From: Jonathan Cameron <Jonathan.Cameron@Huawei.com>
To: Robert Richter <rrichter@amd.com>
Cc: Alison Schofield <alison.schofield@intel.com>,
Vishal Verma <vishal.l.verma@intel.com>,
Ira Weiny <ira.weiny@intel.com>,
Dan Williams <dan.j.williams@intel.com>,
Dave Jiang <dave.jiang@intel.com>,
"Davidlohr Bueso" <dave@stgolabs.net>,
"Rafael J. Wysocki" <rafael@kernel.org>,
Andrew Morton <akpm@linux-foundation.org>,
<linux-cxl@vger.kernel.org>, <linux-kernel@vger.kernel.org>,
Len Brown <lenb@kernel.org>, <linux-acpi@vger.kernel.org>
Subject: Re: [PATCH v2 3/3] lib/firmware_table: Provide buffer length argument to cdat_table_parse()
Date: Wed, 14 Feb 2024 12:36:18 +0000 [thread overview]
Message-ID: <20240214123618.00001dd6@Huawei.com> (raw)
In-Reply-To: <ZcYLOzd0KUX9ckYo@rric.localdomain>
On Fri, 9 Feb 2024 12:23:39 +0100
Robert Richter <rrichter@amd.com> wrote:
> On 26.01.24 16:46:03, Jonathan Cameron wrote:
> > On Mon, 8 Jan 2024 12:48:33 +0100
> > Robert Richter <rrichter@amd.com> wrote:
> >
> > > The last entry in the CDAT table may not mark the end of the CDAT
> > > table buffer specified by the length field in the CDAT header. It can
> > > be shorter with trailing unused (zero'ed) data. The actual table
> > > length is determined when reading all CDAT entries of the table with
> > > DOE.
> >
> > Can you give some reasons why this would occur?
>
> I have seen card implementations where the CDAT table is some sort of
> fix buffer, but with entries filled in that do not fill the whole
> table length size. Which means that the last DOE ends earlier than the
> table end that then contains padding bytes. Spec is not entierly clear
> here. It could be interpreted as a spec violation, but DOE is the card
> vendor's firmware there is not much that can be done to fix that
> there...
We can fall back on the usual kernel developer nudge solution.
Print a rude message and hope their customers tell them to fix it ;)
>
> >
> > Need to be clear if this is:
> > 1) Hardening against device returning borked table.
>
> So this was the main motivation. It will be likely there are more
> cards with that issue.
>
> > 2) Hardening against in flight update of CDAT racing with the readout
> > (not sure table can change size, but maybe.. I haven't checked).
>
> That is a side effect I realized while implementing this patch. To
> prevent an out of bound buffer access, either the buffer needs a
> length argument or the length field in the header needs to be checked.
> The earlier is more reasonable and natural to me as no buffer insight
> is needed for that.
>
> > 3) DW read back vs packed structures?
>
> Good point. But that was not the reason. IIR the PCI DOE code
> correctly, there is a DW access but only the missing bytes are written
> to the buffer. The CDAT structures are all DW aligned, but the DOE
> header isn't.
Yes. I hoped that was still working :)
>
> >
> > Patch seems reasonable to me, I'd just like a clear statement of why
> > it happens!
>
> So regardless of padding bytes or not, a length check is required in
> any case, one or the other way.
>
> Will update the patch description.
Great.
>
> Thanks,
>
> -Robert
>
> >
> > Jonathan
> >
> > >
> > > If the table is greater than expected (containing zero'ed trailing
> > > data), the CDAT parser fails with:
> > >
> > > [ 48.691717] Malformed DSMAS table length: (24:0)
> > > [ 48.702084] [CDAT:0x00] Invalid zero length
> > > [ 48.711460] cxl_port endpoint1: Failed to parse CDAT: -22
> > >
> > > In addition, the table buffer size can be different from the size
> > > specified in the length field. This may cause out-of-bound access then
> > > parsing the CDAT table.
