From: Bjorn Helgaas <bhelgaas@google.com>
To: Bandan Das <bsd@redhat.com>
Cc: Alex Williamson <alex.williamson@redhat.com>,
linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH v3] PCI: rework new_id interface for known vendor/device values
Date: Mon, 28 Apr 2014 17:39:26 -0600 [thread overview]
Message-ID: <20140428233926.GB30008@google.com> (raw)
In-Reply-To: <jpgtx9h9u15.fsf@nelium.bos.redhat.com>
On Fri, Apr 25, 2014 at 01:51:50PM -0400, Bandan Das wrote:
> Bjorn Helgaas <bhelgaas@google.com> writes:
>
> > On Tue, Apr 01, 2014 at 09:32:59PM -0400, Bandan Das wrote:
> >>
> >> While using the new_id interface, the user can unintentionally feed
> >> incorrect values if the driver static table has a matching entry.
> >> This is possible since only the device and vendor fields are
> >> mandatory and the rest are optional. As a result, store_new_id
> >> will fill in default values that are then passed on to the driver
> >> and can have unintended consequences.
> >>
> >> As an example, consider the ixgbe driver and the 82599EB network card :
> >> echo "8086 10fb" > /sys/bus/pci/drivers/ixgbe/new_id
> >>
> >> This will pass a driver_data value of 0 to the driver whereas
> >> the index 0 in ixgbe actually points to a different set of card
> >> operations.
> >>
> >> This change returns an error if the user attempts to add a dynid for
> >> a vendor/device combination for which a static entry already exists.
> >> However, if the user intentionally wants a different set of values,
> >> she must provide all the 7 fields and that will be accepted.
> >>
> >> In KVM/device assignment scenario, the user might want
> >> to bind a device back to the host driver by writing to new_id
> >> and trip on a possible null pointer dereference.
> >
> > I don't understand this last KVM comment. If this patch fixes a null
> > pointer dereference, it must be because we return -EEXIST instead of
> > calling the driver's probe method.
>
> A null pointer dereference in the ixgbe driver's struct ixgbe_info
> that points to operations for a card model. In this case, when the user
> uses the new_id interface (without specifying driver_data), it defaults
> to 0. So, ixgbe_info points to ixgbe_82598_info with mac_ops set to
> mac_ops_82598 while the card in question is a 82599.
>
> > Can you outline the sequence of events and the drivers involved? Did we
>
> Something like this is enough to trigger this -
> echo "b:f:d" > /sys/bus/.../driver/unbind
> echo "b:f:d" > /sys/bus/pci/drives/ixgbe/new_id
> echo 16 > /sys/bus/pci/devices/b:f:d/sriov_numvfs
>
> > start with a device that was claimed by vfio, and now we're trying to get
> > ixgbe to claim it by writing to /sys/bus/pci/drivers/ixgbe/new_id? If so,
> > does that mean the user has to know what driver_data value to supply?
>
> Yes, but isn't it better than defaulting to 0 ?
>
> > I know you didn't add the new_id mechanism, and this patch makes it safer
> > than it was before, but I'm uneasy about it in general. Most drivers do
> > not validate the driver_data value. They assume it came out of the
> > id_table supplied by the driver and is therefore trustworthy. But new_id
> > is a loophole that allows a user (hopefully only root) to pass arbitrary
> > junk to the driver.
>
> I think this is what this patch does. If the user intends to, let her
> pass arbitrary junk, let's not assume values on behalf of the user.
Yep, I agree, I was just trying to figure out if there was something
specific to KVM here. But I don't think there is.
Bjorn
next prev parent reply other threads:[~2014-04-28 23:39 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-04-02 1:32 [PATCH v3] PCI: rework new_id interface for known vendor/device values Bandan Das
2014-04-02 1:41 ` Alex Williamson
2014-04-24 22:45 ` Bjorn Helgaas
2014-04-25 17:39 ` Alex Williamson
2014-04-28 23:37 ` Bjorn Helgaas
2014-04-25 17:51 ` Bandan Das
2014-04-28 23:39 ` Bjorn Helgaas [this message]
2014-04-29 23:41 ` Bjorn Helgaas
2014-06-15 15:05 ` Konstantin Khlebnikov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140428233926.GB30008@google.com \
--to=bhelgaas@google.com \
--cc=alex.williamson@redhat.com \
--cc=bsd@redhat.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-pci@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.