Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2982359pxj; Mon, 17 May 2021 14:50:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyP6DaAeXEF3SvhxTiF3AZQdSC/SEClWlK+dtRS4NSdGzeTeKye/AD9rQXuEIXqX5SWCURi X-Received: by 2002:a05:6e02:c3:: with SMTP id r3mr1462385ilq.280.1621288213052; Mon, 17 May 2021 14:50:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621288213; cv=none; d=google.com; s=arc-20160816; b=Jl+Cx/G5za7qjyvJNp/6Gtea45ShsMlpkPNzV2OotPLOfVYO/m+7dYOQjTJRUrp0Pz 9Mtky977mMSZ6u3vnSIXuH1wQ46M6YJgOHa4z/XoLWSKPjqodbh1gn0ZXhSv8hnZgq+j vSqVCSgr+PT57cq7DBtEriCqbnRJLa8rxIxIMFmm1nTkDjYZuYC7W/oexEcW6hEz9sQ6 kDGlYR1vv6JqOb5dTRo7IXSP4W92+sftcsS3Dy2l1jTKj0lz/1+gPpIcYo132YC8yLcS avexQ12tDxg7WItz2BdkgDZJJ0A5EJks0yOL5nknUy41rHhvet3AeyOJWCsChw7pX5U6 AaUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0t7T+EHEBsBHIzwatWwbZfJ6VbDzy9dl2Trn2zgtHXo=; b=s7SwqN7dzLehaCVozS54qlzrnYMhLluDnVzIIAb5vyKGo353UMpSjpnfNodbvfo7+7 gsl5eC8ZWUM2SlQcKfBj6C83n1ry2srjf/debGm0tRy7laIGWfZoFVpEO0zfQhycX3vT 5iXR/fPdLXR+FG4FkVGwUQHSDvRx9/yerNJ43d1vKbtlovLw2Wa2hv56+5E3FRkCqQY7 MTCIRvxETZNOo17aRfbRfop/Qq+4WgrTcYH7uRDQM8Ar9+iLdboajFZo94GXjdzUbsWd WLFfhP9J3xm1xuxco5Kq/vYghin2PO8wkmDG3cz55rdi86nfruYNxyCIjqZIGSTkT4Lb slOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fAmN0toO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 16si18533774ilt.35.2021.05.17.14.50.00; Mon, 17 May 2021 14:50:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fAmN0toO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238114AbhEQOMB (ORCPT + 99 others); Mon, 17 May 2021 10:12:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:59850 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237599AbhEQOJn (ORCPT ); Mon, 17 May 2021 10:09:43 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 450C76135B; Mon, 17 May 2021 14:07:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621260424; bh=Qb7qsexp+qXICa53WC80jdJIlYDjhRT3QoI9Uv6i9Nc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fAmN0toOCCD5hwRk2h8YEFRlqpPQA61H59XDqq4W/wgNj+Jfc/GIyqZNpYrdWMOll lSSuCioQHfXAb8wa8ISC936jOdoa3xD8rYtJGsfOYcalfXaqhtUsH7pN5HnZbOireS B+BVWhwZgtGywlYC00yAFF4KAKkkLf5aEExWKHh8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johannes Berg , Luca Coelho , Sasha Levin Subject: [PATCH 5.12 076/363] iwlwifi: pcie: make cfg vs. trans_cfg more robust Date: Mon, 17 May 2021 15:59:02 +0200 Message-Id: <20210517140305.155903634@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210517140302.508966430@linuxfoundation.org> References: <20210517140302.508966430@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johannes Berg [ Upstream commit 48a5494d6a4cb5812f0640d9515f1876ffc7a013 ] If we (for example) have a trans_cfg entry in the PCI IDs table, but then don't find a full cfg entry for it in the info table, we fall through to the code that treats the PCI ID table entry as a full cfg entry. This obviously causes crashes later, e.g. when trying to build the firmware name string. Avoid such crashes by using the low bit of the pointer as a tag for trans_cfg entries (automatically using a macro that checks the type when assigning) and then checking that before trying to use the data as a full entry - if it's just a partial entry at that point, fail. Since we're adding some macro magic, also check