Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4571107imu; Tue, 29 Jan 2019 04:01:37 -0800 (PST) X-Google-Smtp-Source: ALg8bN4F/gBC4CBYtBpG/s4ipH5w+CR9YKLKpiyfcpqhuSizr1OIkH1uZZsdCy4TWkpThoLUM9vG X-Received: by 2002:a17:902:bd4a:: with SMTP id b10mr25860410plx.232.1548763297602; Tue, 29 Jan 2019 04:01:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548763297; cv=none; d=google.com; s=arc-20160816; b=ZquH372BB55UeKVLvrSJdGL5x9pbssxhKHLeuDfcP1X4Xc3i/TCfLHEYPDQkn/KcN/ 3Qiwu+rxwwDHXJfjrosCSEYsHdGfm36jT3adH5jJ1vGWhdcM1dTthSQklDaywo8kl5g/ 2nk7U0oxeCOGd0P2thuuOKtL6WdSGLsDj2fV/jvR1gyjgXVDTu30EJwM+/OK+h5DQSMM F1bOQzZcMqAaVT85xWUQmXcbXnI7f2Ij+KyM+wvLSQprtVoYzUeHTGzObq/HzcVKYSH2 tM2ZkkUWCahhirOGq3ye8rFBIqWX8t3bGOo/kYi1sIVnOC91GCDiGD+DVcSI0NbvYwys uZNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dAxChm9U63jVsmA5TAJ0Fh6/c7KXxuZlixDHF46G3V4=; b=yN5RLLpx20Ijb+6pb6tZoFnetWwadXthi/2UWnMzzolo6vijLXWLOHU/Nj4h6M0u9Q BdhDcmQzzIYDjzQgt+/Pjzxqnheozjx2N11hO4YRNMSka1OHNodqhT3yHEpThTz2LlQt oN4eCw4HE0EJp30QKmxiKhGhEt6+JmjfJ6wJtvIpD7UXhhi/lhAK7X36I/0GdinwRnmy L247bmrrTlGKoC+Jtsjb2nNStZL0Pmmv6fO27vllW1N9HgYjVhynrfWxuTksygeMGUJv C7+19XggNaAM1K4Qsfz1OCt+BXrAgJ8tlVtjMewLCJkJqumEMcq950xwWkL20nzDZC01 UFHQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NMtnbsSu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k14si2366454pll.346.2019.01.29.04.01.22; Tue, 29 Jan 2019 04:01:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NMtnbsSu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731047AbfA2L77 (ORCPT + 99 others); Tue, 29 Jan 2019 06:59:59 -0500 Received: from mail.kernel.org ([198.145.29.99]:37356 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731030AbfA2Lqn (ORCPT ); Tue, 29 Jan 2019 06:46:43 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B9E0F21874; Tue, 29 Jan 2019 11:46:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548762402; bh=utnu5/aMntglDNyM1I0ddjSSWrlLDsYTpCcTSxhLTeA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NMtnbsSukX5TvjDo94gLA3EzQSboD/VzE2LE/YnZmeSv3CeDYJaUp7u4kjKMpWhkX x33UIjl8L7l4CwDHDp2ddj1FPhDqKtmAvjNDFAewFwdIgd5u0F7GlYjhZCbIUlx2ud GT6QL4b2AOWhwwQHZEVcX5iIGYQXZYFoPGFEXyqw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sujith Pandel , Vishal Verma , Jeff Moyer , Dan Williams Subject: [PATCH 4.19 062/103] acpi/nfit: Fix command-supported detection Date: Tue, 29 Jan 2019 12:35:39 +0100 Message-Id: <20190129113204.390273315@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190129113159.567154026@linuxfoundation.org> References: <20190129113159.567154026@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dan Williams commit 11189c1089da413aa4b5fd6be4c4d47c78968819 upstream. The _DSM function number validation only happens to succeed when the generic Linux command number translation corresponds with a DSM-family-specific function number. This breaks NVDIMM-N implementations that correctly implement _LSR, _LSW, and _LSI, but do not happen to publish support for DSM function numbers 4, 5, and 6. Recall that the support for _LS{I,R,W} family of methods results