Message ID | 20180116135730.19216-1-jgross@suse.com (mailing list archive) |
---|---|
State | Changes Requested, archived |
Headers | show |
* Juergen Gross <jgross@suse.com> wrote: > There seem to exist several grub2 versions trashing > boot_params.hdr.acpi_rsdp_addr. > > So don't just believe this address to be valid, but verify it pointing > to a valid RSDP table. Exactly what kind of values do those Grub2 versions put into that field? Pointer to something, or random noise? Also, what exactly does 'validation' mean, how robustly does it filter out of spec uses of the boot protocol? Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On 16/01/18 16:46, Ingo Molnar wrote: > > * Juergen Gross <jgross@suse.com> wrote: > >> There seem to exist several grub2 versions trashing >> boot_params.hdr.acpi_rsdp_addr. >> >> So don't just believe this address to be valid, but verify it pointing >> to a valid RSDP table. > > Exactly what kind of values do those Grub2 versions put into that field? Pointer > to something, or random noise? Looks like random noise. On Mike's system it was 0x000000000151. > Also, what exactly does 'validation' mean, how robustly does it filter out of spec > uses of the boot protocol? It validates the RSDP has the correct 8 byte eye catcher in it and the checksum of the structure is correct. Searching the RSDP by scanning memory is using the same checks, so I guess this ought to be okay. Odds are about 1 : 2^80 for false positives. Juergen -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
* Juergen Gross <jgross@suse.com> wrote: > On 16/01/18 16:46, Ingo Molnar wrote: > > > > * Juergen Gross <jgross@suse.com> wrote: > > > >> There seem to exist several grub2 versions trashing > >> boot_params.hdr.acpi_rsdp_addr. > >> > >> So don't just believe this address to be valid, but verify it pointing > >> to a valid RSDP table. > > > > Exactly what kind of values do those Grub2 versions put into that field? Pointer > > to something, or random noise? > > Looks like random noise. On Mike's system it was 0x000000000151. > > > Also, what exactly does 'validation' mean, how robustly does it filter out of spec > > uses of the boot protocol? > > It validates the RSDP has the correct 8 byte eye catcher in it and > the checksum of the structure is correct. Searching the RSDP by > scanning memory is using the same checks, so I guess this ought to > be okay. Odds are about 1 : 2^80 for false positives. Ok, this should work - but only because the RSDP is defined in such a robust fashion. The boot protocol extension is still fragile: what I worry about is that if we start relying on the extended boot protocol with widespread installed base of out of spec Grub2 loaders, other extensions (which cannot be sanity checked) would be less robust. Is there a way to detect the broken Grub2 versions somehow and just limit the boot protocol for them? The other solution would be to just discontinue this boot protocol extension and define a new one. Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Tue, Jan 16, 2018 at 2:57 PM, Juergen Gross <jgross@suse.com> wrote: > There seem to exist several grub2 versions trashing > boot_params.hdr.acpi_rsdp_addr. > > So don't just believe this address to be valid, but verify it pointing > to a valid RSDP table. > > Signed-off-by: Juergen Gross <jgross@suse.com> > --- > To be applied on top of my RSDP series currently in tip.git x86/boot > Mike Galbraith has tested this patch to repair his broken boot > --- > drivers/acpi/acpica/tbxfroot.c | 36 ++++++++++++++++++++++++++++++++++++ > drivers/acpi/osl.c | 2 +- > include/acpi/acpixf.h | 5 +++++ > 3 files changed, 42 insertions(+), 1 deletion(-) > > diff --git a/drivers/acpi/acpica/tbxfroot.c b/drivers/acpi/acpica/tbxfroot.c > index f9f9a7da2cad..9edc71780a38 