lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 9 May 2017 14:14:23 +0800 From: Lv Zheng <lv.zheng@...el.com> To: "Rafael J . Wysocki" <rafael.j.wysocki@...el.com>, "Rafael J . Wysocki" <rjw@...ysocki.net>, Len Brown <len.brown@...el.com> Cc: Lv Zheng <lv.zheng@...el.com>, Lv Zheng <zetalog@...il.com>, linux-kernel@...r.kernel.org, linux-acpi@...r.kernel.org, Dan Williams <dan.j.williams@...el.com> Subject: [UPDATE PATCH v4 2/4] ACPICA: Tables: Add mechanism to allow to balance late stage acpi_get_table() independently (update due to a max validation count leaked from a testing patch) For all frequent late stage acpi_get_table() clone invocations, we should only change them altogether, otherwise, excessive acpi_put_table() could unexpectedly unmap the table used by the other users. Thus the current plan is to change all acpi_get_table() clones together or to change none of them. However in practical, this is not convenient as this can prevent kernel developers' efforts of improving the late stage code quality before waiting for the ACPICA upstream to improve first. This patch adds a validation count threashold, when it is reached, the validation count can no longer be incremented/decremented to invalidate the table descriptor (means preventing table unmappings) so that acpi_put_table() balance changes can be done independently to each others. Lv Zheng. Cc: Dan Williams <dan.j.williams@...el.com> Signed-off-by: Lv Zheng <lv.zheng@...el.com> --- drivers/acpi/acpica/tbutils.c | 24 +++++++++++++++--------- include/acpi/actbl.h | 9 +++++++++ 2 files changed, 24 insertions(+), 9 deletions(-) Index: linux-acpica/drivers/acpi/acpica/tbutils.c =================================================================== --- linux-acpica.orig/drivers/acpi/acpica/tbutils.c +++ linux-acpica/drivers/acpi/acpica/tbutils.c @@ -416,9 +416,13 @@ acpi_tb_get_table(struct acpi_table_desc } } - table_desc->validation_count++; - if (table_desc->validation_count == 0) { - table_desc->validation_count--; + if (table_desc->validation_count < ACPI_MAX_TABLE_VALIDATIONS) { + table_desc->validation_count++; + if (table_desc->validation_count >= ACPI_MAX_TABLE_VALIDATIONS) { + ACPI_WARNING((AE_INFO, + "Table %p, Validation count overflows\n", + table_desc)); + } } *out_table = table_desc->pointer; @@ -445,13 +449,15 @@ void acpi_tb_put_table(struct acpi_table ACPI_FUNCTION_TRACE(acpi_tb_put_table); - if (table_desc->validation_count == 0) { - ACPI_WARNING((AE_INFO, - "Table %p, Validation count is zero before decrement\n", - table_desc)); - return_VOID; + if (table_desc->validation_count < ACPI_MAX_TABLE_VALIDATIONS) { + table_desc->validation_count--; + if (table_desc->validation_count >= ACPI_MAX_TABLE_VALIDATIONS) { + ACPI_WARNING((AE_INFO, + "Table %p, Validation count underflows\n", + table_desc)); + return_VOID; + } } - table_desc->validation_count--; if (table_desc->validation_count == 0) { Index: linux-acpica/include/acpi/actbl.h =================================================================== --- linux-acpica.orig/include/acpi/actbl.h +++ linux-acpica/include/acpi/actbl.h @@ -374,6 +374,15 @@ struct acpi_table_desc { u16 validation_count; }; +/* + * Maximum validation count, when it is reached, validation count can no + * longer be changed. Which means, the table can no longer be invalidated. + * This mechanism is implemented for backward compatibility, where in OS + * late stage, old drivers are not facilitated with paired validations and + * invalidations. + */ +#define ACPI_MAX_TABLE_VALIDATIONS ACPI_UINT16_MAX + /* Masks for Flags field above */ #define ACPI_TABLE_ORIGIN_EXTERNAL_VIRTUAL (0) /* Virtual address, external maintained */
Powered by blists - more mailing lists