Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1318727pxb; Wed, 2 Feb 2022 02:04:42 -0800 (PST) X-Google-Smtp-Source: ABdhPJwDvld4Q2LWPePTIBDPJuf0V8p46008YD4xPBWomrMdetonZXc5WDnaJWumYJtxQ0H3qxFj X-Received: by 2002:a63:3e8b:: with SMTP id l133mr23622440pga.210.1643796281948; Wed, 02 Feb 2022 02:04:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643796281; cv=none; d=google.com; s=arc-20160816; b=zuwqLD+RfqQQ/W0yBgoR2kledjtJRDfyWtX9pxhBZNZMop3TiREpfapVshfWsBAfuM ffQ8lRC9n8w2Buxnncl/BmQlKfqcrs3hgK0lMBkJxy1hq6Q709GCZcLJIy06ItLQTwDz eT1CzdBnXmV8ZrAvdPDS/7pJg38+cdtVD1+ZIxbcb96mO6wH1xCId95mqfogxplbZqQ0 dEHHuDx/7zSw7fSmrYLqop0gLXHG1xkIKSUO8zgVwT9vXPs9p39i7Ulm2PGIWX9b09dB ydY7kt2vwtXxa2sa1SRn4vNNEeTInFmJ9g50X20xhaN9RDrObq7H2wc3aTsro1FbJaCd qf8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Um6lCOWtZaLIeca1fPu2BjVtE2jJU19GMyT+KwRItL4=; b=wVc2OtANM6Ex09gcu4dsBUMg4PHVoO04kkntFszEfx84VV/rBf9fv+3Wq4utu3M4BH zYSfBAds5RCZYXVPPwPBa41Z02E8y69Z0B2iFZPMc/ecA9TSEWnPABk2aFUoqBs84xW5 qYJng8bKI16LIwQ/aPNtIFYl0MJGpOrIq8HQ6Hh7Bq28YGgaZhT8jI9vTSReLp+pOhZB N6MIiWlGsnSWFU3EF1M9fT54dqSOx1+d5XArEO9FKpCiRrWBKSRgMZKCWGUsHYL5ugh6 Jkunnm1EtH1/TNGNFDmC53O+2b7ow62zS13vFIiQqmQiw/SjPZFYcPVj2SnVj6nxOuGp e80A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GiDZQ0rL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 17si17531638plj.166.2022.02.02.02.04.26; Wed, 02 Feb 2022 02:04:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GiDZQ0rL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234917AbiBAHUW (ORCPT + 99 others); Tue, 1 Feb 2022 02:20:22 -0500 Received: from mga02.intel.com ([134.134.136.20]:44741 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234705AbiBAHUA (ORCPT ); Tue, 1 Feb 2022 02:20:00 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643700000; x=1675236000; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=PIFprQDV/7wNt+97cwXUz2TwP51ABrHXS1+ONa0OOb4=; b=GiDZQ0rLdbKwpSWqT5dDpChqKTVGRr1TFJVAuvpT+WrMGYGACTrMw75S Em58gpc1w4b/DFxtCDkf37rRaBvBeiSABasTauPeDHXfyeTmHI7Y6w5L0 czQjj+/xqYddzQpWekA9emPxhRnvdwEF3iVZoWB7nqciCIW4tdZHmcHwe pKw7yNS0UFy81P4tJnP7+fRUYutMU9EeKZH4/6minabqY6VQF9Bt67g7+ tUpnr1f/HLdMrQx2RxnufZ48rTnhPhaFX2LU4lFKCfXQ0lVWTpMjRtrbF CsQJylFkTUSc7/7r0VuRKQKzHVgfH+N543vwB/xIoLuSLRcJSz6HbaMrD g==; X-IronPort-AV: E=McAfee;i="6200,9189,10244"; a="235028377" X-IronPort-AV: E=Sophos;i="5.88,333,1635231600"; d="scan'208";a="235028377" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Jan 2022 23:19:59 -0800 X-IronPort-AV: E=Sophos;i="5.88,333,1635231600"; d="scan'208";a="676000465" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by fmsmga001-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Jan 2022 23:19:59 -0800 From: ira.weiny@intel.com To: Dan Williams , Jonathan Cameron , Bjorn Helgaas Cc: Alison Schofield , Vishal Verma , Ira Weiny , Ben Widawsky , linux-kernel@vger.kernel.org, linux-cxl@vger.kernel.org, linux-pci@vger.kernel.org Subject: [PATCH V6 08/10] cxl/cdat: Introduce cdat_hdr_valid() Date: Mon, 31 Jan 2022 23:19:50 -0800 Message-Id: <20220201071952.900068-9-ira.weiny@intel.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20220201071952.900068-1-ira.weiny@intel.com> References: <20220201071952.900068-1-ira.weiny@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ira Weiny The CDAT data is protected by a checksum which should be checked when the CDAT is read to ensure it is valid. In addition the lengths specified should be checked. Introduce cdat_hdr_valid() to check the checksum. While at it check and store the sequence number. Signed-off-by: Ira Weiny --- Changes from V5 New patch, split out Update cdat_hdr_valid() Remove revision and cs field parsing There is no point in these Add seq check and debug print. --- drivers/cxl/cdat.h | 2 ++ drivers/cxl/pci.c | 32 ++++++++++++++++++++++++++++++++ 2 files changed, 34 insertions(+) diff --git a/drivers/cxl/cdat.h b/drivers/cxl/cdat.h index 4722b6bbbaf0..a7725d26f2d2 100644 --- a/drivers/cxl/cdat.h +++ b/drivers/cxl/cdat.h @@ -88,10 +88,12 @@ * * @table: cache of CDAT table * @length: length of cached CDAT table + * @seq: Last read Sequence number of the CDAT table */ struct cxl_cdat { void *table; size_t length; + u32 seq; }; #endif /* !__CXL_CDAT_H__ */ diff --git a/drivers/cxl/pci.c b/drivers/cxl/pci.c index 28b973a9e29e..c362c75feed2 100644 --- a/drivers/cxl/pci.c +++ b/drivers/cxl/pci.c @@ -586,6 +586,35 @@ static int cxl_setup_doe_devices(struct cxl_dev_state *cxlds) return 0; } +static bool cxl_cdat_hdr_valid(struct device *dev, struct cxl_cdat *cdat) +{ + u32 *table = cdat->table; + u8 *data8 = cdat->table; + u32 length, seq; + u8 check; + int i; + + length = FIELD_GET(CDAT_HEADER_DW0_LENGTH, table[0]); + if (length < CDAT_HEADER_LENGTH_BYTES) + return false; + + if (length > cdat->length) + return false; + + seq = FIELD_GET(CDAT_HEADER_DW3_SEQUENCE, table[3]); + + /* Store the sequence for now. */ + if (cdat->seq != seq) { + dev_info(dev, "CDAT seq change %x -> %x\n", cdat->seq, seq); + cdat->seq = seq; + } + + for (check = 0, i = 0; i < length; i++) + check += data8[i]; + + return check == 0; +} + #define CDAT_DOE_REQ(entry_handle) \ (FIELD_PREP(CXL_DOE_TABLE_ACCESS_REQ_CODE, \ CXL_DOE_TABLE_ACCESS_REQ_CODE_READ) | \ @@ -658,6 +687,9 @@ static int cxl_cdat_read_table(struct cxl_dev_state *cxlds, } while (entry_handle != 0xFFFF); + if (!cxl_cdat_hdr_valid(cxlds->dev, cdat)) + return -EIO; + return 0; } -- 2.31.1