Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp6015138imm; Sat, 19 May 2018 15:09:57 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrEiGXL2CMLzrCkndKHWttjpFkGuMQ4N+vJCncmMyHdt7fFfGuZmZENKG25EY74CM07GM+O X-Received: by 2002:a62:fb14:: with SMTP id x20-v6mr14583873pfm.48.1526767797675; Sat, 19 May 2018 15:09:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526767797; cv=none; d=google.com; s=arc-20160816; b=jZCBrFUg4LbzpG/GmMin+yW0mF26w2dBN9NBh9kJYf65Oh7Tre3/0uVvlOyOouSGxs +DCowTuG44Z3R7S94Iu3x3wxGQtAfSBUtEr/yc7NYF41rSMb84uoOrC80IIoL4RkYtrL YJ3KwrFQFRMnQLAJsFE8jAWx+DQDl37FRAjSV2mkE8l4a3/+qDxCwDq92iyzBgXIxfHd rJkJwovDxNaRzn5EOJrSzPSN/ohYDfsR1uYDiz0Cru5deVmaOA/I8U9ZZT/3Bk++j7Nf FG0mPZNtG0rPDpN0dy3dkpgA/Kjpa5X0GDaj3ZOf1c9SijXG+zDei1aqYYEqmKvbc+4z SPWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=O7eCfvUJybUoTEeXOe2apVkrvhV96tWXzb03UCMwQ1o=; b=0kHBKFEEdfQ0/sr05K8V7wC6nWPykB6Y+uKYkE1mIY3Pd7bir35YBm7/KAF3r2jWgH vW6SUsmhzFTtGYWe+I/5cxpf0MJ0t6JTAXSsNn4X5V2P+uhoVsjOupO+GZZ1/cHCFRTp V3sTs7Ian+l3F9e+zgbt4OCeQp+dvSSuvp0YejSpTi5rNAhRgE8g9/6VJMJh7n2cOawI p5rq7oosSbxE3DCadt2almG+TXtXkqKGAwsLr8NILJg0/twCgBAmoduS4KdgDTYHwpCE BHVVjjN+YAPX0fkgE39M5SNaxqskTghAgaHpq7n3qqeCqSdB7ScUwIaZx+pX0fK6u7WI /N8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ay5-v6si10067572plb.459.2018.05.19.15.09.43; Sat, 19 May 2018 15:09:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752665AbeESWIL (ORCPT + 99 others); Sat, 19 May 2018 18:08:11 -0400 Received: from vps-vb.mhejs.net ([37.28.154.113]:49450 "EHLO vps-vb.mhejs.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752596AbeESWHt (ORCPT ); Sat, 19 May 2018 18:07:49 -0400 Received: by vps-vb.mhejs.net with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from ) id 1fKA0Z-0001On-60; Sun, 20 May 2018 00:07:23 +0200 From: "Maciej S. Szmigiero" To: Borislav Petkov Cc: Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , x86@kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v6 2/8] x86/microcode/AMD: Add microcode container data checking functions Date: Sun, 20 May 2018 00:07:16 +0200 Message-Id: <28d0439f64e03e3c8192e1f5280f01a5729698fc.1526767245.git.mail@maciej.szmigiero.name> X-Mailer: git-send-email 2.17.0 In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add verify_container(), verify_equivalence_table(), verify_patch_section() and verify_patch() functions to the AMD microcode update driver. These functions check whether a passed buffer contains the relevant structure, whether it isn't truncated and (for actual microcode patches) whether the size of a patch is not too large for a particular CPU family. By adding these checks as separate functions the actual microcode loading code won't get interspersed with a lot of checks and so will be more readable. Signed-off-by: Maciej S. Szmigiero --- arch/x86/kernel/cpu/microcode/amd.c | 148 +++++++++++++++++++++++++++- 1 file changed, 145 insertions(+), 3 deletions(-) diff --git a/arch/x86/kernel/cpu/microcode/amd.c b/arch/x86/kernel/cpu/microcode/amd.c index dc8ea9a9d962..f9485ff7183c 100644 --- a/arch/x86/kernel/cpu/microcode/amd.c +++ b/arch/x86/kernel/cpu/microcode/amd.c @@ -73,6 +73,150 @@ static u16 find_equiv_id(struct equiv_cpu_entry *equiv_table, u32 sig) return 0; } +/* + * Checks whether there is a valid microcode container file at the beginning + * of a passed buffer @buf of size @size. + * If @early is set this function does not print errors which makes it + * usable by the early microcode loader. + */ +static bool verify_container(const u8 *buf, size_t buf_size, bool early) +{ + u32 cont_magic; + + if (buf_size <= CONTAINER_HDR_SZ) { + if (!early) + pr_err("Truncated microcode container header.