Received: by 10.192.165.148 with SMTP id m20csp3703889imm; Mon, 23 Apr 2018 10:51:44 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/jxBUX13xkIvIpEp0eF7UAelsmmRm4BakyHYrNzWrFUUPQVlvz59owL48NnBiX082EHn3I X-Received: by 10.99.115.81 with SMTP id d17mr17212814pgn.297.1524505904469; Mon, 23 Apr 2018 10:51:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524505904; cv=none; d=google.com; s=arc-20160816; b=I+Lzqpxzx1iE+Qr0+jKKUJfWVFMeCp0IT8K/KaxBDe8Pgo7RHzdSH8lWV6tOhJ35Fj sPviW02KRsWX+NGvGll+Eh69M9lTHwpvbapIWO2XX55b5c4/E5JqEmmv7aQZ0Jxr5rOp kFinEu2eS9U912DaLwKT7hMasKmdlQ+Mc2/yOchipPNWbhzNnz46pAtRj+sIpKQuVw+h sKLi0JYY+EcIT32dPHGssZSitPRlluIRzq3CUdZHq/GavcXMQxlpFTOfFYtv1SmI7Y5K KF5VDznF7aGcEF5IP4OtbCLymGpyM+tlWGOZjAkztlxgtINK75m3tQPWEuBvWCT5PARI FR6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date:arc-authentication-results; bh=t2nQFuktdBcqmuTGlJZavaxjxsTyRez2TMneOUMutY0=; b=G4n2ES6mSbdZltxFGbZvPK+aSROmbBQ0N5KuAhQIDolk8wJ862WrUErqa3AJOUvjqa uNu5qzUk+y9cvVePTZp0UAb7bJDbvq2wksbxRYq6IV92RSec3WjRKXBCLvdzxtTj5XPe FqZGIlc0C6y2QpE942SZAfBAmZF/yH/jZKK8W3c7bp0Ydvp6R0tAFIWEhleNZPjUk+0h w7w2h5QqjKnQvx09RjfTFA+IlX4x+mr2fB8vLy8dWgvptRJFYVlzpLDq+sJD9GoFdimd 2k3uVQj1H0CPUN5cSHFeVbYUGtH3tEX1fkrF6+XzSLgHA84qR9HNylz7KIn5ldQOIgIC icbA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m185si11638267pfm.258.2018.04.23.10.51.29; Mon, 23 Apr 2018 10:51:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932467AbeDWRtH (ORCPT + 99 others); Mon, 23 Apr 2018 13:49:07 -0400 Received: from gateway22.websitewelcome.com ([192.185.47.144]:47838 "EHLO gateway22.websitewelcome.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932324AbeDWRtA (ORCPT ); Mon, 23 Apr 2018 13:49:00 -0400 Received: from cm11.websitewelcome.com (cm11.websitewelcome.com [100.42.49.5]) by gateway22.websitewelcome.com (Postfix) with ESMTP id AC1FE8DF0 for ; Mon, 23 Apr 2018 12:48:59 -0500 (CDT) Received: from gator4166.hostgator.com ([108.167.133.22]) by cmsmtp with SMTP id AfaEfUsSoA3CSAfaFfaxOO; Mon, 23 Apr 2018 12:48:59 -0500 X-Authority-Reason: nr=8 Received: from [189.145.48.65] (port=49602 helo=embeddedor) by gator4166.hostgator.com with esmtpa (Exim 4.89_1) (envelope-from ) id 1fAfaE-00068J-48; Mon, 23 Apr 2018 12:48:58 -0500 Date: Mon, 23 Apr 2018 12:48:55 -0500 From: "Gustavo A. R. Silva" To: Mauro Carvalho Chehab , linux-media@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , Dan Carpenter Subject: [PATCH 08/11] sh_vou: fix potential Spectre variant 1 Message-ID: <56615d4b6a9557645468873d60f5b0b5fcffcfc7.1524499368.git.gustavo@embeddedor.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator4166.hostgator.com X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - embeddedor.com X-BWhitelist: no X-Source-IP: 189.145.48.65 X-Source-L: No X-Exim-ID: 1fAfaE-00068J-48 X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (embeddedor) [189.145.48.65]:49602 X-Source-Auth: gustavo@embeddedor.com X-Email-Count: 58 X-Source-Cap: Z3V6aWRpbmU7Z3V6aWRpbmU7Z2F0b3I0MTY2Lmhvc3RnYXRvci5jb20= X-Local-Domain: yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org fmt->index can be controlled by user-space, hence leading to a potential exploitation of the Spectre variant 1 vulnerability. Smatch warning: drivers/media/platform/sh_vou.c:407 sh_vou_enum_fmt_vid_out() warn: potential spectre issue 'vou_fmt' Fix this by sanitizing fmt->index before using it to index vou_fmt. Notice that given that speculation windows are large, the policy is to kill the speculation on the first load and not worry if it can be completed with a dependent load/store [1]. [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2 Cc: stable@vger.kernel.org Reported-by: Dan Carpenter Signed-off-by: Gustavo A. R. Silva --- drivers/media/platform/sh_vou.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/media/platform/sh_vou.c b/drivers/media/platform/sh_vou.c index 4dccf29..58d8645 100644 --- a/drivers/media/platform/sh_vou.c +++ b/drivers/media/platform/sh_vou.c @@ -30,6 +30,8 @@ #include #include +#include + /* Mirror addresses are not available for all registers */ #define VOUER 0 #define VOUCR 4 @@ -398,6 +400,7 @@ static int sh_vou_enum_fmt_vid_out(struct file *file, void *priv, if (fmt->index >= ARRAY_SIZE(vou_fmt)) return -EINVAL; + fmt->index = array_index_nospec(fmt->index, ARRAY_SIZE(vou_fmt)); dev_dbg(vou_dev->v4l2_dev.dev, "%s()\n", __func__); -- 2.7.4