }; struct stub_unlink { unsigned long seqnum; struct list_head list; __u32 status; }; /* same as SYSFS_BUS_ID_SIZE */ #define BUSID_SIZE 32 struct bus_id_priv { char name[BUSID_SIZE]; char status; int interf_count; struct stub_device *sdev; struct usb_device *udev; char shutdown_busid; }; /* stub_priv is allocated from stub_priv_cache */ extern struct kmem_cache *stub_priv_cache; /* stub_dev.c */ extern struct usb_device_driver stub_driver; /* stub_main.c */ struct bus_id_priv *get_busid_priv(const char *busid); int del_match_busid(char *busid); void stub_device_cleanup_urbs(struct stub_device *sdev); /* stub_rx.c */ int stub_rx_loop(void *data); /* stub_tx.c */ void stub_enqueue_ret_unlink(struct stub_device *sdev, __u32 seqnum, __u32 status); void stub_complete(struct urb *urb); int stub_tx_loop(void *data); #endif /* __USBIP_STUB_H */ i/linux/net-next.git/commit/?h=nds-private-remove&id=02608e02fbec04fccf2eb0cc8d8082f65c0a4286'>root/sound/pci/mixart
diff options
context:
space:
mode:
authorLaura Abbott <labbott@redhat.com>2016-12-21 12:32:54 -0800
committerHerbert Xu <herbert@gondor.apana.org.au>2016-12-27 17:32:11 +0800
commit02608e02fbec04fccf2eb0cc8d8082f65c0a4286 (patch)
tree37ff0410d130cfe77185f591b07cd6403f207f0c /sound/pci/mixart
parent7ce7d89f48834cefece7804d38fc5d85382edf77 (diff)
crypto: testmgr - Use heap buffer for acomp test input
Christopher Covington reported a crash on aarch64 on recent Fedora kernels: kernel BUG at ./include/linux/scatterlist.h:140! Internal error: Oops - BUG: 0 [#1] PREEMPT SMP Modules linked in: CPU: 2 PID: 752 Comm: cryptomgr_test Not tainted 4.9.0-11815-ge93b1cc #162 Hardware name: linux,dummy-virt (DT) task: ffff80007c650080 task.stack: ffff800008910000 PC is at sg_init_one+0xa0/0xb8 LR is at sg_init_one+0x24/0xb8 ... [<ffff000008398db8>] sg_init_one+0xa0/0xb8 [<ffff000008350a44>] test_acomp+0x10c/0x438 [<ffff000008350e20>] alg_test_comp+0xb0/0x118 [<ffff00000834f28c>] alg_test+0x17c/0x2f0 [<ffff00000834c6a4>] cryptomgr_test+0x44/0x50 [<ffff0000080dac70>] kthread+0xf8/0x128 [<ffff000008082ec0>] ret_from_fork+0x10/0x50 The test vectors used for input are part of the kernel image. These inputs are passed as a buffer to sg_init_one which eventually blows up with BUG_ON(!virt_addr_valid(buf)). On arm64, virt_addr_valid returns false for the kernel image since virt_to_page will not return the correct page. Fix this by copying the input vectors to heap buffer before setting up the scatterlist. Reported-by: Christopher Covington <cov@codeaurora.org> Fixes: d7db7a882deb ("crypto: acomp - update testmgr with support for acomp") Signed-off-by: Laura Abbott <labbott@redhat.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'sound/pci/mixart')