[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250826164331.1372856-1-darcari@redhat.com>
Date: Tue, 26 Aug 2025 12:43:28 -0400
From: David Arcari <darcari@...hat.com>
To: platform-driver-x86@...r.kernel.org
Cc: David Arcari <darcari@...hat.com>,
Hans de Goede <hansg@...nel.org>,
Ilpo Järvinen <ilpo.jarvinen@...ux.intel.com>,
Srinivas Pandruvada <srinivas.pandruvada@...ux.intel.com>,
Peter Zijlstra <peterz@...radead.org>,
Ingo Molnar <mingo@...nel.org>,
Dan Carpenter <dan.carpenter@...aro.org>,
Andy Shevchenko <andriy.shevchenko@...ux.intel.com>,
Tero Kristo <tero.kristo@...ux.intel.com>,
linux-kernel@...r.kernel.org
Subject: [PATCH] platform/x86/intel: power-domains validate domain in tpmi_cpu_online()
Although tpmi_get_power_domain_mask() calls tpmi_domain_is_valid()
prior to indexing tpmi_power_domain_mask[], tpmi_cpu_online() does
not. In the case where a VM creates non-contiguous package ids the
result can be memory corruption. This can be prevented by adding
the same validation in tpmi_cpu_online().
Fixes: 17ca2780458c ("platform/x86/intel: TPMI domain id and CPU mapping")
Cc: Hans de Goede <hansg@...nel.org>
Cc: "Ilpo Järvinen" <ilpo.jarvinen@...ux.intel.com>
Cc: Srinivas Pandruvada <srinivas.pandruvada@...ux.intel.com>
Cc: Peter Zijlstra <peterz@...radead.org>
Cc: Ingo Molnar <mingo@...nel.org>
Cc: Dan Carpenter <dan.carpenter@...aro.org>
Cc: David Arcari <darcari@...hat.com>
Cc: Andy Shevchenko <andriy.shevchenko@...ux.intel.com>
Cc: Tero Kristo <tero.kristo@...ux.intel.com>
Cc: linux-kernel@...r.kernel.org
Signed-off-by: David Arcari <darcari@...hat.com>
---
drivers/platform/x86/intel/tpmi_power_domains.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/drivers/platform/x86/intel/tpmi_power_domains.c b/drivers/platform/x86/intel/tpmi_power_domains.c
index 9d8247bb9cfa..ae5b58679e29 100644
--- a/drivers/platform/x86/intel/tpmi_power_domains.c
+++ b/drivers/platform/x86/intel/tpmi_power_domains.c
@@ -194,6 +194,9 @@ static int tpmi_cpu_online(unsigned int cpu)
if (ret)
return 0;
+ if (!tpmi_domain_is_valid(info))
+ return 0;
+
index = info->pkg_id * MAX_POWER_DOMAINS + info->punit_domain_id;
guard(mutex)(&tpmi_lock);
--
2.50.0
Powered by blists - more mailing lists