in the DIMM being marked as supporting those command numbers at acpi_nfit_register_dimms() time. The DSM function mask is only used for ND_CMD_CALL support of non-NVDIMM_FAMILY_INTEL devices. Fixes: 31eca76ba2fc ("nfit, libnvdimm: limited/whitelisted dimm command...") Cc: Link: https://github.com/pmem/ndctl/issues/78 Reported-by: Sujith Pandel Tested-by: Sujith Pandel Reviewed-by: Vishal Verma Reviewed-by: Jeff Moyer Signed-off-by: Dan Williams Signed-off-by: Greg Kroah-Hartman --- drivers/acpi/nfit/core.c | 54 ++++++++++++++++++++++++++++++++++------------- 1 file changed, 40 insertions(+), 14 deletions(-) --- a/drivers/acpi/nfit/core.c +++ b/drivers/acpi/nfit/core.c @@ -391,6 +391,32 @@ static u8 nfit_dsm_revid(unsigned family return id; } +static int cmd_to_func(struct nfit_mem *nfit_mem, unsigned int cmd, + struct nd_cmd_pkg *call_pkg) +{ + if (call_pkg) { + int i; + + if (nfit_mem->family != call_pkg->nd_family) + return -ENOTTY; + + for (i = 0; i < ARRAY_SIZE(call_pkg->nd_reserved2); i++) + if (call_pkg->nd_reserved2[i]) + return -EINVAL; + return call_pkg->nd_command; + } + + /* Linux ND commands == NVDIMM_FAMILY_INTEL function numbers */ + if (nfit_mem->family == NVDIMM_FAMILY_INTEL) + return cmd; + + /* + * Force function number validation to fail since 0 is never + * published as a valid function in dsm_mask. + */ + return 0; +} + int acpi_nfit_ctl(struct nvdimm_bus_descriptor *nd_desc, struct nvdimm *nvdimm, unsigned int cmd, void *buf, unsigned int buf_len, int *cmd_rc) { @@ -404,30 +430,23 @@ int acpi_nfit_ctl(struct nvdimm_bus_desc unsigned long cmd_mask, dsm_mask; u32 offset, fw_status = 0; acpi_handle handle; - unsigned int func; const guid_t *guid; - int rc, i; + int func, rc, i; if (cmd_rc) *cmd_rc = -EINVAL; - func = cmd; - if (cmd == ND_CMD_CALL) { - call_pkg = buf; - func = call_pkg->nd_command; - - for (i = 0; i < ARRAY_SIZE(call_pkg->nd_reserved2); i++) - if (call_pkg->nd_reserved2[i]) - return -EINVAL; - } if (nvdimm) { struct acpi_device *adev = nfit_mem->adev; if (!adev) return -ENOTTY; - if (call_pkg && nfit_mem->family != call_pkg->nd_family) - return -ENOTTY; + if (cmd == ND_CMD_CALL) + call_pkg = buf; + func = cmd_to_func(nfit_mem, cmd, call_pkg); + if (func < 0) + return func; dimm_name = nvdimm_name(nvdimm); cmd_name = nvdimm_cmd_name(cmd); cmd_mask = nvdimm_cmd_mask(nvdimm); @@ -438,6 +457,7 @@ int acpi_nfit_ctl(struct nvdimm_bus_desc } else { struct acpi_device *adev = to_acpi_dev(acpi_desc); + func = cmd; cmd_name = nvdimm_bus_cmd_name(cmd); cmd_mask = nd_desc->cmd_mask; dsm_mask = cmd_mask; @@ -452,7 +472,13 @@ int acpi_nfit_ctl(struct nvdimm_bus_desc if (!desc || (cmd && (desc->out_num + desc->in_num == 0))) return -ENOTTY; - if (!test_bit(cmd, &cmd_mask) || !test_bit(func, &dsm_mask)) + /* + * Check for a valid command. For ND_CMD_CALL, we also have to + * make sure that the DSM function is supported. + */ + if (cmd == ND_CMD_CALL && !test_bit(func, &dsm_mask)) + return -ENOTTY; + else if (!test_bit(cmd, &cmd_mask)) return -ENOTTY; in_obj.type = ACPI_TYPE_PACKAGE;