100644 > --- a/drivers/acpi/acpica/tbxfroot.c > +++ b/drivers/acpi/acpica/tbxfroot.c > @@ -249,6 +249,42 @@ ACPI_EXPORT_SYMBOL_INIT(acpi_find_root_pointer) > > /******************************************************************************* > * > + * FUNCTION: acpi_verify_root_pointer Why do you want this to go into ACPICA? > + * > + * > + * PARAMETERS: rsdp_address - Pointer to suspected RSDP > + * > + * RETURN: AE_OK if rsdp_address really points to a RSDP, AE_NOT_FOUND > + * else > + * > + * DESCRIPTION: Verify a physical address being a valid RSDP > + * > + ******************************************************************************/ > + > +acpi_status ACPI_INIT_FUNCTION > +acpi_verify_root_pointer(acpi_physical_address rsdp_address) > +{ > + acpi_status status; > + struct acpi_table_rsdp *rsdp; > + > + ACPI_FUNCTION_TRACE(acpi_verify_root_pointer); > + > + rsdp = acpi_os_map_memory(rsdp_address, sizeof(*rsdp)); > + > + if (!rsdp) > + return_ACPI_STATUS(AE_NO_MEMORY); > + > + status = acpi_tb_validate_rsdp(rsdp); > + > + acpi_os_unmap_memory(rsdp, sizeof(*rsdp)); > + > + return_ACPI_STATUS(status); > +} > + > +ACPI_EXPORT_SYMBOL_INIT(acpi_verify_root_pointer) > + > +/******************************************************************************* > + * > * FUNCTION: acpi_tb_scan_memory_for_rsdp > * > * PARAMETERS: start_address - Starting pointer for search > diff --git a/drivers/acpi/osl.c b/drivers/acpi/osl.c > index 2b77db914752..facff5c11f32 100644 > --- a/drivers/acpi/osl.c > +++ b/drivers/acpi/osl.c > @@ -201,7 +201,7 @@ acpi_physical_address __init acpi_os_get_root_pointer(void) > return acpi_rsdp; > #endif > pa = acpi_arch_get_root_pointer(); > - if (pa) > + if (pa && acpi_verify_root_pointer(pa) == AE_OK) All things needed could just be done locally in this file. > return pa; > > if (efi_enabled(EFI_CONFIG_TABLES)) { > diff --git a/include/acpi/acpixf.h b/include/acpi/acpixf.h > index e1dd1a8d42b6..1edc47bd13c1 100644 > --- a/include/acpi/acpixf.h > +++ b/include/acpi/acpixf.h > @@ -505,6 +505,11 @@ ACPI_EXTERNAL_RETURN_STATUS(acpi_status ACPI_INIT_FUNCTION > ACPI_EXTERNAL_RETURN_STATUS(acpi_status ACPI_INIT_FUNCTION > acpi_find_root_pointer(acpi_physical_address > *rsdp_address)) > + > +ACPI_EXTERNAL_RETURN_OK(acpi_status ACPI_INIT_FUNCTION > + acpi_verify_root_pointer(acpi_physical_address > + rsdp_address)) > + > ACPI_EXTERNAL_RETURN_STATUS(acpi_status > acpi_get_table_header(acpi_string signature, > u32 instance, > -- -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On 17/01/18 12:49, Rafael J. Wysocki wrote: > On Tue, Jan 16, 2018 at 2:57 PM, Juergen Gross <jgross@suse.com> wrote: >> There seem to exist several grub2 versions trashing >> boot_params.hdr.acpi_rsdp_addr. >> >> So don't just believe this address to be valid, but verify it pointing >> to a valid RSDP table. >> >> Signed-off-by: Juergen Gross <jgross@suse.com> >> --- >> To be applied on top of my RSDP series currently in tip.git x86/boot >> Mike Galbraith has tested this patch to repair his broken boot >> --- >> drivers/acpi/acpica/tbxfroot.c | 36 ++++++++++++++++++++++++++++++++++++ >> drivers/acpi/osl.c | 2 +- >> include/acpi/acpixf.h | 5 +++++ >> 3 files changed, 42 insertions(+), 1 deletion(-) >> >> diff --git a/drivers/acpi/acpica/tbxfroot.c b/drivers/acpi/acpica/tbxfroot.c >> index f9f9a7da2cad..9edc71780a38 100644 >> --- a/drivers/acpi/acpica/tbxfroot.c >> +++ b/drivers/acpi/acpica/tbxfroot.c >> @@ -249,6 +249,42 @@ ACPI_EXPORT_SYMBOL_INIT(acpi_find_root_pointer) >> >> /******************************************************************************* >> * >> + * FUNCTION: acpi_verify_root_pointer > > Why do you want this to go into ACPICA? It seemed to fit in here. >> + * >> + * >> + * PARAMETERS: rsdp_address - Pointer to suspected