All of lore.kernel.org
 help / color / mirror / Atom feed
From: Borislav Petkov <bp@amd64.org>
To: Ben Hutchings <ben@decadent.org.uk>
Cc: "Ostrovsky, Boris" <Boris.Ostrovsky@amd.com>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"stable@kernel.org" <stable@kernel.org>,
	"akpm@linux-foundation.org" <akpm@linux-foundation.org>,
	"torvalds@linux-foundation.org" <torvalds@linux-foundation.org>,
	"stable-review@kernel.org" <stable-review@kernel.org>,
	"alan@lxorguk.ukuu.org.uk" <alan@lxorguk.ukuu.org.uk>,
	Greg KH <gregkh@suse.de>,
	Andreas Herrmann <andreas.herrmann3@amd.com>
Subject: Re: [Stable-review] [56/74] x86, microcode, AMD: Extend ucode size verification
Date: Thu, 14 Apr 2011 09:41:25 +0200	[thread overview]
Message-ID: <20110414074125.GA8575@aftab> (raw)
In-Reply-To: <1302752223.5282.674.camel@localhost>

Hi Ben,

I appreciate the review, thanks.

On Wed, Apr 13, 2011 at 11:37:03PM -0400, Ben Hutchings wrote:
> On Wed, 2011-04-13 at 08:51 -0700, Greg KH wrote:
> > 2.6.32-longterm review patch.  If anyone has any objections, please let us know.
> > 
> > ------------------
> > 
> > 
> > From: Borislav Petkov <borislav.petkov@amd.com>
> > 
> > Upstream commit: 44d60c0f5c58c2168f31df9a481761451840eb54
> > 
> > The different families have a different max size for the ucode patch,
> > adjust size checking to the family we're running on. Also, do not
> > vzalloc the max size of the ucode but only the actual size that is
> > passed on from the firmware loader.
> [...]
> > @@ -125,6 +124,37 @@ static int get_matching_microcode(int cp
> >  	return 1;
> >  }
> >  
> > +static unsigned int verify_ucode_size(int cpu, const u8 *buf, unsigned int size)
> > +{
> > +	struct cpuinfo_x86 *c = &cpu_data(cpu);
> > +	unsigned int max_size, actual_size;
> > +
> > +#define F1XH_MPB_MAX_SIZE 2048
> > +#define F14H_MPB_MAX_SIZE 1824
> > +#define F15H_MPB_MAX_SIZE 4096
> > +
> > +	switch (c->x86) {
> > +	case 0x14:
> > +		max_size = F14H_MPB_MAX_SIZE;
> > +		break;
> > +	case 0x15:
> > +		max_size = F15H_MPB_MAX_SIZE;
> > +		break;
> > +	default:
> > +		max_size = F1XH_MPB_MAX_SIZE;
> > +		break;
> > +	}
> > +
> > +	actual_size = buf[4] + (buf[5] << 8);
> > +
> > +	if (actual_size > size || actual_size > max_size) {
> 
> Surely:
> 
> 	if (actual_size + UCODE_CONTAINER_SECTION_HDR > size || ...

Well, not really because the UCODE_CONTAINER_SECTION_HDR is just 8 bytes
of patch header before each ucode patch and we don't copy it. So the
first part of the check is to see whether the ucode patch we're looking
at is incomplete and the ucode file is truncated.

That's why we skip the 8 bytes when we do get_ucode_data() later.

> > +		pr_err("section size mismatch\n");
> > +		return 0;
> > +	}
> > +
> > +	return actual_size;
> > +}
> > +
> >  static int apply_microcode_amd(int cpu)
> >  {
> >  	u32 rev, dummy;
> > @@ -164,11 +194,11 @@ static int get_ucode_data(void *to, cons
> >  }
> >  
> >  static void *
> > -get_next_ucode(const u8 *buf, unsigned int size, unsigned int *mc_size)
> > +get_next_ucode(int cpu, const u8 *buf, unsigned int size, unsigned int *mc_size)
> >  {
> > -	unsigned int total_size;
> > +	unsigned int actual_size = 0;
> >  	u8 section_hdr[UCODE_CONTAINER_SECTION_HDR];
> > -	void *mc;
> > +	void *mc = NULL;
> 
> Dummy initialisations mean the compiler won't warn if you fail to
> properly initialise them later.

