Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp4338732rdb; Mon, 11 Dec 2023 16:56:18 -0800 (PST) X-Google-Smtp-Source: AGHT+IEFHk+s87Mgzuq6ymI/rmBV1E7XU0J7IayjniIWPKJ6s18O+oZTFkUkWfZaU7UFrRHWA1j+ X-Received: by 2002:a9d:7f14:0:b0:6d9:e37f:5c44 with SMTP id j20-20020a9d7f14000000b006d9e37f5c44mr5227289otq.57.1702342578544; Mon, 11 Dec 2023 16:56:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702342578; cv=none; d=google.com; s=arc-20160816; b=u82QIKVT/jWzBs/L9CRGNRFU16xswEyyCJkaTNOUws3vrv/uI2YqM7Nv5SBJo1UD1t yKmz522/ye6WvA2/7BPSx4Qi0yrTrChYozgvimSJil5gLuk3pr8r75zetv4AoGWxtkQK hoMFLjjtdZeILt1UO4/Vfb13S4ziT9AHYc2sqnPkk+PBPR70eVZY/I8lwE457VPdZ+77 WIws9rzXOT3oBayYxsDRm5VxewxaCFerSr2m59isgEnmoRRty+eJ45f05AmQu51VJZ3R mrAu8K+MRXQTE0j/M+oq8jNTbyHLu/R8Y0M0ygVH0D4cUvty3J03F2XtuYTi00GRm6Ne kZGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=AS84DpIlnHadbg548UoBHWDlxNfb0zaNqIcRTC+jUtI=; fh=T1KrKhWWyE62TtphBCaXzFyyJbcFwutnKT6UL/OOXx0=; b=A2OljhvhHMIilZl7RxS+Gwk8wq/w6Cor2iQgLDrkZSqCZmEdwSdIWft7xwev9i7BkV n6uOfXZvm6AjYFj8/Q4Qn6dxlfQ9L3ddz9Acb7NyAkMXt5koR0o1FuJxdU1K8GSZA8tn H2DEENWElMRgpwvQjXaO8+GhKDnn+MUePn8vYN6TzwkPA97aetqNBtWXjQgwtXNJENYQ xpzYUWFR+E2ECjE7mGmwAdmDusSRgpjgSUHVcMRQjLjPTi/WaYb9/8mBXE+bK9k/Oju/ 5QY7uWCrIm/EkXvaWxGl/x2az3lIZ0q7SfUwIWbvie/ogLxTHtlgvLt2XYDvC9LZNKsT AK9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=YlSdnOyX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id f20-20020a631014000000b005c2185da898si6601151pgl.832.2023.12.11.16.56.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 16:56:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=YlSdnOyX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 10E18805D5A5; Mon, 11 Dec 2023 16:56:15 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345595AbjLLA4B (ORCPT + 99 others); Mon, 11 Dec 2023 19:56:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345586AbjLLA4A (ORCPT ); Mon, 11 Dec 2023 19:56:00 -0500 Received: from mail-pf1-x433.google.com (mail-pf1-x433.google.com [IPv6:2607:f8b0:4864:20::433]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4BA0EA6 for ; Mon, 11 Dec 2023 16:56:04 -0800 (PST) Received: by mail-pf1-x433.google.com with SMTP id d2e1a72fcca58-6d089e8b1b2so1013686b3a.3 for ; Mon, 11 Dec 2023 16:56:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1702342564; x=1702947364; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=AS84DpIlnHadbg548UoBHWDlxNfb0zaNqIcRTC+jUtI=; b=YlSdnOyXMByLaQfNmdthP4sQNIx0oUxERCQngpCzx5282Q831WiOtJmQ0Tr4C5SW4w zRKv57i6UUBpWW/PpeZUuD80IbC+LQaxc/cMkJ0f5NQtLyMvejDtH1dmIlrOo9Lk+a8y aV0ymxy0PYGce8pBu0OvaXrTlJF8ilOZNxsMI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702342564; x=1702947364; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=AS84DpIlnHadbg548UoBHWDlxNfb0zaNqIcRTC+jUtI=; b=beTuSs9MkEdM5Iccf7cRdXzFMGd+Q/MlifgsjtKtzBqeqlIdqxExj4k24giAyFDWCH xmYq8045xigNH/pz7HE9WBBctQEhEkadYk/qeWmqOzyQ0L8d0yfLm95t168Uk89beZLt JItaQWVPnhqhY01m6JNfXcxTyAlgZL0Q/dM39VFH8c4PkJzrRli/Tq+X9YlUIHx4DqvK 9fpOlnB9TeKs/nZY+OaMSXHWWhfKmAmWRjT2SX5HeD8rqbP64YaoZY9PQydhpvHV/PSA mIqZV7HdbfIcKjl+qYWv3ZF78n3vbFlFFj7iJEUvToUOQrnXCnloIWqPmB3g5mIBCKV3 