RSDP >> + * >> + * RETURN: AE_OK if rsdp_address really points to a RSDP, AE_NOT_FOUND >> + * else >> + * >> + * DESCRIPTION: Verify a physical address being a valid RSDP >> + * >> + ******************************************************************************/ >> + >> +acpi_status ACPI_INIT_FUNCTION >> +acpi_verify_root_pointer(acpi_physical_address rsdp_address) >> +{ >> + acpi_status status; >> + struct acpi_table_rsdp *rsdp; >> + >> + ACPI_FUNCTION_TRACE(acpi_verify_root_pointer); >> + >> + rsdp = acpi_os_map_memory(rsdp_address, sizeof(*rsdp)); >> + >> + if (!rsdp) >> + return_ACPI_STATUS(AE_NO_MEMORY); >> + >> + status = acpi_tb_validate_rsdp(rsdp); >> + >> + acpi_os_unmap_memory(rsdp, sizeof(*rsdp)); >> + >> + return_ACPI_STATUS(status); >> +} >> + >> +ACPI_EXPORT_SYMBOL_INIT(acpi_verify_root_pointer) >> + >> +/******************************************************************************* >> + * >> * FUNCTION: acpi_tb_scan_memory_for_rsdp >> * >> * PARAMETERS: start_address - Starting pointer for search >> diff --git a/drivers/acpi/osl.c b/drivers/acpi/osl.c >> index 2b77db914752..facff5c11f32 100644 >> --- a/drivers/acpi/osl.c >> +++ b/drivers/acpi/osl.c >> @@ -201,7 +201,7 @@ acpi_physical_address __init acpi_os_get_root_pointer(void) >> return acpi_rsdp; >> #endif >> pa = acpi_arch_get_root_pointer(); >> - if (pa) >> + if (pa && acpi_verify_root_pointer(pa) == AE_OK) > > All things needed could just be done locally in this file. Okay, if you prefer it this way I can move acpi_verify_root_pointer() to osl.c. Juergen -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On 16/01/18 17:35, Ingo Molnar wrote: > > * Juergen Gross <jgross@suse.com> wrote: > >> On 16/01/18 16:46, Ingo Molnar wrote: >>> >>> * Juergen Gross <jgross@suse.com> wrote: >>> >>>> There seem to exist several grub2 versions trashing >>>> boot_params.hdr.acpi_rsdp_addr. >>>> >>>> So don't just believe this address to be valid, but verify it pointing >>>> to a valid RSDP table. >>> >>> Exactly what kind of values do those Grub2 versions put into that field? Pointer >>> to something, or random noise? >> >> Looks like random noise. On Mike's system it was 0x000000000151. >> >>> Also, what exactly does 'validation' mean, how robustly does it filter out of spec >>> uses of the boot protocol? >> >> It validates the RSDP has the correct 8 byte eye catcher in it and >> the checksum of the structure is correct. Searching the RSDP by >> scanning memory is using the same checks, so I guess this ought to >> be okay. Odds are about 1 : 2^80 for false positives. > > Ok, this should work - but only because the RSDP is defined in such a robust > fashion. > > The boot protocol extension is still fragile: what I worry about is that if we > start relying on the extended boot protocol with widespread installed base of out > of spec Grub2 loaders, other extensions (which cannot be sanity checked) would be > less robust. > > Is there a way to detect the broken Grub2 versions somehow and just limit the boot > protocol for them? > > The other solution would be to just discontinue this boot protocol extension and > define a new one. I think the best way to do it would be to let grub2 report the version of the protocol it is honoring. This reported version should not be higher than that of the kernel. The kernel would then know which fields of setup_header are known by grub2 and thus can be trusted to be correct. I can modify my patch series to add the grub2 version information before the new rsdp_address field so this band-aid patch won't be required. What do you think? Juergen -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