I don't see why that matters here since we write into it the vmalloc()
allocation result and check its validity after the vmalloc too.

> 
> >  	if (get_ucode_data(section_hdr, buf, UCODE_CONTAINER_SECTION_HDR))
> >  		return NULL;
> > @@ -179,23 +209,18 @@ get_next_ucode(const u8 *buf, unsigned i
> >  		return NULL;
> >  	}
> >  
> > -	total_size = (unsigned long) (section_hdr[4] + (section_hdr[5] << 8));
> > +	actual_size = verify_ucode_size(cpu, buf, size);
> > +	if (!actual_size)
> > +		return NULL;
> >  
> > -	if (total_size > size || total_size > UCODE_MAX_SIZE) {
> > -		printk(KERN_ERR "microcode: error: size mismatch\n");
> > +	mc = vmalloc(actual_size);
> > +	if (!mc)
> >  		return NULL;
> > -	}
> >  
> > -	mc = vmalloc(UCODE_MAX_SIZE);
> > -	if (mc) {
> > -		memset(mc, 0, UCODE_MAX_SIZE);
> > -		if (get_ucode_data(mc, buf + UCODE_CONTAINER_SECTION_HDR,
> > -				   total_size)) {
> > -			vfree(mc);
> > -			mc = NULL;
> > -		} else
> > -			*mc_size = total_size + UCODE_CONTAINER_SECTION_HDR;
> > -	}
> > +	memset(mc, 0, actual_size);
> > +	get_ucode_data(mc, buf + UCODE_CONTAINER_SECTION_HDR, actual_size);
> [...]
> 
> So I wondered why the result of get_ucode_data() is no longer being
> checked.  And the answer is: because it's a trivial wrapper for
> memcpy(), but with a 'return 0'.  So the memset() is redundant.

Fair enough. Upstream was converted to vzalloc some time ago so it
should be converted back to vmalloc since we overwrite the buffer right
afterwards and we could save us the __GFP_ZERO memset :)

> Good thing nothing important depends on this validation, oh wait...

Oh wait, please don't tell me that you really think that the CPU relies
completely on software to do its ucode validation and accepts the "good"
ucode binary patch blindly...

Thanks.

-- 
Regards/Gruss,
Boris.

Advanced Micro Devices GmbH
Einsteinring 24, 85609 Dornach
General Managers: Alberto Bozzo, Andrew Bowd
Registration: Dornach, Gemeinde Aschheim, Landkreis Muenchen
Registergericht Muenchen, HRB Nr. 43632

  reply	other threads:[~2011-04-14  7:41 UTC|newest]