> > >
> > > Fix that by providing an optonal buffer length argument to
> > > acpi_parse_entries_array() that can be used by cdat_table_parse() to
> > > propagate the buffer size down to its users.
> > >
> > > Cc: "Rafael J. Wysocki" <rafael@kernel.org>
> > > Cc: Len Brown <lenb@kernel.org>
> > > Signed-off-by: Robert Richter <rrichter@amd.com>
> > > ---
> > > drivers/acpi/tables.c | 2 +-
> > > drivers/cxl/core/cdat.c | 6 +++---
> > > include/linux/fw_table.h | 4 +++-
> > > lib/fw_table.c | 15 ++++++++++-----
> > > 4 files changed, 17 insertions(+), 10 deletions(-)
> > >
> > > diff --git a/drivers/acpi/tables.c b/drivers/acpi/tables.c
> > > index b07f7d091d13..b976e5fc3fbc 100644
> > > --- a/drivers/acpi/tables.c
> > > +++ b/drivers/acpi/tables.c
> > > @@ -253,7 +253,7 @@ int __init_or_acpilib acpi_table_parse_entries_array(
> > >
> > > count = acpi_parse_entries_array(id, table_size,
> > > (union fw_table_header *)table_header,
> > > - proc, proc_num, max_entries);
> > > + 0, proc, proc_num, max_entries);
> > >
> > > acpi_put_table(table_header);
> > > return count;
> > > diff --git a/drivers/cxl/core/cdat.c b/drivers/cxl/core/cdat.c
> > > index 6fe11546889f..012d8f2a7945 100644
> > > --- a/drivers/cxl/core/cdat.c
> > > +++ b/drivers/cxl/core/cdat.c
> > > @@ -149,13 +149,13 @@ static int cxl_cdat_endpoint_process(struct cxl_port *port,
> > > int rc;
> > >
> > > rc = cdat_table_parse(ACPI_CDAT_TYPE_DSMAS, cdat_dsmas_handler,
> > > - dsmas_xa, port->cdat.table);
> > > + dsmas_xa, port->cdat.table, port->cdat.length);
> > > rc = cdat_table_parse_output(rc);
> > > if (rc)
> > > return rc;
> > >
> > > rc = cdat_table_parse(ACPI_CDAT_TYPE_DSLBIS, cdat_dslbis_handler,
> > > - dsmas_xa, port->cdat.table);
> > > + dsmas_xa, port->cdat.table, port->cdat.length);
> > > return cdat_table_parse_output(rc);
> > > }
> > >
> > > @@ -511,7 +511,7 @@ void cxl_switch_parse_cdat(struct cxl_port *port)
> > > return;
> > >
> > > rc = cdat_table_parse(ACPI_CDAT_TYPE_SSLBIS, cdat_sslbis_handler,
> > > - port, port->cdat.table);
> > > + port, port->cdat.table, port->cdat.length);
> > > rc = cdat_table_parse_output(rc);
> > > if (rc)
> > > dev_dbg(&port->dev, "Failed to parse SSLBIS: %d\n", rc);
> > > diff --git a/include/linux/fw_table.h b/include/linux/fw_table.h
> > > index 95421860397a..3ff4c277296f 100644
> > > --- a/include/linux/fw_table.h
> > > +++ b/include/linux/fw_table.h
> > > @@ -40,12 +40,14 @@ union acpi_subtable_headers {
> > >
> > > int acpi_parse_entries_array(char *id, unsigned long table_size,
> > > union fw_table_header *table_header,
> > > + unsigned long max_length,
> > > struct acpi_subtable_proc *proc,
> > > int proc_num, unsigned int max_entries);
> > >
> > > int cdat_table_parse(enum acpi_cdat_type type,
> > > acpi_tbl_entry_handler_arg handler_arg, void *arg,
> > > - struct acpi_table_cdat *table_header);
> > > + struct acpi_table_cdat *table_header,
> > > + unsigned long length);
> > >
> > > /* CXL is the only non-ACPI consumer of the FIRMWARE_TABLE library */
> > > #if IS_ENABLED(CONFIG_ACPI) && !IS_ENABLED(CONFIG_CXL_BUS)
> > > diff --git a/lib/fw_table.c b/lib/fw_table.c
> > > index 1e5e0b2f7012..ddb67853b7ac 100644
> > > --- a/lib/fw_table.c
> > > +++ b/lib/fw_table.c
> > > @@ -132,6 +132,7 @@ static __init_or_fwtbl_lib int call_handler(struct acpi_subtable_proc *proc,
> > > *
> > > * @id: table id (for debugging purposes)
> > > * @table_size: size of the root table
> > > + * @max_length: maximum size of the table (ignore if 0)
> > > * @table_header: where does the table start?
