lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Sat, 31 Jul 2021 02:04:02 +0000
From:   "wangliang (C)" <wangliang101@...wei.com>
To:     Luis Chamberlain <mcgrof@...nel.org>
CC:     "palmerdabbelt@...gle.com" <palmerdabbelt@...gle.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "gregkh@...uxfoundation.org" <gregkh@...uxfoundation.org>,
        "linux@...linux.org.uk" <linux@...linux.org.uk>,
        "linux-arm-kernel@...ts.infradead.org" 
        <linux-arm-kernel@...ts.infradead.org>,
        "stable@...r.kernel.org" <stable@...r.kernel.org>,
        "Wangle (RTOS FAE)" <wangle6@...wei.com>,
        "Chenxin (RTOS)" <kepler.chenxin@...wei.com>,
        Nixiaoming <nixiaoming@...wei.com>,
        "Wangkefeng (OS Kernel Lab)" <wangkefeng.wang@...wei.com>
Subject: 答复: [PATCH v2] lib: Use PFN_PHYS() in devmem_is_allowed()

I'm glad to get the reply.
I found this problem not only with the arm, but also with the x86. Is it good to fixed both in only one patch? I found this problem in actual work. When CONFIG_STRICT_DEVMEM is enabled on the ARM and devmem is used to map a high address that is not in the iomem address range, an unexpected error indicating no permission is returned. Then i find the bug.

-----邮件原件-----
发件人: Luis Chamberlain [mailto:mcgrof@...radead.org] 代表 Luis Chamberlain
发送时间: 2021年7月31日 3:37
收件人: wangliang (C) <wangliang101@...wei.com>
抄送: palmerdabbelt@...gle.com; linux-kernel@...r.kernel.org; gregkh@...uxfoundation.org; linux@...linux.org.uk; linux-arm-kernel@...ts.infradead.org; stable@...r.kernel.org; Wangle (RTOS FAE) <wangle6@...wei.com>; Chenxin (RTOS) <kepler.chenxin@...wei.com>; Nixiaoming <nixiaoming@...wei.com>; Wangkefeng (OS Kernel Lab) <wangkefeng.wang@...wei.com>
主题: Re: [PATCH v2] lib: Use PFN_PHYS() in devmem_is_allowed()

On Fri, Jul 30, 2021 at 03:43:15PM +0800, Liang Wang wrote:
> The physical address may exceed 32 bits on ARM(when ARM_LPAE enabled), 
> use PFN_PHYS() in devmem_is_allowed(),

First off, good catch!

This should not be ARM specific, this should just say:

on 32-bit systems with more than 32 bits of physcial address

Also, towards then end then explain that in practice, yes, this is probably just ARM which is affected. By explaining this, it ensures folks are aware of the affected systems.

May be good to refer to commit 947d0496cf3e1 ("generic: make PFN_PHYS explicitly return phys_addr_t") which added the original PFN_PHYS() casting to phys_addr_t to resolve the same problem.

> or the physical address may overflow and be truncated.

Indeed. How did you find this issue? Can you describe that in the commit log? Was it a real world issue or did you do just code inspection? Or was there a bot which helped you?

> This bug was initially introduced from v2.6.37, and the function was 
> moved to lib when v5.11.
> 
> Fixes: 087aaffcdf9c ("ARM: implement CONFIG_STRICT_DEVMEM by disabling 
> access to RAM via /dev/mem")
> Fixes: 527701eda5f1 ("lib: Add a generic version of 
> devmem_is_allowed()")
> Cc: stable@...r.kernel.org # v2.6.37
> Signed-off-by: Liang Wang <wangliang101@...wei.com>

Other than that:

Reviewed-by: Luis Chamberlain <mcgrof@...nel.org>

  Luis

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