Thread overview: 93+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-04-13 15:54 [00/74] 2.6.32.37-longterm review Greg KH
2011-04-13 15:50 ` [01/74] ALSA: hda - Fix SPDIF out regression on ALC889 Greg KH
2011-04-13 15:50 ` [02/74] ALSA: Fix yet another race in disconnection Greg KH
2011-04-13 15:50 ` [03/74] perf: Better fit max unprivileged mlock pages for tools needs Greg KH
2011-04-13 15:50 ` [04/74] myri10ge: fix rmmod crash Greg KH
2011-04-13 15:50 ` [05/74] cciss: fix lost command issue Greg KH
2011-04-13 15:50 ` [06/74] sound/oss/opl3: validate voice and channel indexes Greg KH
2011-04-13 15:50 ` [07/74] mac80211: initialize sta->last_rx in sta_info_alloc Greg KH
2011-04-13 15:50 ` [08/74] [SCSI] ses: show devices for enclosures with no page 7 Greg KH
2011-04-13 15:50 ` [09/74] [SCSI] ses: Avoid kernel panic when lun 0 is not mapped Greg KH
2011-04-13 15:50 ` [10/74] eCryptfs: Unlock page in write_begin error path Greg KH
2011-04-13 15:50 ` [11/74] eCryptfs: ecryptfs_keyring_auth_tok_for_sig() bug fix Greg KH
2011-04-13 15:50 ` [12/74] staging: usbip: bugfixes related to kthread conversion Greg KH
2011-04-17 20:15   ` Arnd Bergmann
2011-04-18  6:02     ` Greg KH
2011-04-18  8:50       ` Arjan Mels
2011-04-13 15:50 ` [13/74] staging: usbip: bugfix add number of packets for isochronous frames Greg KH
2011-04-13 15:50 ` [14/74] staging: usbip: bugfix for isochronous packets and optimization Greg KH
2011-04-13 15:50 ` [15/74] staging: hv: Fix GARP not sent after Quick Migration Greg KH
2011-04-13 15:50 ` [16/74] staging: hv: use sync_bitops when interacting with the hypervisor Greg KH
2011-04-13 15:50 ` [17/74] Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo Greg KH
2011-04-13 15:50 ` [18/74] xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 Greg KH
2011-04-14  2:54   ` [Stable-review] " Ben Hutchings
2011-04-14 18:27     ` [stable] " Greg KH
2011-04-13 15:50 ` [19/74] irda: validate peer name and attribute lengths Greg KH
2011-04-13 15:50 ` [20/74] irda: prevent heap corruption on invalid nickname Greg KH
2011-04-13 15:50 ` [21/74] nilfs2: fix data loss in mmap page write for hole blocks Greg KH
2011-04-13 15:50 ` [22/74] ASoC: Explicitly say registerless widgets have no register Greg KH
2011-04-13 15:50 ` [23/74] ALSA: ens1371: fix Creative Ectiva support Greg KH
2011-04-13 15:50 ` [24/74] ROSE: prevent heap corruption with bad facilities Greg KH
2011-04-13 15:50 ` [25/74] Btrfs: Fix uninitialized root flags for subvolumes Greg KH
2011-04-13 15:50 ` [26/74] x86, mtrr, pat: Fix one cpu getting out of sync during resume Greg KH
2011-04-13 15:50 ` [27/74] ath9k: fix a chip wakeup related crash in ath9k_start Greg KH
2011-04-13 15:50 ` [28/74] UBIFS: do not read flash unnecessarily Greg KH
2011-04-13 15:50 ` [29/74] UBIFS: fix oops on error path in read_pnode Greg KH
2011-04-13 15:50 ` [30/74] UBIFS: fix debugging failure in dbg_check_space_info Greg KH
2011-04-13 15:50 ` [31/74] quota: Dont write quota info in dquot_commit() Greg KH
2011-04-14  3:09   ` [Stable-review] " Ben Hutchings
2011-04-14  8:48     ` Jan Kara
2011-04-13 15:50 ` [32/74] mm: avoid wrapping vm_pgoff in mremap() Greg KH
2011-04-13 15:50 ` [33/74] p54usb: IDs for two new devices Greg KH
2011-04-13 15:50 ` [34/74] b43: allocate receive buffers big enough for max frame len + offset Greg KH
2011-04-13 15:50 ` [35/74] Bluetooth: sco: fix information leak to userspace Greg KH
2011-04-13 15:51 ` [36/74] bridge: netfilter: fix information leak Greg KH
2011-04-13 15:51 ` [37/74] Bluetooth: bnep: fix buffer overflow Greg KH
2011-04-13 15:51 ` [38/74] Bluetooth: add support for Apple MacBook Pro 8,2 Greg KH
2011-04-13 15:51 ` [39/74] Treat writes as new when holes span across page boundaries Greg KH
2011-04-13 15:51 ` [40/74] char/tpm: Fix unitialized usage of data buffer Greg KH
