lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20240214123618.00001dd6@Huawei.com>
Date: Wed, 14 Feb 2024 12:36:18 +0000
From: Jonathan Cameron <Jonathan.Cameron@...wei.com>
To: Robert Richter <rrichter@....com>
CC: Alison Schofield <alison.schofield@...el.com>, Vishal Verma
	<vishal.l.verma@...el.com>, Ira Weiny <ira.weiny@...el.com>, Dan Williams
	<dan.j.williams@...el.com>, Dave Jiang <dave.jiang@...el.com>, "Davidlohr
 Bueso" <dave@...olabs.net>, "Rafael J. Wysocki" <rafael@...nel.org>, Andrew
 Morton <akpm@...ux-foundation.org>, <linux-cxl@...r.kernel.org>,
	<linux-kernel@...r.kernel.org>, Len Brown <lenb@...nel.org>,
	<linux-acpi@...r.kernel.org>
Subject: Re: [PATCH v2 3/3] lib/firmware_table: Provide buffer length
 argument to cdat_table_parse()

On Fri, 9 Feb 2024 12:23:39 +0100
Robert Richter <rrichter@....com> wrote:

> On 26.01.24 16:46:03, Jonathan Cameron wrote:
> > On Mon, 8 Jan 2024 12:48:33 +0100
> > Robert Richter <rrichter@....com> wrote:
> >   
> > > The last entry in the CDAT table may not mark the end of the CDAT
> > > table buffer specified by the length field in the CDAT header. It can
> > > be shorter with trailing unused (zero'ed) data. The actual table
> > > length is determined when reading all CDAT entries of the table with
> > > DOE.  
> > 
> > Can you give some reasons why this would occur?  
> 
> I have seen card implementations where the CDAT table is some sort of
> fix buffer, but with entries filled in that do not fill the whole
> table length size. Which means that the last DOE ends earlier than the
> table end that then contains padding bytes. Spec is not entierly clear
> here. It could be interpreted as a spec violation, but DOE is the card
> vendor's firmware there is not much that can be done to fix that
> there...

We can fall back on the usual kernel developer nudge solution.
Print a rude message and hope their customers tell them to fix it ;)

> 
> > 
> > Need to be clear if this is:
> > 1) Hardening against device returning borked table.  
> 
> So this was the main motivation. It will be likely there are more
> cards with that issue.
> 
> > 2) Hardening against in flight update of CDAT racing with the readout
> >    (not sure table can change size, but maybe.. I haven't checked).  
> 
> That is a side effect I realized while implementing this patch. To
> prevent an out of bound buffer access, either the buffer needs a
> length argument or the length field in the header needs to be checked.
> The earlier is more reasonable and natural to me as no buffer insight
> is needed for that.
> 
> > 3) DW read back vs packed structures?  
> 
> Good point. But that was not the reason. IIR the PCI DOE code
> correctly, there is a DW access but only the missing bytes are written
> to the buffer. The CDAT structures are all DW aligned, but the DOE
> header isn't.

Yes. I hoped that was still working :)

> 
> > 
> > Patch seems reasonable to me, I'd just like a clear statement of why
> > it happens!  
> 
> So regardless of padding bytes or not, a length check is required in
> any case, one or the other way.
> 
> Will update the patch description.

