On Thu, May 14, 2020 at 08:14:17AM +0200, Christoph Hellwig wrote: > Guys, can you please start formal thread on this? I have no > idea where this came from and what the rationale is. Btw, if the > pfn is crap in dma_direct_mmap then the dma_addr_t passed in is > crap, as it is derived from that. What is the caller, and how is > this triggered? Ok, to summarize, commit 2bef9aed6f0e ("usb: usbfs: correct kernel->user page attribute mismatch") changed a call from remap_pfn_range() to dma_mmap_coherent() for usb data buffers being sent from userspace. Details on why this was changed is in the commit changelog, but this has triggered a WARN_ON() in memtype_reserve when I think some odd data buffers were sent to it by syzbot fuzzing. The warning caught the wrong data, but triggered syzbot. So, the question is, should all callers of dma_mmap_coherent() validate the parms better before it is called, or should the call chain here properly sanitize things on their own. Note, usbfs is not the only direct-from-userspace caller of dma_mmap_coherent(), it's also used in other userspace apis (frame buffer drivers, fastrpc, some SoC drivers) but it looks like nothing has fuzzed those apis before to trigger this. Does that help explain things better? thanks, greg k-h