From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 91098C4332F for ; Sat, 24 Dec 2022 01:32:01 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233146AbiLXBb6 (ORCPT ); Fri, 23 Dec 2022 20:31:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57756 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236463AbiLXBbV (ORCPT ); Fri, 23 Dec 2022 20:31:21 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E71F137F9F; Fri, 23 Dec 2022 17:30:28 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 92C5CB821B9; Sat, 24 Dec 2022 01:30:22 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 64051C433D2; Sat, 24 Dec 2022 01:30:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1671845421; bh=LhawDuvtJcILijy4td5CVmDyeEj+ukbc8RLONYDGlF4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Eyd/+Z+4D9TwosvB+h5aq1bqwJRRWNR7ePAwOLoSl6LQjM/EplcG7l9UT/nMbkazL GW5LwalQZiow9PccHDCUVvotDIyOftivNDSI934cWDzD+iexfex5JlJi8piOj5UdFc Dr49w//biz2lhpN7/ug3DhGT9gTpzu9xS6ME+IZpzqls/ezMfFxJ7hLq33qUgbjToK yJwDxReiXAs+aj6TFdj8VGwv+OVZ193+MsqjZZr6hBtNNumV7xU7cW0aKgH0/0VaXO 2SH+GCAO+nW+abR3YDbzHL9q2nre9Is/al3O5CN7Rle4mQM+QvkisKqWSO6WYcdBSF xHeSFwrd1wGYQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: farah kassabri , Oded Gabbay , Sasha Levin , gregkh@linuxfoundation.org, osharabi@habana.ai, ynudelman@habana.ai, ttayar@habana.ai, dhirschfeld@habana.ai Subject: [PATCH AUTOSEL 6.1 18/26] habanalabs: zero ts registration buff when allocated Date: Fri, 23 Dec 2022 20:29:22 -0500 Message-Id: <20221224012930.392358-18-sashal@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20221224012930.392358-1-sashal@kernel.org> References: <20221224012930.392358-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: farah kassabri [ Upstream commit 679e968908a4997d02c2a7df294e97b066f9149f ] To avoid memory corruption in kernel memory while using timestamp registration nodes, zero the kernel buff memory when its allocated. Signed-off-by: farah kassabri Reviewed-by: Oded Gabbay Signed-off-by: Oded Gabbay Signed-off-by: Sasha Levin --- drivers/misc/habanalabs/common/memory.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/misc/habanalabs/common/memory.c b/drivers/misc/habanalabs/common/memory.c index ef28f3b37b93..9763188dd7b0 100644 --- a/drivers/misc/habanalabs/common/memory.c +++ b/drivers/misc/habanalabs/common/memory.c @@ -2109,7 +2109,7 @@ static int hl_ts_alloc_buf(struct hl_mmap_mem_buf *buf, gfp_t gfp, void *args) /* Allocate the internal kernel buffer */ size = num_elements * sizeof(struct hl_user_pending_interrupt); - p = vmalloc(size); + p = vzalloc(size); if (!p) goto free_user_buff; -- 2.35.1