diff mbox series

lib: sbi: Add additional range checks for RV32

Message ID 20240814122959.49914-2-ajones@ventanamicro.com
State Changes Requested
Headers show
Series lib: sbi: Add additional range checks for RV32 | expand

Commit Message

Andrew Jones Aug. 14, 2024, 12:30 p.m. UTC
On RV32, M-mode can only access the first 4G of the physical
address space because M-mode does not have an MMU to access the
full 34-bit physical address space. While we already ensure
the "hi" registers of RV32 physical address inputs are zero we
need to also ensure that the low register plus the size does
not cross into 4G address space. The check added to
sbi_domain_check_addr_range() should be enough for both DBCN
and SSE, but DBCN returns a different error code for high
addresses, so we patch that check too.

Signed-off-by: Andrew Jones <ajones@ventanamicro.com>

---

Should the SSE functions return SBI_ERR_FAILED in this case like DBCN
does? We'd need to patch the SSE spec to call out SBI_ERR_FAILED as
"Failed to write due to I/O errors." like DBCN does too.

 lib/sbi/sbi_domain.c     | 3 +++
 lib/sbi/sbi_ecall_dbcn.c | 2 +-
 2 files changed, 4 insertions(+), 1 deletion(-)

Comments

Anup Patel Aug. 24, 2024, 9:08 a.m. UTC | #1
On Wed, Aug 14, 2024 at 6:02 PM Andrew Jones <ajones@ventanamicro.com> wrote:
>
> On RV32, M-mode can only access the first 4G of the physical
> address space because M-mode does not have an MMU to access the
> full 34-bit physical address space. While we already ensure
> the "hi" registers of RV32 physical address inputs are zero we
> need to also ensure that the low register plus the size does
> not cross into 4G address space. The check added to
> sbi_domain_check_addr_range() should be enough for both DBCN
> and SSE, but DBCN returns a different error code for high
> addresses, so we patch that check too.
>
> Signed-off-by: Andrew Jones <ajones@ventanamicro.com>
>
> ---
>
> Should the SSE functions return SBI_ERR_FAILED in this case like DBCN
> does? We'd need to patch the SSE spec to call out SBI_ERR_FAILED as
> "Failed to write due to I/O errors." like DBCN does too.

Instead of special-casing wrap-around check separately for each SBI
extension, I suggest:
1) Add one more requirement in section 3.2 of the SBI spec to prevent
wrap-around
2) Update sbi_domain_check_addr_range() like this patch does.

Regards,
Anup

>
>  lib/sbi/sbi_domain.c     | 3 +++
>  lib/sbi/sbi_ecall_dbcn.c | 2 +-
>  2 files changed, 4 insertions(+), 1 deletion(-)
>
> diff --git a/lib/sbi/sbi_domain.c b/lib/sbi/sbi_domain.c
> index 374ac36b2f3e..5f6efe884952 100644
> --- a/lib/sbi/sbi_domain.c
> +++ b/lib/sbi/sbi_domain.c
> @@ -412,6 +412,9 @@ bool sbi_domain_check_addr_range(const struct sbi_domain *dom,
>         if (!dom)
>                 return false;
>
> +       if (max < addr)
> +               return false;
> +
>         while (addr < max) {
>                 reg = find_region(dom, addr);
>                 if (!reg)
> diff --git a/lib/sbi/sbi_ecall_dbcn.c b/lib/sbi/sbi_ecall_dbcn.c
> index 49a7713f48bb..a3262ab9a90c 100644
> --- a/lib/sbi/sbi_ecall_dbcn.c
> +++ b/lib/sbi/sbi_ecall_dbcn.c
> @@ -39,7 +39,7 @@ static int sbi_ecall_dbcn_handler(unsigned long extid, unsigned long funcid,
>                  * physical address (i.e. a2 register) is non-zero on
>                  * RV64.
>                  */
> -               if (regs->a2)
> +               if (regs->a2 || regs->a1 + regs->a0 < regs->a1)
>                         return SBI_ERR_FAILED;
>
>                 if (!sbi_domain_check_addr_range(sbi_domain_thishart_ptr(),
> --
> 2.45.2
>
>
> --
> opensbi mailing list
> opensbi@lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/opensbi
Andrew Jones Aug. 26, 2024, 11 a.m. UTC | #2
On Sat, Aug 24, 2024 at 02:38:31PM GMT, Anup Patel wrote:
> On Wed, Aug 14, 2024 at 6:02 PM Andrew Jones <ajones@ventanamicro.com> wrote:
> >
> > On RV32, M-mode can only access the first 4G of the physical
> > address space because M-mode does not have an MMU to access the
> > full 34-bit physical address space. While we already ensure
> > the "hi" registers of RV32 physical address inputs are zero we
> > need to also ensure that the low register plus the size does
> > not cross into 4G address space. The check added to
> > sbi_domain_check_addr_range() should be enough for both DBCN
> > and SSE, but DBCN returns a different error code for high
> > addresses, so we patch that check too.
> >
> > Signed-off-by: Andrew Jones <ajones@ventanamicro.com>
> >
> > ---
> >
> > Should the SSE functions return SBI_ERR_FAILED in this case like DBCN
> > does? We'd need to patch the SSE spec to call out SBI_ERR_FAILED as
> > "Failed to write due to I/O errors." like DBCN does too.
> 
> Instead of special-casing wrap-around check separately for each SBI
> extension, I suggest:
> 1) Add one more requirement in section 3.2 of the SBI spec to prevent
> wrap-around
> 2) Update sbi_domain_check_addr_range() like this patch does.

