Received: by 10.192.165.148 with SMTP id m20csp3549094imm; Mon, 30 Apr 2018 02:05:52 -0700 (PDT) X-Google-Smtp-Source: AB8JxZotSbjb6nmu5gDvB0iP9yDzUDbEaIc+w1cVxbexz8u4uZxKeJYPNu89BK2INJbi3gl3bfrI X-Received: by 10.98.208.68 with SMTP id p65mr11369595pfg.64.1525079152663; Mon, 30 Apr 2018 02:05:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525079152; cv=none; d=google.com; s=arc-20160816; b=qeEA0QZQ649gjTe6zaGnZZHfqQccPl6G5zFvp1MHnbDNyu1Y/ll7bmyFye7W7qXTsZ mqst6eqaRMd+0z74omMFntN68TRnnLVjtZ8/8na+P3ldMjEpXLBYBBTfJrWbLMphZpiH mqpgbcrlkfLB6Ygpevip+3nzbrQuex6/3ZkVBgG6u1fXezK7vSFY7zp6EwzLD/CILb/H H+i/DLzkDa+dF/5t2EAaM+bk1t8LPuH8QM63hxBfv73oDfopQZKlfWAiBHnbFJ64NEdd vtmW0EggLtJBOhY9NWi3Nu1aUR6bMbmAcCkW5T1RBp6xz6/nOvfUerIE7u2vs6d7Gx/y 7eKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=dQQm8DpNuA5PqOL3VwTaMsDrNjnH/sFTMHX5F6v13Bk=; b=Yi9ACQ5TJcnpkRC0VgxnkrF7sJekyPmicD5vEBJSU0snWcjrffU+dV6tjylfcdJO3p yZHYM7hsnJ0OyASgcnVrhLYEosbcIbFKlqK5GWMa4VJWY2oOKch9hB02td4TUrSx3Wo3 R/5PnLfmWeXJvR71e3OvhNxEoKlK6xFzEP7N5vDmk2melzmobxX//FCDxzC5UXSarXgo xGrNZwkSYIPzlWV7BMdvib9T7WTYfflE6/iT+nRQ5I6Xrgru9z/dfN15/7TaEl74PRma 6VPuppNgfHgBStBozshWlFQiChzEkP/1PolqImYaE5H1h3KBhIzFVZK/PuN0c4A1pTax KYzw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k139si7223565pfd.97.2018.04.30.02.05.38; Mon, 30 Apr 2018 02:05:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752545AbeD3JFZ (ORCPT + 99 others); Mon, 30 Apr 2018 05:05:25 -0400 Received: from mail.skyhub.de ([5.9.137.197]:59666 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752404AbeD3JFY (ORCPT ); Mon, 30 Apr 2018 05:05:24 -0400 X-Virus-Scanned: Nedap ESD1 at mail.skyhub.de Received: from mail.skyhub.de ([127.0.0.1]) by localhost (blast.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id y10TFZN2NvF0; Mon, 30 Apr 2018 11:05:07 +0200 (CEST) Received: from pd.tnic (p200300EC2BC6BB0018CA5EB1E28A3112.dip0.t-ipconnect.de [IPv6:2003:ec:2bc6:bb00:18ca:5eb1:e28a:3112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id D1C021EC00E5; Mon, 30 Apr 2018 11:05:06 +0200 (CEST) Date: Mon, 30 Apr 2018 11:04:47 +0200 From: Borislav Petkov To: "Maciej S. Szmigiero" Cc: Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , x86@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v5 2/6] x86/microcode/AMD: Add microcode container data checking functions Message-ID: <20180430090447.GA6509@pd.tnic> References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.3 (2018-01-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 23, 2018 at 11:34:07PM +0200, Maciej S. Szmigiero wrote: > This commit adds verify_container(), verify_equivalence_table(), Avoid beginning the commit message of a patch with "This patch" or "This commit". It is tautologically useless. > verify_patch_section() and verify_patch() functions to the AMD microcode > update driver. > These functions check whether a passed buffer contains the relevant > structure, whether it isn't truncated and (for actual microcode patches) > whether the size of a patch is not too large for a particular CPU family. > By adding these checks as separate functions the actual microcode loading > code won't get interspersed with a lot of checks and so will be more > readable. > > Signed-off-by: Maciej S. Szmigiero > --- > arch/x86/kernel/cpu/microcode/amd.c | 140 +++++++++++++++++++++++++++++++++++- > 1 file changed, 137 insertions(+), 3 deletions(-) > > diff --git a/arch/x86/kernel/cpu/microcode/amd.c b/arch/x86/kernel/cpu/microcode/amd.c > index dc8ea9a9d962..4fafaf0852d7 100644 > --- a/arch/x86/kernel/cpu/microcode/amd.c > +++ b/arch/x86/kernel/cpu/microcode/amd.c > @@ -73,6 +73,142 @@ static u16 find_equiv_id(struct equiv_cpu_entry *equiv_table, u32 sig) > return 0; > } > > +/* > + * Checks whether there is a valid microcode container file at the beginning > + * of a passed buffer @buf of size @size. > + * If @early is set this function does not print errors which makes it > + * usable by the early microcode loader. > + */ > +static bool verify_container(const u8 *buf, size_t buf_size, bool early) > +{ > + u32 cont_magic; > + > + if (buf_size <= CONTAINER_HDR_SZ) { > + if (!early) > + pr_err("Truncated microcode container header.