> > > * @proc: array of acpi_subtable_proc struct containing entry id
> > > * and associated handler with it
> > > @@ -153,10 +154,11 @@ static __init_or_fwtbl_lib int call_handler(struct acpi_subtable_proc *proc,
> > > int __init_or_fwtbl_lib
> > > acpi_parse_entries_array(char *id, unsigned long table_size,
> > > union fw_table_header *table_header,
> > > + unsigned long max_length,
> > > struct acpi_subtable_proc *proc,
> > > int proc_num, unsigned int max_entries)
> > > {
> > > - unsigned long table_end, subtable_len, entry_len;
> > > + unsigned long table_len, table_end, subtable_len, entry_len;
> > > struct acpi_subtable_entry entry;
> > > enum acpi_subtable_type type;
> > > int count = 0;
> > > @@ -164,8 +166,10 @@ acpi_parse_entries_array(char *id, unsigned long table_size,
> > > int i;
> > >
> > > type = acpi_get_subtable_type(id);
> > > - table_end = (unsigned long)table_header +
> > > - acpi_table_get_length(type, table_header);
> > > + table_len = acpi_table_get_length(type, table_header);
> > > + if (max_length && max_length < table_len)
> > > + table_len = max_length;
> > > + table_end = (unsigned long)table_header + table_len;
> > >
> > > /* Parse all entries looking for a match. */
> > >
> > > @@ -220,7 +224,8 @@ int __init_or_fwtbl_lib
> > > cdat_table_parse(enum acpi_cdat_type type,
> > > acpi_tbl_entry_handler_arg handler_arg,
> > > void *arg,
> > > - struct acpi_table_cdat *table_header)
> > > + struct acpi_table_cdat *table_header,
> > > + unsigned long length)
> > > {
> > > struct acpi_subtable_proc proc = {
> > > .id = type,
> > > @@ -234,6 +239,6 @@ cdat_table_parse(enum acpi_cdat_type type,
> > > return acpi_parse_entries_array(ACPI_SIG_CDAT,
> > > sizeof(struct acpi_table_cdat),
> > > (union fw_table_header *)table_header,
> > > - &proc, 1, 0);
> > > + length, &proc, 1, 0);
> > > }
> > > EXPORT_SYMBOL_FWTBL_LIB(cdat_table_parse);
> >
prev parent reply other threads:[~2024-02-14 12:36 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20240108114833.241710-1-rrichter@amd.com>
2024-01-08 11:48 ` [PATCH v2 3/3] lib/firmware_table: Provide buffer length argument to cdat_table_parse() Robert Richter
2024-01-19 0:32 ` Dan Williams
2024-01-19 18:18 ` Dave Jiang
2024-01-26 16:46 ` Jonathan Cameron
2024-02-09 11:23 ` Robert Richter
2024-02-14 12:36 ` Jonathan Cameron [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20240214123618.00001dd6@Huawei.com \
--to=jonathan.cameron@huawei.com \
--cc=akpm@linux-foundation.org \
--cc=alison.schofield@intel.com \
--cc=dan.j.williams@intel.com \
--cc=dave.jiang@intel.com \
--cc=dave@stgolabs.net \
--cc=ira.weiny@intel.com \
--cc=lenb@kernel.org \
--cc=linux-acpi@vger.kernel.org \
--cc=linux-cxl@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=rafael@kernel.org \
--cc=rrichter@amd.com \
--cc=vishal.l.verma@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox