Intel-XE Archive on lore.kernel.org
 help / color / mirror / Atom feed
From: Matthew Auld <matthew.auld@intel.com>
To: "Yao, Jia" <jia.yao@intel.com>,
	"intel-xe@lists.freedesktop.org" <intel-xe@lists.freedesktop.org>
Cc: "Brost, Matthew" <matthew.brost@intel.com>,
	"Lin, Shuicheng" <shuicheng.lin@intel.com>,
	"Ghimiray, Himal Prasad" <himal.prasad.ghimiray@intel.com>,
	"Thomas Hellström" <thomas.hellstrom@linux.intel.com>,
	"Vivi, Rodrigo" <rodrigo.vivi@intel.com>
Subject: Re: [PATCH v2] drm/xe: Add bounds check on pat_index to prevent OOB kernel read in madvise
Date: Thu, 5 Feb 2026 10:21:24 +0000	[thread overview]
Message-ID: <86c575d3-a0a5-469f-b901-35ac83a68f4f@intel.com> (raw)
In-Reply-To: <PH8PR11MB8040896B4DF18BE1393ACC50F498A@PH8PR11MB8040.namprd11.prod.outlook.com>

On 04/02/2026 18:15, Yao, Jia wrote:
> Thanks! May I add your Reviewed-by tag in the next revision?

Yes, with the comments addressed.

> 
>> -----Original Message-----
>> From: Auld, Matthew <matthew.auld@intel.com>
>> Sent: Wednesday, February 4, 2026 7:44 AM
>> To: Yao, Jia <jia.yao@intel.com>; intel-xe@lists.freedesktop.org
>> Cc: Brost, Matthew <matthew.brost@intel.com>; Lin, Shuicheng
>> <shuicheng.lin@intel.com>; Ghimiray, Himal Prasad
>> <himal.prasad.ghimiray@intel.com>; Thomas Hellström
>> <thomas.hellstrom@linux.intel.com>; Vivi, Rodrigo <rodrigo.vivi@intel.com>
>> Subject: Re: [PATCH v2] drm/xe: Add bounds check on pat_index to prevent
>> OOB kernel read in madvise
>>
>> On 03/02/2026 21:06, Jia Yao wrote:
>>> When user provides a bogus pat_index value through the madvise IOCTL,
>>> the
>>> xe_pat_index_get_coh_mode() function performs an array access without
>>> validating bounds. This allows a malicious user to trigger an
>>> out-of-bounds kernel read from the xe->pat.table array.
>>>
>>> The vulnerability exists because the validation in
>>> madvise_args_are_sane() directly calls xe_pat_index_get_coh_mode(xe,
>>> args->pat_index.val) without first checking if pat_index is within [0, xe-
>>> pat.n_entries).
>>>
>>> Although xe_pat_index_get_coh_mode() has a WARN_ON to catch this in
>>> debug builds, it still performs the unsafe array access in production kernels.
>>>
>>> v2(Matthew Auld)
>>> - Using array_index_nospec() to mitigate spectre attacks when the
>>> value is used
>>>
>>> Fixes: ada7486c5668 ("drm/xe: Implement madvise ioctl for xe")
>>> Cc: Matthew Brost <matthew.brost@intel.com>
>>> Cc: Shuicheng Lin <shuicheng.lin@intel.com>
>>> Cc: Himal Prasad Ghimiray <himal.prasad.ghimiray@intel.com>
>>> Cc: "Thomas Hellström" <thomas.hellstrom@linux.intel.com>
>>> Cc: Rodrigo Vivi <rodrigo.vivi@intel.com>
>>> Cc: Matthew Auld <matthew.auld@intel.com>
>>> Signed-off-by: Jia Yao <jia.yao@intel.com>
>>
>> I think you dropped the stable Cc.
>>
>>> ---
>>>    drivers/gpu/drm/xe/xe_vm_madvise.c | 7 ++++++-
>>>    1 file changed, 6 insertions(+), 1 deletion(-)
>>>
>>> diff --git a/drivers/gpu/drm/xe/xe_vm_madvise.c
>>> b/drivers/gpu/drm/xe/xe_vm_madvise.c
>>> index add9a6ca2390..3564e1442694 100644
>>> --- a/drivers/gpu/drm/xe/xe_vm_madvise.c
>>> +++ b/drivers/gpu/drm/xe/xe_vm_madvise.c
>>> @@ -291,7 +291,12 @@ static bool madvise_args_are_sane(struct
>> xe_device *xe, const struct drm_xe_madv
>>>    		break;
>>>    	case DRM_XE_MEM_RANGE_ATTR_PAT:
>>>    	{
>>> -		u16 coh_mode = xe_pat_index_get_coh_mode(xe, args-
>>> pat_index.val);
>>> +		if (XE_IOCTL_DBG(xe, args->pat_index.val >= xe-
>>> pat.n_entries))
>>> +			return false;
>>> +
>>> +		u16 pat_index = array_index_nospec(args->pat_index.val,
>>> +xe->pat.n_entries);
>>> +
>>> +		u16 coh_mode = xe_pat_index_get_coh_mode(xe,
>> pat_index);
>>
>> nit: I think the normal coding style is to put the declarations at the start of the
>> block. The rest of this file seems to follow that.
>>
>> Otherwise:
>> Reviewed-by: Matthew Auld <matthew.auld@intel.com>
>>
>>>
>>>    		if (XE_IOCTL_DBG(xe, !coh_mode))
>>>    			return false;
> 