Great.
> 
> Thanks,
> 
> -Robert
> 
> > 
> > Jonathan
> >   
> > > 
> > > If the table is greater than expected (containing zero'ed trailing
> > > data), the CDAT parser fails with:
> > > 
> > >  [   48.691717] Malformed DSMAS table length: (24:0)
> > >  [   48.702084] [CDAT:0x00] Invalid zero length
> > >  [   48.711460] cxl_port endpoint1: Failed to parse CDAT: -22
> > > 
> > > In addition, the table buffer size can be different from the size
> > > specified in the length field. This may cause out-of-bound access then
> > > parsing the CDAT table.
> > > 
> > > Fix that by providing an optonal buffer length argument to
> > > acpi_parse_entries_array() that can be used by cdat_table_parse() to
> > > propagate the buffer size down to its users.
> > > 
> > > Cc: "Rafael J. Wysocki" <rafael@...nel.org>
> > > Cc: Len Brown <lenb@...nel.org>
> > > Signed-off-by: Robert Richter <rrichter@....com>
> > > ---
> > >  drivers/acpi/tables.c    |  2 +-
> > >  drivers/cxl/core/cdat.c  |  6 +++---
> > >  include/linux/fw_table.h |  4 +++-
> > >  lib/fw_table.c           | 15 ++++++++++-----
> > >  4 files changed, 17 insertions(+), 10 deletions(-)
> > > 
> > > diff --git a/drivers/acpi/tables.c b/drivers/acpi/tables.c
> > > index b07f7d091d13..b976e5fc3fbc 100644
> > > --- a/drivers/acpi/tables.c
> > > +++ b/drivers/acpi/tables.c
> > > @@ -253,7 +253,7 @@ int __init_or_acpilib acpi_table_parse_entries_array(
> > >  
> > >  	count = acpi_parse_entries_array(id, table_size,
> > >  					 (union fw_table_header *)table_header,
> > > -					 proc, proc_num, max_entries);
> > > +					 0, proc, proc_num, max_entries);
> > >  
> > >  	acpi_put_table(table_header);
> > >  	return count;
> > > diff --git a/drivers/cxl/core/cdat.c b/drivers/cxl/core/cdat.c
> > > index 6fe11546889f..012d8f2a7945 100644
> > > --- a/drivers/cxl/core/cdat.c
> > > +++ b/drivers/cxl/core/cdat.c
> > > @@ -149,13 +149,13 @@ static int cxl_cdat_endpoint_process(struct cxl_port *port,
> > >  	int rc;
> > >  
> > >  	rc = cdat_table_parse(ACPI_CDAT_TYPE_DSMAS, cdat_dsmas_handler,
> > > -			      dsmas_xa, port->cdat.table);
> > > +			      dsmas_xa, port->cdat.table, port->cdat.length);
> > >  	rc = cdat_table_parse_output(rc);
> > >  	if (rc)
> > >  		return rc;
> > >  
> > >  	rc = cdat_table_parse(ACPI_CDAT_TYPE_DSLBIS, cdat_dslbis_handler,
> > > -			      dsmas_xa, port->cdat.table);
> > > +			      dsmas_xa, port->cdat.table, port->cdat.length);
> > >  	return cdat_table_parse_output(rc);
> > >  }
> > >  
> > > @@ -511,7 +511,7 @@ void cxl_switch_parse_cdat(struct cxl_port *port)
> > >  		return;
> > >  
> > >  	rc = cdat_table_parse(ACPI_CDAT_TYPE_SSLBIS, cdat_sslbis_handler,
> > > -			      port, port->cdat.table);
> > > +			      port, port->cdat.table, port->cdat.length);
> > >  	rc = cdat_table_parse_output(rc);
> > >  	if (rc)
> > >  		dev_dbg(&port->dev, "Failed to parse SSLBIS: %d\n", rc);
> > > diff --git a/include/linux/fw_table.h b/include/linux/fw_table.h
> > > index 95421860397a..3ff4c277296f 100644
> > > --- a/include/linux/fw_table.h
> > > +++ b/include/linux/fw_table.h
> > > @@ -40,12 +40,14 @@ union acpi_subtable_headers {
> > >  
> > >  int acpi_parse_entries_array(char *id, unsigned long table_size,
> > >  			     union fw_table_header *table_header,
> > > +			     unsigned long max_length,
> > >  			     struct acpi_subtable_proc *proc,
> > >  			     int proc_num, unsigned int max_entries);
> > >  
> > >  int cdat_table_parse(enum acpi_cdat_type type,
> > >  		     acpi_tbl_entry_handler_arg handler_arg, void *arg,
> > > -		     struct acpi_table_cdat *table_header);
> > > +		     struct acpi_table_cdat *table_header,
> > > +		     unsigned long length);
> > >  
> > >  /* CXL is the only non-ACPI consumer of the FIRMWARE_TABLE library */
> > >  #if IS_ENABLED(CONFIG_ACPI) && !IS_ENABLED(CONFIG_CXL_BUS)
> > > diff --git a/lib/fw_table.c b/lib/fw_table.c
> > > index 1e5e0b2f7012..ddb67853b7ac 100644
> > > --- a/lib/fw_table.c
> > > +++ b/lib/fw_table.c
> > > @@ -132,6 +132,7 @@ static __init_or_fwtbl_lib int call_handler(struct acpi_subtable_proc *proc,
> > >   *
> > >   * @id: table id (for debugging purposes)
> > >   * @table_size: size of the root table
> > > + * @max_length: maximum size of the table (ignore if 0)
> > >   * @table_header: where does the table start?
> > >   * @proc: array of acpi_subtable_proc struct containing entry id
> > >   *        and associated handler with it
> > > @@ -153,10 +154,11 @@ static __init_or_fwtbl_lib int call_handler(struct acpi_subtable_proc *proc,
> > >  int __init_or_fwtbl_lib
> > >  acpi_parse_entries_array(char *id, unsigned long table_size,
> > >  			 union fw_table_header *table_header,
> > > +			 unsigned long max_length,
> > >  			 struct acpi_subtable_proc *proc,
> > >  			 int proc_num, unsigned int max_entries)
> > >  {
> > > -	unsigned long table_end, subtable_len, entry_len;
> > > +	unsigned long table_len, table_end, subtable_len, entry_len;
> > >  	struct acpi_subtable_entry entry;
> > >  	enum acpi_subtable_type type;
> > >  	int count = 0;
> > > @@ -164,8 +166,10 @@ acpi_parse_entries_array(char *id, unsigned long table_size,
> > >  	int i;
> > >  
> > >  	type = acpi_get_subtable_type(id);
> > > -	table_end = (unsigned long)table_header +
> > > -		    acpi_table_get_length(type, table_header);
> > > +	table_len = acpi_table_get_length(type, table_header);
> > > +	if (max_length && max_length < table_len)
> > > +		table_len = max_length;
> > > +	table_end = (unsigned long)table_header + table_len;
> > >  
> > >  	/* Parse all entries looking for a match. */
> > >  
> > > @@ -220,7 +224,8 @@ int __init_or_fwtbl_lib
> > >  cdat_table_parse(enum acpi_cdat_type type,
> > >  		 acpi_tbl_entry_handler_arg handler_arg,
> > >  		 void *arg,
> > > -		 struct acpi_table_cdat *table_header)
> > > +		 struct acpi_table_cdat *table_header,
> > > +		 unsigned long length)
> > >  {
> > >  	struct acpi_subtable_proc proc = {
> > >  		.id		= type,
> > > @@ -234,6 +239,6 @@ cdat_table_parse(enum acpi_cdat_type type,
> > >  	return acpi_parse_entries_array(ACPI_SIG_CDAT,
> > >  					sizeof(struct acpi_table_cdat),
> > >  					(union fw_table_header *)table_header,
> > > -					&proc, 1, 0);
> > > +					length, &proc, 1, 0);
> > >  }
> > >  EXPORT_SYMBOL_FWTBL_LIB(cdat_table_parse);  
> >   


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