linux-pci.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Hannes Reinecke <hare@suse.com>
To: Bjorn Helgaas <helgaas@kernel.org>,
	Steve Wise <swise@opengridcomputing.com>
Cc: 'Casey Leedom' <leedom@chelsio.com>,
	linux-pci@vger.kernel.org, hariprasad@chelsio.com,
	bhelgaas@google.com
Subject: Re: 4.6-rc2 regression with commit 104daa71b396: check VPD access offset against length
Date: Tue, 12 Apr 2016 08:20:45 +0200	[thread overview]
Message-ID: <570C93BD.2030102@suse.com> (raw)
In-Reply-To: <20160412053700.GF11361@localhost>

On 04/12/2016 07:37 AM, Bjorn Helgaas wrote:
> On Mon, Apr 11, 2016 at 01:16:17PM -0500, Steve Wise wrote:
>>> kernel.org commit 104daa71b396 added a check to make sure that efforts to
>>> read/write the VPD wouldn't extend past the computed length of the VPD.
>>> Later, kernel.org commit 408641e93aa5 folded the pci_vpd_pci22 into
>>> struct pci_vpd so things moved around a bit after that and an error return
>>> got changed into a silent failure instead of -EINVAL.
>>>
>>>   The problem is that the previous pci_vpd_pci22_read() didn't check for a
>> read with
>>> a VPD Offset > VPD Length and the new pci_vpd_read() is checking that.  Worse
>>> yet, when a VPD Offset is greater than the recorded VPD Length, it simply
>>> returns 0 rather than -EINVAL.
>>>
>>>   The problem is stemming from the fact that the Chelsio adapters actually
>> have
>>> two VPD structures stored in the VPD.  An abbreviated on at Offset 0x0 and the
>>> complete VPD at Offset 0x400.  The abbreviated one only contains the PN, SN
>> and
>>> EC Keywords, while the complete VPD contains those plus various adapter
>>> constants contained in V0, V1, etc.  And it also contains the Base Ethernet
>> MAC
>>> Address in the "NA" Keyword which the cxgb4 driver needs when it can't contact
>>> the adapter firmware.  (We don't have the "NA" Keywork in the VPD Structure at
>>> Offset 0x0 because that's not an allowed VPD Keyword in the PCI-E 3.0
>>> specification.)
>>>
>>>   With the new code, the computed size of the VPD is 0x200 and so our efforts
>>> to read the VPD at Offset 0x400 silently fails.  We check the result of the
>>> read looking for a signature 0x82 byte but we're checking against random stack
>>> garbage.
>>>
>>>   The end result is that the cxgb4 driver now fails the PCI-E Probe.
>>>
>>
>> Silently failing is wrong, in my opinion.  And I even question truncating which
>> is also done in pci_vpd_read().  To the PCI maintainers:  Should the length
>> checks just be removed?    If not, what is the correct solution?  Adding a
>> different "expert" API that ignores the length checks, or somehow allowing the
>> device driver to set the actual VPD size? 
> 
> I think everybody would prefer if it the kernel could just read
> whatever VPD region the user requested, without parsing the data or
> checking for length (as long as we're within the 32K space allowed by
> the spec).
> 
> The problem is that some cards crash if you read too much:
> 
>   commit 104daa71b396
>   Author: Hannes Reinecke <hare@suse.de>
>   Date:   Mon Feb 15 09:42:01 2016 +0100
> 
>     PCI: Determine actual VPD size on first access
>     
>     PCI-2.2 VPD entries have a maximum size of 32k, but might actually be
>     smaller than that.  To figure out the actual size one has to read the VPD
>     area until the 'end marker' is reached.
>     
>     Per spec, reading outside of the VPD space is "not allowed."  In practice,
>     it may cause simple read errors or even crash the card.  To make matters
>     worse not every PCI card implements this properly, leaving us with no 'end'
>     marker or even completely invalid data.
>     
>     Try to determine the size of the VPD data when it's first accessed.  If no
>     valid data can be read an I/O error will be returned when reading or
>     writing the sysfs attribute.
> 
> So if you want to get rid of the length checks, you have to propose
> some other mechanism to avoid these issues.
> 
> The only ideas I have are to (1) parse the data as we do in
> 104daa71b396, (2) add quirks to prevent VPD access (as in
> 7c20078a8197 ("PCI: Prevent VPD access for buggy devices"), and/or (3)
> add quirks to allow access to more VPD than parsing says we can
> access.  These aren't mutually exclusive -- we already have (1) and
> (2), and I think we could easily add (3) into the mix.
> 
> (3) seems like a possible solution for Chelsio.  In that case, it's
> the driver that needs the data, so the driver could maintain a quirk.
> 
That's my suggestion, too.
The generic code should be handling things according to the standard.
If other drivers require a different handling we should be adding a
quirk for them.

Cheers,

Hannes
-- 
Dr. Hannes Reinecke		               zSeries & Storage
hare@suse.com			               +49 911 74053 688
SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nürnberg
GF: F. Imendörffer, J. Smithard, J. Guild, D. Upmanyu, G. Norton
HRB 21284 (AG Nürnberg)

  reply	other threads:[~2016-04-12  6:20 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-04-08 22:24 4.6-rc2 regression with commit 104daa71b396: check VPD access offset against length Casey Leedom
     [not found] ` <BY2PR12MB0648F0C35D907AA640D7E56CC8940@BY2PR12MB0648.namprd12.prod.outlook.com>
2016-04-11 18:16   ` Steve Wise
2016-04-12  5:37     ` Bjorn Helgaas
2016-04-12  6:20       ` Hannes Reinecke [this message]
2016-04-12  8:23         ` Hariprasad Shenai
2016-04-12  8:46           ` Hannes Reinecke
2016-04-12 17:35             ` Casey Leedom
2016-04-12 20:17               ` Casey Leedom
2016-04-12 21:52               ` Steve Wise
2016-04-13  6:00               ` Hannes Reinecke
2016-04-13 16:52                 ` Casey Leedom
  -- strict thread matches above, loose matches on Subject: below --
2016-04-08 21:58 Casey Leedom

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=570C93BD.2030102@suse.com \
    --to=hare@suse.com \
    --cc=bhelgaas@google.com \
    --cc=hariprasad@chelsio.com \
    --cc=helgaas@kernel.org \
    --cc=leedom@chelsio.com \
    --cc=linux-pci@vger.kernel.org \
    --cc=swise@opengridcomputing.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).