* Juergen Gross <jgross@suse.com> wrote: > On 16/01/18 17:35, Ingo Molnar wrote: > > > > * Juergen Gross <jgross@suse.com> wrote: > > > >> On 16/01/18 16:46, Ingo Molnar wrote: > >>> > >>> * Juergen Gross <jgross@suse.com> wrote: > >>> > >>>> There seem to exist several grub2 versions trashing > >>>> boot_params.hdr.acpi_rsdp_addr. > >>>> > >>>> So don't just believe this address to be valid, but verify it pointing > >>>> to a valid RSDP table. > >>> > >>> Exactly what kind of values do those Grub2 versions put into that field? Pointer > >>> to something, or random noise? > >> > >> Looks like random noise. On Mike's system it was 0x000000000151. > >> > >>> Also, what exactly does 'validation' mean, how robustly does it filter out of spec > >>> uses of the boot protocol? > >> > >> It validates the RSDP has the correct 8 byte eye catcher in it and > >> the checksum of the structure is correct. Searching the RSDP by > >> scanning memory is using the same checks, so I guess this ought to > >> be okay. Odds are about 1 : 2^80 for false positives. > > > > Ok, this should work - but only because the RSDP is defined in such a robust > > fashion. > > > > The boot protocol extension is still fragile: what I worry about is that if we > > start relying on the extended boot protocol with widespread installed base of out > > of spec Grub2 loaders, other extensions (which cannot be sanity checked) would be > > less robust. > > > > Is there a way to detect the broken Grub2 versions somehow and just limit the boot > > protocol for them? > > > > The other solution would be to just discontinue this boot protocol extension and > > define a new one. > > I think the best way to do it would be to let grub2 report the version > of the protocol it is honoring. This reported version should not be > higher than that of the kernel. The kernel would then know which fields > of setup_header are known by grub2 and thus can be trusted to be > correct. > > I can modify my patch series to add the grub2 version information before > the new rsdp_address field so this band-aid patch won't be required. > > What do you think? Such an approach would be a lot more future proof I think - except that I don't think the ABI should be 'version' based but 'size' based, like sys_sched_getattr(). The idea is that we introduce a 'size' field in the existing boot params, which would be zero for old bootloaders. (Is such a free field available?) The boot loader puts the boot parameter structure size it currently supports, and the kernel reads it and acts accordingly. This is flexible in a both forwards and backwards ABI-compatible manner, i.e. old kernel could run with new boot loader and old bootloader could run with new kernel, while having the maximum common set of boot protocol features supported. If such an interface would be possible to create, that is. Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On 17/01/18 16:34, Ingo Molnar wrote: > > * Juergen Gross <jgross@suse.com> wrote: > >> On 16/01/18 17:35, Ingo Molnar wrote: >>> >>> * Juergen Gross <jgross@suse.com> wrote: >>> >>>> On 16/01/18 16:46, Ingo Molnar wrote: >>>>> >>>>> * Juergen Gross <jgross@suse.com> wrote: >>>>> >>>>>> There seem to exist several grub2 versions trashing >>>>>> boot_params.hdr.acpi_rsdp_addr. >>>>>> >>>>>> So don't just believe this address to be valid, but verify it pointing >>>>>> to a valid RSDP table. >>>>> >>>>> Exactly what kind of values do those Grub2 versions put into that field? Pointer >>>>> to something, or random noise? >>>> >>>> Looks like random noise. On Mike's system it was 0x000000000151. >>>> >>>>> Also, what exactly does 'validation' mean, how robustly does it filter out of spec >>>>> uses of the boot protocol? >>>> >>>> It validates the RSDP has the correct 8 byte eye catcher in it and >>>> the checksum of the structure is correct. Searching the RSDP by >>>> scanning memory is using the same checks, so I guess