Received: by 10.192.165.148 with SMTP id m20csp3732608imm; Mon, 23 Apr 2018 11:21:32 -0700 (PDT) X-Google-Smtp-Source: AIpwx48tJ+fB81cAbeRt81G1GgZ2QJmQsAgM5mvOSBziM78Xap9hFLiS5/Q+NzztwvAOP/SA/JNv X-Received: by 10.99.112.70 with SMTP id a6mr17612757pgn.294.1524507692262; Mon, 23 Apr 2018 11:21:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524507692; cv=none; d=google.com; s=arc-20160816; b=UOFG5+9Ce6Afj9I/Jkkz/XBECUAvq8ty9gv2+p/LyT8it+chtezDbz99SE2ilwbY4s zNObOgpZ3BSmPMS8EJWuy3SgRks+A/6gY8T6tixc7zKN/fcGiKiJj4KI2r7Kbah1MAUw pEWkoan4JDFjk0XaAXD+XYILKj29/zBii8nzyB6xYnHV9aGT1PJqHXcH8PyBNi2CED4P SLQy3WHZy2OOqgS+eMY+3hmRJioLFJL1OJ+GXAbWu7j3wrmzd5xHGK8uGTL8zQNHCCAD 4ZiMEbvVKB56LGpk25ng860mwbD31ZKJZE+gv6bWequWE8zF2ZZ0dvJKkz/AGFV0rcAA ajAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date:arc-authentication-results; bh=vd4+wlj85ZXtdlzlZiSiM4XtFK6OM4B3YKcDVR8Z0Fc=; b=v0k/i052jhyQ7evCZiT8DNVcfokuxe14UdHqnDHj65lMTEV4Q3QXqkC0ZHd3E23Hzm HbQa28vvc1N7izKDZTKssGfr+PVHjUEuajzfU5PA+F/oSpi6FxFCn7ip5lNWzMFvy97j R9MTjTyU+QufZB88qJLd9fFYFU2GcsNhvQ9F5m81L0Y7xhsuH1s5pV+NVnCbsNbS6UuM OUkBqSIlAx7MeYpiPzu0T/iOnitp2lccryVcfnEQ9xVJaPOysnW+3XzkuLQOOLgfNHD4 68OP1BT/ghnTxrrRtjGFnY7r9js965n1VEjbBjHMlnCdXGoK3PlMDoZRRay0ZmLMnCl1 Z+lA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 5si6643214pgi.135.2018.04.23.11.21.15; Mon, 23 Apr 2018 11:21:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932231AbeDWRmD (ORCPT + 99 others); Mon, 23 Apr 2018 13:42:03 -0400 Received: from gateway22.websitewelcome.com ([192.185.47.144]:37608 "EHLO gateway22.websitewelcome.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932092AbeDWRmA (ORCPT ); Mon, 23 Apr 2018 13:42:00 -0400 Received: from cm14.websitewelcome.com (cm14.websitewelcome.com [100.42.49.7]) by gateway22.websitewelcome.com (Postfix) with ESMTP id 3AFC3154D0 for ; Mon, 23 Apr 2018 12:42:00 -0500 (CDT) Received: from gator4166.hostgator.com ([108.167.133.22]) by cmsmtp with SMTP id AfTUfmT2S5CKDAfTUfKhWf; Mon, 23 Apr 2018 12:42:00 -0500 X-Authority-Reason: nr=8 Received: from [189.145.48.65] (port=49560 helo=embeddedor) by gator4166.hostgator.com with esmtpa (Exim 4.89_1) (envelope-from ) id 1fAfTT-004OmQ-ON; Mon, 23 Apr 2018 12:41:59 -0500 Date: Mon, 23 Apr 2018 12:41:59 -0500 From: "Gustavo A. R. Silva" To: Mauro Carvalho Chehab , linux-media@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , Dan Carpenter Subject: [PATCH 05/11] omap_vout: fix potential Spectre variant 1 Message-ID: <078fe4c0397eceae961e4a3dc37c19513b9f8614.1524499368.git.gustavo@embeddedor.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator4166.hostgator.com X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - embeddedor.com X-BWhitelist: no X-Source-IP: 189.145.48.65 X-Source-L: No X-Exim-ID: 1fAfTT-004OmQ-ON X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (embeddedor) [189.145.48.65]:49560 X-Source-Auth: gustavo@embeddedor.com X-Email-Count: 42 X-Source-Cap: Z3V6aWRpbmU7Z3V6aWRpbmU7Z2F0b3I0MTY2Lmhvc3RnYXRvci5jb20= X-Local-Domain: yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org index can be controlled by user-space, hence leading to a potential exploitation of the Spectre variant 1 vulnerability. Smatch warning: drivers/media/platform/omap/omap_vout.c:1062 vidioc_enum_fmt_vid_out() warn: potential spectre issue 'omap_formats' Fix this by sanitizing index before using it to index omap_formats. Notice that given that speculation windows are large, the policy is to kill the speculation on the first load and not worry if it can be completed with a dependent load/store [1]. [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2 Cc: stable@vger.kernel.org Reported-by: Dan Carpenter Signed-off-by: Gustavo A. R. Silva --- drivers/media/platform/omap/omap_vout.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/media/platform/omap/omap_vout.c b/drivers/media/platform/omap/omap_vout.c index 5700b78..1a7ec39 100644 --- a/drivers/media/platform/omap/omap_vout.c +++ b/drivers/media/platform/omap/omap_vout.c @@ -51,6 +51,8 @@ #include "omap_voutdef.h" #include "omap_vout_vrfb.h" +#include + MODULE_AUTHOR("Texas Instruments"); MODULE_DESCRIPTION("OMAP Video for Linux Video out driver"); MODULE_LICENSE("GPL"); @@ -1059,6 +1061,7 @@ static int vidioc_enum_fmt_vid_out(struct file *file, void *fh, if (index >= NUM_OUTPUT_FORMATS) return -EINVAL; + index = array_index_nospec(index, NUM_OUTPUT_FORMATS); fmt->flags = omap_formats[index].flags; strlcpy(fmt->description, omap_formats[index].description, sizeof(fmt->description)); -- 2.7.4