  reply	other threads:[~2026-02-05 10:21 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-03 17:20 [PATCH] drm/xe: Add bounds check on pat_index to prevent OOB kernel read in madvise Jia Yao
2026-02-03 17:27 ` ✓ CI.KUnit: success for " Patchwork
2026-02-03 17:29 ` [PATCH] " Matthew Auld
2026-02-03 18:02 ` ✗ Xe.CI.BAT: failure for " Patchwork
2026-02-03 21:06 ` [PATCH v2] " Jia Yao
2026-02-04 15:44   ` Matthew Auld
2026-02-04 18:15     ` Yao, Jia
2026-02-05 10:21       ` Matthew Auld [this message]
2026-02-03 21:14 ` ✓ CI.KUnit: success for drm/xe: Add bounds check on pat_index to prevent OOB kernel read in madvise (rev2) Patchwork
2026-02-03 21:47 ` ✗ Xe.CI.BAT: failure " Patchwork
2026-02-03 22:33 ` ✓ CI.KUnit: success for drm/xe: Add bounds check on pat_index to prevent OOB kernel read in madvise (rev3) Patchwork
2026-02-03 23:06 ` ✗ Xe.CI.BAT: failure " Patchwork
2026-02-04 13:05 ` ✗ Xe.CI.FULL: " Patchwork
2026-02-05  0:10 ` ✓ CI.KUnit: success for drm/xe: Add bounds check on pat_index to prevent OOB kernel read in madvise (rev4) Patchwork
2026-02-05  0:43 ` ✓ Xe.CI.BAT: " Patchwork
2026-02-05 15:38 ` ✗ Xe.CI.FULL: failure " Patchwork
2026-02-05 16:15 ` [PATCH v3] drm/xe: Add bounds check on pat_index to prevent OOB kernel read in madvise Jia Yao
2026-02-05 16:30   ` Matthew Auld
2026-02-05 16:22 ` ✓ CI.KUnit: success for drm/xe: Add bounds check on pat_index to prevent OOB kernel read in madvise (rev5) Patchwork
2026-02-05 17:03 ` ✓ Xe.CI.BAT: " Patchwork
2026-02-06 15:19 ` ✗ Xe.CI.FULL: failure " Patchwork

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=86c575d3-a0a5-469f-b901-35ac83a68f4f@intel.com \
    --to=matthew.auld@intel.com \
    --cc=himal.prasad.ghimiray@intel.com \
    --cc=intel-xe@lists.freedesktop.org \
    --cc=jia.yao@intel.com \
    --cc=matthew.brost@intel.com \
    --cc=rodrigo.vivi@intel.com \
    --cc=shuicheng.lin@intel.com \
    --cc=thomas.hellstrom@linux.intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox