/* * linux/net/sunrpc/gss_generic_token.c * * Adapted from MIT Kerberos 5-1.2.1 lib/gssapi/generic/util_token.c * * Copyright (c) 2000 The Regents of the University of Michigan. * All rights reserved. * * Andy Adamson */ /* * Copyright 1993 by OpenVision Technologies, Inc. * * Permission to use, copy, modify, distribute, and sell this software * and its documentation for any purpose is hereby granted without fee, * provided that the above copyright notice appears in all copies and * that both that copyright notice and this permission notice appear in * supporting documentation, and that the name of OpenVision not be used * in advertising or publicity pertaining to distribution of the software * without specific, written prior permission. OpenVision makes no * representations about the suitability of this software for any * purpose. It is provided "as is" without express or implied warranty. * * OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO * EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF * USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR * OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR * PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #if IS_ENABLED(CONFIG_SUNRPC_DEBUG) # define RPCDBG_FACILITY RPCDBG_AUTH #endif /* TWRITE_STR from gssapiP_generic.h */ #define TWRITE_STR(ptr, str, len) \ memcpy((ptr), (char *) (str), (len)); \ (ptr) += (len); /* XXXX this code currently makes the assumption that a mech oid will never be longer than 127 bytes. This assumption is not inherent in the interfaces, so the code can be fixed if the OSI namespace balloons unexpectedly. */ /* Each token looks like this: 0x60 tag for APPLICATION 0, SEQUENCE (constructed, definite-length) possible multiple bytes, need to parse/generate 0x06 tag for OBJECT IDENTIFIER compile-time constant string (assume 1 byte) compile-time constant string the ANY containing the application token bytes 0,1 are the token type bytes 2,n are the token data For the purposes of this abstraction, the token "header" consists of the sequence tag and length octets, the mech OID DER encoding, and the first two inner bytes, which indicate the token type. The token "body" consists of everything else. */ static int der_length_size( int length) { if (length < (1<<7)) return 1; else if (length < (1<<8)) return 2; #if (SIZEOF_INT == 2) else return 3; #else else if (length < (1<<16)) return 3; else if (length < (1<<24)) return 4; else return 5; #endif } static void der_write_length(unsigned char **buf, int length) { if (length < (1<<7)) { *(*buf)++ = (unsigned char) length; } else { *(*buf)++ = (unsigned char) (der_length_size(length)+127); #if (SIZEOF_INT > 2) if (length >= (1<<24)) *(*buf)++ = (unsigned char) (length>>24); if (length >= (1<<16)) *(*buf)++ = (unsigned char) ((length>>16)&0xff); #endif if (length >= (1<<8)) *(*buf)++ = (unsigned char) ((length>>8)&0xff); *(*buf)++ = (unsigned char) (length&0xff); } } /* returns decoded length, or < 0 on failure. Advances buf and decrements bufsize */ static int der_read_length(unsigned char **buf, int *bufsize) { unsigned char sf; int ret; if (*bufsize < 1) return -1; sf = *(*buf)++; (*bufsize)--; if (sf & 0x80) { if ((sf &= 0x7f) > ((*bufsize)-1)) return -1; if (sf > SIZEOF_INT) return -1; ret = 0; for (; sf; sf--) { ret = (ret<<8) + (*(*buf)++); (*bufsize)--; } } else { ret = sf; } return ret; } /* returns the length of a token, given the mech oid and the body size */ int g_token_size(struct xdr_netobj *mech, unsigned int body_size) { /* set body_size to sequence contents size */ body_size += 2 + (int) mech->len; /* NEED overflow check */ return 1 + der_length_size(body_size) + body_size; } EXPORT_SYMBOL_GPL(g_token_size); /* fills in a buffer with the token header. The buffer is assumed to be the right size. buf is advanced past the token header */ void g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) { *(*buf)++ = 0x60; der_write_length(buf, 2 + mech->len + body_size); *(*buf)++ = 0x06; *(*buf)++ = (unsigned char) mech->len; TWRITE_STR(*buf, mech->data, ((int) mech->len)); } EXPORT_SYMBOL_GPL(g_make_token_header); /* * Given a buffer containing a token, reads and verifies the token, * leaving buf advanced past the token header, and setting body_size * to the number of remaining bytes. Returns 0 on success, * G_BAD_TOK_HEADER for a variety of errors, and G_WRONG_MECH if the * mechanism in the token does not match the mech argument. buf and * *body_size are left unmodified on error. */ u32 g_verify_token_header(struct xdr_netobj *mech, int *body_size, unsigned char **buf_in, int toksize) { unsigned char *buf = *buf_in; int seqsize; struct xdr_netobj toid; int ret = 0; if ((toksize-=1) < 0) return G_BAD_TOK_HEADER; if (*buf++ != 0x60) return G_BAD_TOK_HEADER; if ((seqsize = der_read_length(&buf, &toksize)) < 0) return G_BAD_TOK_HEADER; if (seqsize != toksize) return G_BAD_TOK_HEADER; if ((toksize-=1) < 0) return G_BAD_TOK_HEADER; if (*buf++ != 0x06) return G_BAD_TOK_HEADER; if ((toksize-=1) < 0) return G_BAD_TOK_HEADER; toid.len = *buf++; if ((toksize-=toid.len) < 0) return G_BAD_TOK_HEADER; toid.data = buf; buf+=toid.len; if (! g_OID_equal(&toid, mech)) ret = G_WRONG_MECH; /* G_WRONG_MECH is not returned immediately because it's more important to return G_BAD_TOK_HEADER if the token header is in fact bad */ if ((toksize-=2) < 0) return G_BAD_TOK_HEADER; if (ret) return ret; if (!ret) { *buf_in = buf; *body_size = toksize; } return ret; } EXPORT_SYMBOL_GPL(g_verify_token_header); away at shutdown time, since both times happened when shutting down the X server. The call chains were different: - VT ioctl(KDSETMODE, KD_TEXT): intel_cleanup_plane_fb+0x5b/0xa0 [i915] drm_atomic_helper_cleanup_planes+0x6f/0x90 [drm_kms_helper] intel_atomic_commit_tail+0x749/0xfe0 [i915] intel_atomic_commit+0x3cb/0x4f0 [i915] drm_atomic_commit+0x4b/0x50 [drm] restore_fbdev_mode+0x14c/0x2a0 [drm_kms_helper] drm_fb_helper_restore_fbdev_mode_unlocked+0x34/0x80 [drm_kms_helper] drm_fb_helper_set_par+0x2d/0x60 [drm_kms_helper] intel_fbdev_set_par+0x18/0x70 [i915] fb_set_var+0x236/0x460 fbcon_blank+0x30f/0x350 do_unblank_screen+0xd2/0x1a0 vt_ioctl+0x507/0x12a0 tty_ioctl+0x355/0xc30 do_vfs_ioctl+0xa3/0x5e0 SyS_ioctl+0x79/0x90 entry_SYSCALL_64_fastpath+0x13/0x94 - i915 unpin_work workqueue: intel_unpin_work_fn+0x58/0x140 [i915] process_one_work+0x1f1/0x480 worker_thread+0x48/0x4d0 kthread+0x101/0x140 and this patch purely papers over the issue by adding a NULL pointer check and a WARN_ON_ONCE() to avoid the oops that would then generally make the machine unresponsive. Other callers of i915_gem_object_to_ggtt() seem to also check for the returned pointer being NULL and warn about it, so this clearly has happened before in other places. [ Reported it originally to the i915 developers on Jan 8, applying the ugly workaround on my own now after triggering the problem for the second time with no feedback. This is likely to be the same bug reported as https://bugs.freedesktop.org/show_bug.cgi?id=98829 https://bugs.freedesktop.org/show_bug.cgi?id=99134 which has a patch for the underlying problem, but it hasn't gotten to me, so I'm applying the workaround. ] Cc: Daniel Vetter <daniel.vetter@intel.com> Cc: Jani Nikula <jani.nikula@linux.intel.com> Cc: Ville Syrjälä <ville.syrjala@linux.intel.com> Cc: Chris Wilson <chris@chris-wilson.co.uk> Cc: Maarten Lankhorst <maarten.lankhorst@linux.intel.com> Cc: Tvrtko Ursulin <tvrtko.ursulin@intel.com> Cc: Imre Deak <imre.deak@intel.com> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'net/sched/act_api.c')