Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp111330ybm; Tue, 26 May 2020 12:04:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzsoGk4fwCIiM7lD5viCcL6SM7LMUO4HsaEXWDw52f3WVv6+7aN84Li05pVgGBIXskbPB+B X-Received: by 2002:a17:906:3597:: with SMTP id o23mr2391547ejb.174.1590519852336; Tue, 26 May 2020 12:04:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590519852; cv=none; d=google.com; s=arc-20160816; b=gDR/IM2jhnX/iNd6v/K4qVu8WTGA1MR8gk+1ClHN0NwDiQy6C6CY1aQoN45HmVOrD5 OoGNvO+7y8ZMevFoSZLlYrv4CKJ84aDzxCVWbZ7kTNQyb7f1uuydh7gLx20MwTcv2dNK /rihnjcYlkpGD1tu4rbi9TU0EiHG0rpIkeEPPOMfKKWnVT8imrzSZ4J9/VZRkAYa65gG gWXrIypERGSrchnpOEe95peDZjpuYaB9GeAYMORciyuLf1qsPRK6NobOyh2hBvlALe/+ X4Cgm9eh/jEyoA3ayfCJFGrg6iu/CAfpZkIDjhHNL2snb2jnApRbbeOV9tSztNyW3P6A iHDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=AUMPsmFO3ptv+hDpDhvvM3CP6koO9B+j5m+SeHw5EE4=; b=LZ83sGlGbZPutzjrd59IbvhOlUsO9wNplye2s1wTk23NF4PTkwKVMTrMu5fX0VYOBo QebS5f97L5A6LsGDPST3BUckWCTxQ/h8QM50mzvRJSgmpJy/RDXm7cOYkBtMJl88GIvZ 4vtQpZky9Zfxt+VMCSam0ZIUxkHjVMWiky9kNBkNtZH6cEuh5vaW9rPZJ1ysUaYlzMYf UIA3+IsaUvxCFcPX1zAYhTfJT4HmqLfc6+kDiyd7CGIdgK8ryzWmedBjN/89d/0dsYzU ET/kMdXJ/4cWJV59/4ReYbi/44WgdaYmhBS3ukj2k+bC5FVOXWJXT/8KHk1AypaEaUjy 2TCw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="UOcPDtb/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q3si389951ejb.514.2020.05.26.12.03.48; Tue, 26 May 2020 12:04:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="UOcPDtb/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390430AbgEZS6y (ORCPT + 99 others); Tue, 26 May 2020 14:58:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:52476 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390421AbgEZS6x (ORCPT ); Tue, 26 May 2020 14:58:53 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3AED620849; Tue, 26 May 2020 18:58:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590519532; bh=SBO2CtJOq45C8dSvcgZYZQrfHJFowCVleqXEM/AknR0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UOcPDtb/Tg3xEezj0VM02Jg+l9ThNoUExBL4vDyiFDqjJPnxDz6IQtM10E6ijeQ7i UsOx6Dgt7sXuskF3sfVf4tIaqoBmAH/kaBfeEmgOQAFIioU2fXrlnFC0MDGQSw3N87 ZJVNDmoP4WVpdFjubNHIZr50PpnKN4PhG24w7eT0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexander Monakov , Joerg Roedel , iommu@lists.linux-foundation.org, Joerg Roedel , Sasha Levin Subject: [PATCH 4.9 09/64] iommu/amd: Fix over-read of ACPI UID from IVRS table Date: Tue, 26 May 2020 20:52:38 +0200 Message-Id: <20200526183917.314759956@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200526183913.064413230@linuxfoundation.org> References: <20200526183913.064413230@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexander Monakov [ Upstream commit e461b8c991b9202b007ea2059d953e264240b0c9 ] IVRS parsing code always tries to read 255 bytes from memory when retrieving ACPI device path, and makes an assumption that firmware provides a zero-terminated string. Both of those are bugs: the entry is likely to be shorter than 255 bytes, and zero-termination is not guaranteed. With Acer SF314-42 firmware these issues manifest visibly in dmesg: AMD-Vi: ivrs, add hid:AMDI0020, uid:\_SB.FUR0\xf0\xa5, rdevid:160 AMD-Vi: ivrs, add hid:AMDI0020, uid:\_SB.FUR1\xf0\xa5, rdevid:160 AMD-Vi: ivrs, add hid:AMDI0020, uid:\_SB.FUR2\xf0\xa5, rdevid:160 AMD-Vi: ivrs, add hid:AMDI0020, uid:\_SB.FUR3>\x83e\x8d\x9a\xd1... The first three lines show how the code over-reads adjacent table entries into the UID, and in the last line it even reads garbage data beyond the end of the IVRS table itself. Since each entry has the length of the UID (uidl member of ivhd_entry struct), use that for memcpy, and manually add a zero terminator. Avoid zero-filling hid and uid arrays up front, and instead ensure the uid array is always zero-terminated. No change needed for the hid array, as it was already properly zero-terminated. Fixes: 2a0cb4e2d423c ("iommu/amd: Add new map for storing IVHD dev entry type HID") Signed-off-by: Alexander Monakov Cc: Joerg Roedel Cc: iommu@lists.linux-foundation.org Link: https://lore.kernel.org/r/20200511102352.1831-1-amonakov@ispras.ru Signed-off-by: Joerg Roedel Signed-off-by: Sasha Levin --- drivers/iommu/amd_iommu_init.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/drivers/iommu/amd_iommu_init.c b/drivers/iommu/amd_iommu_init.c index e6ae8d123984..a3279f303b49 100644 --- a/drivers/iommu/amd_iommu_init.c +++ b/drivers/iommu/amd_iommu_init.c @@ -1171,8 +1171,8 @@ static int __init init_iommu_from_acpi(struct amd_iommu *iommu, } case IVHD_DEV_ACPI_HID: { u16 devid; - u8 hid[ACPIHID_HID_LEN] = {0}; - u8 uid[ACPIHID_UID_LEN] = {0}; + u8 hid[ACPIHID_HID_LEN]; + u8 uid[ACPIHID_UID_LEN]; int ret; if (h->type != 0x40) { @@ -1189,6 +1189,7 @@ static int __init init_iommu_from_acpi(struct amd_iommu *iommu, break; } + uid[0] = '\0'; switch (e->uidf) { case UID_NOT_PRESENT: @@ -1203,8 +1204,8 @@ static int __init init_iommu_from_acpi(struct amd_iommu *iommu, break; case UID_IS_CHARACTER: - memcpy(uid, (u8 *)(&e->uid), ACPIHID_UID_LEN - 1); - uid[ACPIHID_UID_LEN - 1] = '\0'; + memcpy(uid, &e->uid, e->uidl); + uid[e->uidl] = '\0'; break; default: -- 2.25.1