2011-04-13 15:51 ` [41/74] netfilter: ip_tables: fix infoleak to userspace Greg KH
2011-04-13 15:51 ` [42/74] netfilter: arp_tables: " Greg KH
2011-04-13 15:51 ` [43/74] netfilter: ipt_CLUSTERIP: fix buffer overflow Greg KH
2011-04-13 15:51 ` [44/74] ipv6: netfilter: ip6_tables: fix infoleak to userspace Greg KH
2011-04-13 15:51 ` [45/74] mfd: ab3100: world-writable debugfs *_priv files Greg KH
2011-04-13 15:51 ` [46/74] drivers/rtc/rtc-ds1511.c: world-writable sysfs nvram file Greg KH
2011-04-13 15:51 ` [47/74] drivers/misc/ep93xx_pwm.c: world-writable sysfs files Greg KH
2011-04-13 15:51 ` [48/74] econet: 4 byte infoleak to the network Greg KH
2011-04-13 15:51 ` [49/74] netfilter: h323: bug in parsing of ASN1 SEQOF field Greg KH
2011-04-13 16:03   ` Patrick McHardy
2011-04-13 16:17     ` Greg KH
2011-04-13 15:51 ` [50/74] sound/oss: remove offset from load_patch callbacks Greg KH
2011-04-13 15:51 ` [51/74] sound: oss: midi_synth: check get_user() return value Greg KH
2011-04-13 15:51 ` [52/74] repair gdbstub to match the gdbserial protocol specification Greg KH
2011-04-13 15:51 ` [53/74] gro: Reset dev pointer on reuse Greg KH
2011-04-13 15:51 ` [54/74] gro: reset skb_iif " Greg KH
2011-04-13 15:51 ` [55/74] x86, amd-ucode: Remove needless log messages Greg KH
2011-04-13 15:51 ` [56/74] x86, microcode, AMD: Extend ucode size verification Greg KH
2011-04-14  3:37   ` [Stable-review] " Ben Hutchings
2011-04-14  7:41     ` Borislav Petkov [this message]
2011-04-14  8:18       ` Borislav Petkov
2011-04-15 23:22       ` Henrique de Moraes Holschuh
2011-06-18 21:04     ` [tip:x86/microcode] x86, microcode, AMD: Fix section header size check tip-bot for Borislav Petkov
2011-04-13 15:51 ` [57/74] powerpc/kexec: Add ifdef CONFIG_PPC_STD_MMU_64 to PPC64 code Greg KH
2011-04-13 15:51 ` [58/74] powerpc: Fix default_machine_crash_shutdown #ifdef botch Greg KH
2011-04-13 15:51 ` [59/74] [PATCH] Revert "x86: Cleanup highmap after brk is concluded" Greg KH
2011-04-13 15:51 ` [60/74] Squashfs: handle corruption of directory structure Greg KH
2011-04-13 15:51 ` [61/74] sctp: fix to calc the INIT/INIT-ACK chunk length correctly is set Greg KH
2011-04-13 15:51 ` [62/74] atm/solos-pci: Dont include frame pseudo-header on transmit hex-dump Greg KH
2011-04-13 15:51 ` [63/74] net: ax25: fix information leak to userland Greg KH
2011-04-13 15:51 ` [64/74] net: packet: " Greg KH
2011-04-13 15:51 ` [65/74] ext4: fix credits computing for indirect mapped files Greg KH
2011-04-13 15:51 ` [66/74] nfsd: fix auth_domain reference leak on nlm operations Greg KH
2011-04-13 15:51 ` [67/74] net: tipc: fix information leak to userland Greg KH
2011-04-13 15:51 ` [68/74] inet_diag: Make sure we actually run the same bytecode we audited Greg KH
2011-06-20 19:05   ` [stable] " Paul Gortmaker
2011-04-13 15:51 ` [69/74] econet: Fix crash in aun_incoming() Greg KH
2011-04-13 15:51 ` [70/74] irda: prevent integer underflow in IRLMP_ENUMDEVICES Greg KH
2011-04-13 15:51 ` [71/74] CAN: Use inode instead of kernel address for /proc file Greg KH
2011-04-13 15:51 ` [72/74] exec: make argv/envp memory visible to oom-killer Greg KH
2011-04-13 15:51 ` [73/74] exec: copy-and-paste the fixes into compat_do_execve() paths Greg KH
2011-04-13 15:51 ` [74/74] net: fix rds_iovec page count overflow Greg KH
2011-04-15 16:53   ` [stable] " Paul Gortmaker
2011-04-15 17:10   ` Linus Torvalds
2011-04-15 17:26     ` Greg KH

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20110414074125.GA8575@aftab \
    --to=bp@amd64.org \
    --cc=Boris.Ostrovsky@amd.com \
    --cc=akpm@linux-foundation.org \
    --cc=alan@lxorguk.ukuu.org.uk \
    --cc=andreas.herrmann3@amd.com \
    --cc=ben@decadent.org.uk \
    --cc=gregkh@suse.de \
    --cc=linux-kernel@vger.kernel.org \
    --cc=stable-review@kernel.org \
    --cc=stable@kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.