\n"); > + > + return false; > + } > + > + cont_magic = *(const u32 *)buf; > + if (cont_magic != UCODE_MAGIC) { > + if (!early) > + pr_err("Invalid magic value (0x%08x).\n", cont_magic); > + > + return false; > + } > + > + return true; > +} > + > +/* > + * Checks whether there is a valid, non-truncated CPU equivalence table > + * at the beginning of a passed buffer @buf of size @size. > + * If @early is set this function does not print errors which makes it > + * usable by the early microcode loader. > + */ > +static bool verify_equivalence_table(const u8 *buf, size_t buf_size, bool early) > +{ > + const u32 *hdr = (const u32 *)buf; > + u32 cont_type, equiv_tbl_len; > + > + cont_type = hdr[1]; You need to check the size of buf so that there's enough buf passed in before you index into it like that. > + if (cont_type != UCODE_EQUIV_CPU_TABLE_TYPE) { > + if (!early) > + pr_err("Wrong microcode container equivalence table type: %u.\n", > + cont_type); > + > + return false; > + } > + > + equiv_tbl_len = hdr[2]; And that. > + if (equiv_tbl_len < sizeof(struct equiv_cpu_entry) || > + buf_size - CONTAINER_HDR_SZ < equiv_tbl_len) { > + if (!early) > + pr_err("Truncated equivalence table.\n"); > + > + return false; > + } > + > + return true; > +} > + > +/* > + * Checks whether there is a valid, non-truncated microcode patch section > + * at the beginning of a passed buffer @buf of size @size. > + * If @early is set this function does not print errors which makes it > + * usable by the early microcode loader. > + */ > +static bool verify_patch_section(const u8 *buf, size_t buf_size, bool early) > +{ > + const u32 *hdr = (const u32 *)buf; > + u32 patch_type, patch_size; > + > + if (buf_size < SECTION_HDR_SIZE) { > + if (!early) > + pr_err("Truncated patch section.\n"); > + > + return false; > + } > + > + patch_type = hdr[0]; > + patch_size = hdr[1]; > + > + if (patch_type != UCODE_UCODE_TYPE) { > + if (!early) > + pr_err("Invalid type field (%u) in container file section header.\n", > + patch_type); > + > + return false; > + } > + > + if (patch_size < sizeof(struct microcode_header_amd)) { > + if (!early) > + pr_err("Patch of size %u too short.\n", patch_size); > + > + return false; > + } > + > + if (buf_size - SECTION_HDR_SIZE < patch_size) { > + if (!early) > + pr_err("Patch of size %u truncated.\n", patch_size); > + > + return false; > + } > + > + return true; > +} > + > +static unsigned int verify_patch_size(u8 family, u32 patch_size, > + unsigned int size); No forward declarations pls. > + > +/* > + * Checks whether a microcode patch located at the beginning of a passed > + * buffer @buf of size @size is not too large for a particular @family > + * and is not truncated. > + * If @early is set this function does not print errors which makes it > + * usable by the early microcode loader. > + */ > +static bool verify_patch(u8 family, const u8 *buf, size_t buf_size, bool early) > +{ > + const u32 *hdr = (const u32 *)buf; > + u32 patch_size = hdr[1]; Just like in the first comment above. > + > + /* > + * The section header length is not included in this indicated size > + * but is present in the leftover file length so we need to subtract > + * it before passing this value to the function below. > + */ > + if (!verify_patch_size(family, patch_size, buf_size - SECTION_HDR_SIZE)) { > + if (!early) > + pr_err("Patch of size %u too large.\n", patch_size); > + > + return false; > + } > + > + return true; > +} -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.