Sounds good to me.

Thanks,
drew
Andrew Jones Sept. 9, 2024, 1:21 p.m. UTC | #3
On Mon, Aug 26, 2024 at 01:00:58PM GMT, Andrew Jones wrote:
> On Sat, Aug 24, 2024 at 02:38:31PM GMT, Anup Patel wrote:
> > On Wed, Aug 14, 2024 at 6:02 PM Andrew Jones <ajones@ventanamicro.com> wrote:
> > >
> > > On RV32, M-mode can only access the first 4G of the physical
> > > address space because M-mode does not have an MMU to access the
> > > full 34-bit physical address space. While we already ensure
> > > the "hi" registers of RV32 physical address inputs are zero we
> > > need to also ensure that the low register plus the size does
> > > not cross into 4G address space. The check added to
> > > sbi_domain_check_addr_range() should be enough for both DBCN
> > > and SSE, but DBCN returns a different error code for high
> > > addresses, so we patch that check too.
> > >
> > > Signed-off-by: Andrew Jones <ajones@ventanamicro.com>
> > >
> > > ---
> > >
> > > Should the SSE functions return SBI_ERR_FAILED in this case like DBCN
> > > does? We'd need to patch the SSE spec to call out SBI_ERR_FAILED as
> > > "Failed to write due to I/O errors." like DBCN does too.
> > 
> > Instead of special-casing wrap-around check separately for each SBI
> > extension, I suggest:
> > 1) Add one more requirement in section 3.2 of the SBI spec to prevent
> > wrap-around
> > 2) Update sbi_domain_check_addr_range() like this patch does.
> 
> Sounds good to me.
>

I've created https://github.com/riscv-non-isa/riscv-sbi-doc/pull/164 for
the spec side of things. For v2 of this patch I think it's best to
change sbi_domain_check_addr_range() to return an error rather than a
boolean and then for cases like hi != 0 and lo + size > max-lo we can
return errors other than SBI_ERR_INVALID_ADDR without having to duplicate
checks which are currently outside the function.

Thanks,
drew
diff mbox series

Patch

diff --git a/lib/sbi/sbi_domain.c b/lib/sbi/sbi_domain.c
index 374ac36b2f3e..5f6efe884952 100644
--- a/lib/sbi/sbi_domain.c
+++ b/lib/sbi/sbi_domain.c
@@ -412,6 +412,9 @@  bool sbi_domain_check_addr_range(const struct sbi_domain *dom,
 	if (!dom)
 		return false;
 
+	if (max < addr)
+		return false;
+
 	while (addr < max) {
 		reg = find_region(dom, addr);
 		if (!reg)
diff --git a/lib/sbi/sbi_ecall_dbcn.c b/lib/sbi/sbi_ecall_dbcn.c
index 49a7713f48bb..a3262ab9a90c 100644
--- a/lib/sbi/sbi_ecall_dbcn.c
+++ b/lib/sbi/sbi_ecall_dbcn.c
@@ -39,7 +39,7 @@  static int sbi_ecall_dbcn_handler(unsigned long extid, unsigned long funcid,
 		 * physical address (i.e. a2 register) is non-zero on
 		 * RV64.
 		 */
-		if (regs->a2)
+		if (regs->a2 || regs->a1 + regs->a0 < regs->a1)
 			return SBI_ERR_FAILED;
 
 		if (!sbi_domain_check_addr_range(sbi_domain_thishart_ptr(),