that the type is in fact either struct iwl_cfg_trans_params or struct iwl_cfg, failing compilation ("initializer element is not constant") if it isn't. Signed-off-by: Johannes Berg Signed-off-by: Luca Coelho Link: https://lore.kernel.org/r/iwlwifi.20210330162204.6f69fe6e4128.I921d4ae20ef5276716baeeeda0b001cf25b9b968@changeid Signed-off-by: Luca Coelho Signed-off-by: Sasha Levin --- drivers/net/wireless/intel/iwlwifi/pcie/drv.c | 35 +++++++++++++++---- 1 file changed, 28 insertions(+), 7 deletions(-) diff --git a/drivers/net/wireless/intel/iwlwifi/pcie/drv.c b/drivers/net/wireless/intel/iwlwifi/pcie/drv.c index 558a0b2ef0fc..6f4db04ead4a 100644 --- a/drivers/net/wireless/intel/iwlwifi/pcie/drv.c +++ b/drivers/net/wireless/intel/iwlwifi/pcie/drv.c @@ -17,10 +17,20 @@ #include "iwl-prph.h" #include "internal.h" +#define TRANS_CFG_MARKER BIT(0) +#define _IS_A(cfg, _struct) __builtin_types_compatible_p(typeof(cfg), \ + struct _struct) +extern int _invalid_type; +#define _TRANS_CFG_MARKER(cfg) \ + (__builtin_choose_expr(_IS_A(cfg, iwl_cfg_trans_params), \ + TRANS_CFG_MARKER, \ + __builtin_choose_expr(_IS_A(cfg, iwl_cfg), 0, _invalid_type))) +#define _ASSIGN_CFG(cfg) (_TRANS_CFG_MARKER(cfg) + (kernel_ulong_t)&(cfg)) + #define IWL_PCI_DEVICE(dev, subdev, cfg) \ .vendor = PCI_VENDOR_ID_INTEL, .device = (dev), \ .subvendor = PCI_ANY_ID, .subdevice = (subdev), \ - .driver_data = (kernel_ulong_t)&(cfg) + .driver_data = _ASSIGN_CFG(cfg) /* Hardware specific file defines the PCI IDs table for that hardware module */ static const struct pci_device_id iwl_hw_card_ids[] = { @@ -1075,19 +1085,22 @@ static const struct iwl_dev_info iwl_dev_info_table[] = { static int iwl_pci_probe(struct pci_dev *pdev, const struct pci_device_id *ent) { - const struct iwl_cfg_trans_params *trans = - (struct iwl_cfg_trans_params *)(ent->driver_data); + const struct iwl_cfg_trans_params *trans; const struct iwl_cfg *cfg_7265d __maybe_unused = NULL; struct iwl_trans *iwl_trans; struct iwl_trans_pcie *trans_pcie; int i, ret; + const struct iwl_cfg *cfg; + + trans = (void *)(ent->driver_data & ~TRANS_CFG_MARKER); + /* * This is needed for backwards compatibility with the old * tables, so we don't need to change all the config structs * at the same time. The cfg is used to compare with the old * full cfg structs. */ - const struct iwl_cfg *cfg = (struct iwl_cfg *)(ent->driver_data); + cfg = (void *)(ent->driver_data & ~TRANS_CFG_MARKER); /* make sure trans is the first element in iwl_cfg */ BUILD_BUG_ON(offsetof(struct iwl_cfg, trans)); @@ -1202,11 +1215,19 @@ static int iwl_pci_probe(struct pci_dev *pdev, const struct pci_device_id *ent) #endif /* - * If we didn't set the cfg yet, assume the trans is actually - * a full cfg from the old tables. + * If we didn't set the cfg yet, the PCI ID table entry should have + * been a full config - if yes, use it, otherwise fail. */ - if (!iwl_trans->cfg) + if (!iwl_trans->cfg) { + if (ent->driver_data & TRANS_CFG_MARKER) { + pr_err("No config found for PCI dev %04x/%04x, rev=0x%x, rfid=0x%x\n", + pdev->device, pdev->subsystem_device, + iwl_trans->hw_rev, iwl_trans->hw_rf_id); + ret = -EINVAL; + goto out_free_trans; + } iwl_trans->cfg = cfg; + } /* if we don't have a name yet, copy name from the old cfg */ if (!iwl_trans->name) -- 2.30.2