yRaA== X-Gm-Message-State: AOJu0YxkkkUkBAJWWxvbt9GdqkJdwFhsY4io7lRBClhE+TTiAERzGRG5 zF+yd+0fWgU1VZAO3ZqEtawK/A== X-Received: by 2002:a05:6a21:99a4:b0:18c:18d3:c8fd with SMTP id ve36-20020a056a2199a400b0018c18d3c8fdmr3061776pzb.14.1702342563762; Mon, 11 Dec 2023 16:56:03 -0800 (PST) Received: from tictac2.mtv.corp.google.com ([2620:15c:9d:2:5c08:e1ed:d922:d30c]) by smtp.gmail.com with ESMTPSA id k10-20020a170902694a00b001cc311ef152sm7251271plt.286.2023.12.11.16.56.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 16:56:03 -0800 (PST) From: Douglas Anderson To: dri-devel@lists.freedesktop.org Cc: Douglas Anderson , Andrzej Hajda , Daniel Vetter , David Airlie , Jernej Skrabec , Jonas Karlman , Laurent Pinchart , Maarten Lankhorst , Maxime Ripard , Neil Armstrong , Philip Chen , Robert Foss , Sam Ravnborg , Stephen Boyd , Thomas Zimmermann , linux-kernel@vger.kernel.org Subject: [PATCH 1/2] drm/bridge: parade-ps8640: Never increase the length when reading from AUX Date: Mon, 11 Dec 2023 16:55:26 -0800 Message-ID: <20231211165526.1.I9d1afcaad76a3e2c0ca046dc4adbc2b632c22eda@changeid> X-Mailer: git-send-email 2.43.0.472.g3155946c3a-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Mon, 11 Dec 2023 16:56:15 -0800 (PST) While testing, I happened to notice a random crash that looked like: Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: drm_dp_dpcd_probe+0x120/0x120 Analysis of drm_dp_dpcd_probe() shows that we pass in a 1-byte buffer (allocated on the stack) to the aux->transfer() function. Presumably if the aux->transfer() writes more than one byte to this buffer then we're in a bad shape. Dropping into kgdb, I noticed that "aux->transfer" pointed at ps8640_aux_transfer(). Reading through ps8640_aux_transfer(), I can see that there are cases where it could write more bytes to msg->buffer than were specified by msg->size. This could happen if the hardware reported back something bogus to us. Let's fix this so we never increase the length. NOTE: I have no actual way to reproduce this issue but it seems likely this is what was happening in the crash I looked at. Fixes: 13afcdd7277e ("drm/bridge: parade-ps8640: Add support for AUX channel") Signed-off-by: Douglas Anderson --- drivers/gpu/drm/bridge/parade-ps8640.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/gpu/drm/bridge/parade-ps8640.c b/drivers/gpu/drm/bridge/parade-ps8640.c index 8161b1a1a4b1..fb2ec4264549 100644 --- a/drivers/gpu/drm/bridge/parade-ps8640.c +++ b/drivers/gpu/drm/bridge/parade-ps8640.c @@ -302,7 +302,7 @@ static ssize_t ps8640_aux_transfer_msg(struct drm_dp_aux *aux, fallthrough; case SWAUX_STATUS_ACKM: - len = data & SWAUX_M_MASK; + len = min(len, (unsigned int)(data & SWAUX_M_MASK)); break; case SWAUX_STATUS_DEFER: case SWAUX_STATUS_I2C_DEFER: @@ -310,7 +310,7 @@ static ssize_t ps8640_aux_transfer_msg(struct drm_dp_aux *aux, msg->reply |= DP_AUX_NATIVE_REPLY_DEFER; else msg->reply |= DP_AUX_I2C_REPLY_DEFER; - len = data & SWAUX_M_MASK; + len = min(len, (unsigned int)(data & SWAUX_M_MASK)); break; case SWAUX_STATUS_INVALID: return -EOPNOTSUPP; -- 2.43.0.472.g3155946c3a-goog