this ought to >>>> be okay. Odds are about 1 : 2^80 for false positives. >>> >>> Ok, this should work - but only because the RSDP is defined in such a robust >>> fashion. >>> >>> The boot protocol extension is still fragile: what I worry about is that if we >>> start relying on the extended boot protocol with widespread installed base of out >>> of spec Grub2 loaders, other extensions (which cannot be sanity checked) would be >>> less robust. >>> >>> Is there a way to detect the broken Grub2 versions somehow and just limit the boot >>> protocol for them? >>> >>> The other solution would be to just discontinue this boot protocol extension and >>> define a new one. >> >> I think the best way to do it would be to let grub2 report the version >> of the protocol it is honoring. This reported version should not be >> higher than that of the kernel. The kernel would then know which fields >> of setup_header are known by grub2 and thus can be trusted to be >> correct. >> >> I can modify my patch series to add the grub2 version information before >> the new rsdp_address field so this band-aid patch won't be required. >> >> What do you think? > > Such an approach would be a lot more future proof I think - except that I don't > think the ABI should be 'version' based but 'size' based, like > sys_sched_getattr(). Hmm, the interface from the kernel to the bootloader already has the version in it. So it would be more natural to use the same kind of information in the other direction, too. > The idea is that we introduce a 'size' field in the existing boot params, which > would be zero for old bootloaders. (Is such a free field available?) No. Look in arch/x86/include/uapi/asm/bootparam.h for struct setup_header. > The boot loader puts the boot parameter structure size it currently supports, and > the kernel reads it and acts accordingly. And here the problems begin: lets say current kernel knows about setup_header size of 200 bytes. The boot loader is writing 300 into the size field. Does this mean the boot loader is very new, or did it just write garbage into the size field? > This is flexible in a both forwards and backwards ABI-compatible manner, i.e. old > kernel could run with new boot loader and old bootloader could run with new > kernel, while having the maximum common set of boot protocol features supported. > > If such an interface would be possible to create, that is. What I suggested (adding the boot loader version after the current end) won't work. We need some kind of feedback in the current header, as otherwise we can never be sure whether the feedback is garbage or real. So what about the following: From version 0x020e on (current version without my patches is 0x020d) the boot loader will write its supported version or'ed with 0x8000 into the same version field. So we can be sure any added fields are filled with real data or the information has been evaluated by the boot loader, if the returned version included that field. If the boot loader finds the kernel supports a version < 0x020e it won't return its supported version. Juergen -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
* Juergen Gross <jgross@suse.com> wrote: > So what about the following: > > From version 0x020e on (current version without my patches is 0x020d) > the boot loader will write its supported version or'ed with 0x8000 into > the same version field. So we can be sure any added fields are filled > with real data or the information has been evaluated by the boot loader, > if the returned version included that field. If the boot loader finds > the kernel supports a version < 0x020e it won't return its supported > version. This seems like a usable workaround to me, as long as everyone involved agrees with it. I've removed the patches for the time being. Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On 13/02/18 17:32, Ingo Molnar wrote: > > * Juergen Gross <jgross@suse.com> wrote: > >> So what about the following: >> >> From version 0x020e on (current version without my patches is 0x020d) >> the boot loader will write its supported version or'ed with 0x8000 into >> the same version field. So we can be sure any added fields are filled >> with real data or the information has been evaluated by the boot loader, >> if the returned version included that field. If the boot loader finds >> the kernel supports a version < 0x020e it won't return its supported >> version. > > This seems like a usable workaround to me, as long as everyone involved > agrees with it. Okay, thanks for the feedback. I'll go that route. > I've removed the patches for the time being. Seems a sensible thing to do. Juergen -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
diff --git a/drivers/acpi/acpica/tbxfroot.c b/drivers/acpi/acpica/tbxfroot.c index f9f9a7da2cad..9edc71780a38 100644 --- a/drivers/acpi/acpica/tbxfroot.c +++ b/drivers/acpi/acpica/tbxfroot.c @@ -249,6 +249,42 @@ ACPI_EXPORT_SYMBOL_INIT(acpi_find_root_pointer) /******************************************************************************* * + * FUNCTION: acpi_verify_root_pointer + * + * + * PARAMETERS: rsdp_address - Pointer to suspected RSDP + * + * RETURN: AE_OK if rsdp_address really points to a RSDP, AE_NOT_FOUND + * else + * + * DESCRIPTION: Verify a physical address being a valid RSDP + * + ******************************************************************************/ + +acpi_status ACPI_INIT_FUNCTION +acpi_verify_root_pointer(acpi_physical_address rsdp_address) +{ + acpi_status status; + struct acpi_table_rsdp *rsdp; + + ACPI_FUNCTION_TRACE(acpi_verify_root_pointer); + + rsdp = acpi_os_map_memory(rsdp_address, sizeof(*rsdp)); + + if (!rsdp) + return_ACPI_STATUS(AE_NO_MEMORY); + + status = acpi_tb_validate_rsdp(rsdp); + + acpi_os_unmap_memory(rsdp, sizeof(*rsdp)); + + return_ACPI_STATUS(status); +} + +ACPI_EXPORT_SYMBOL_INIT(acpi_verify_root_pointer) + +/******************************************************************************* + * * FUNCTION: acpi_tb_scan_memory_for_rsdp * * PARAMETERS: start_address - Starting pointer for search diff --git a/drivers/acpi/osl.c b/drivers/acpi/osl.c index 2b77db914752..facff5c11f32 100644 --- a/drivers/acpi/osl.c +++ b/drivers/acpi/osl.c @@ -201,7 +201,7 @@ acpi_physical_address __init acpi_os_get_root_pointer(void) return acpi_rsdp; #endif pa = acpi_arch_get_root_pointer(); - if (pa) + if (pa && acpi_verify_root_pointer(pa) == AE_OK) return pa; if (efi_enabled(EFI_CONFIG_TABLES)) { diff --git a/include/acpi/acpixf.h b/include/acpi/acpixf.h index e1dd1a8d42b6..1edc47bd13c1 100644 --- a/include/acpi/acpixf.h +++ b/include/acpi/acpixf.h @@ -505,6 +505,11 @@ ACPI_EXTERNAL_RETURN_STATUS(acpi_status ACPI_INIT_FUNCTION ACPI_EXTERNAL_RETURN_STATUS(acpi_status ACPI_INIT_FUNCTION acpi_find_root_pointer(acpi_physical_address *rsdp_address)) + +ACPI_EXTERNAL_RETURN_OK(acpi_status ACPI_INIT_FUNCTION + acpi_verify_root_pointer(acpi_physical_address + rsdp_address)) + ACPI_EXTERNAL_RETURN_STATUS(acpi_status acpi_get_table_header(acpi_string signature, u32 instance,
There seem to exist several grub2 versions trashing boot_params.hdr.acpi_rsdp_addr. So don't just believe this address to be valid, but verify it pointing to a valid RSDP table. Signed-off-by: Juergen Gross <jgross@suse.com> --- To be applied on top of my RSDP series currently in tip.git x86/boot Mike Galbraith has tested this patch to repair his broken boot --- drivers/acpi/acpica/tbxfroot.c | 36 ++++++++++++++++++++++++++++++++++++ drivers/acpi/osl.c | 2 +- include/acpi/acpixf.h | 5 +++++ 3 files changed, 42 insertions(+), 1 deletion(-)