\n"); + + return false; + } + + cont_magic = *(const u32 *)buf; + if (cont_magic != UCODE_MAGIC) { + if (!early) + pr_err("Invalid magic value (0x%08x).\n", cont_magic); + + return false; + } + + return true; +} + +/* + * Checks whether there is a valid, non-truncated CPU equivalence table + * at the beginning of a passed buffer @buf of size @size. + * If @early is set this function does not print errors which makes it + * usable by the early microcode loader. + */ +static bool verify_equivalence_table(const u8 *buf, size_t buf_size, bool early) +{ + const u32 *hdr = (const u32 *)buf; + u32 cont_type, equiv_tbl_len; + + if (!verify_container(buf, buf_size, early)) + return false; + + cont_type = hdr[1]; + if (cont_type != UCODE_EQUIV_CPU_TABLE_TYPE) { + if (!early) + pr_err("Wrong microcode container equivalence table type: %u.\n", + cont_type); + + return false; + } + + equiv_tbl_len = hdr[2]; + if (equiv_tbl_len < sizeof(struct equiv_cpu_entry) || + buf_size - CONTAINER_HDR_SZ < equiv_tbl_len) { + if (!early) + pr_err("Truncated equivalence table.\n"); + + return false; + } + + return true; +} + +/* + * Checks whether there is a valid, non-truncated microcode patch section + * at the beginning of a passed buffer @buf of size @size. + * If @early is set this function does not print errors which makes it + * usable by the early microcode loader. + */ +static bool verify_patch_section(const u8 *buf, size_t buf_size, bool early) +{ + const u32 *hdr = (const u32 *)buf; + u32 patch_type, patch_size; + + if (buf_size < SECTION_HDR_SIZE) { + if (!early) + pr_err("Truncated patch section.\n"); + + return false; + } + + patch_type = hdr[0]; + patch_size = hdr[1]; + + if (patch_type != UCODE_UCODE_TYPE) { + if (!early) + pr_err("Invalid type field (%u) in container file section header.\n", + patch_type); + + return false; + } + + if (patch_size < sizeof(struct microcode_header_amd)) { + if (!early) + pr_err("Patch of size %u too short.\n", patch_size); + + return false; + } + + if (buf_size - SECTION_HDR_SIZE < patch_size) { + if (!early) + pr_err("Patch of size %u truncated.\n", patch_size); + + return false; + } + + return true; +} + +static unsigned int verify_patch_size(u8 family, u32 patch_size, + unsigned int size); + +/* + * Checks whether a microcode patch located at the beginning of a passed + * buffer @buf of size @size is not too large for a particular @family + * and is not truncated. + * If @early is set this function does not print errors which makes it + * usable by the early microcode loader. + */ +static bool verify_patch(u8 family, const u8 *buf, size_t buf_size, bool early) +{ + const u32 *hdr = (const u32 *)buf; + u32 patch_size; + + if (!verify_patch_section(buf, buf_size, early)) + return false; + + patch_size = hdr[1]; + + /* + * The section header length is not included in this indicated size + * but is present in the leftover file length so we need to subtract + * it before passing this value to the function below. + */ + if (!verify_patch_size(family, patch_size, buf_size - SECTION_HDR_SIZE)) { + if (!early) + pr_err("Patch of size %u too large.\n", patch_size); + + return false; + } + + return true; +} + /* * This scans the ucode blob for the proper container as we can have multiple * containers glued together. Returns the equivalence ID from the equivalence @@ -494,10 +638,8 @@ static unsigned int verify_patch_size(u8 family, u32 patch_size, unsigned int si break; } - if (patch_size > min_t(u32, size, max_size)) { - pr_err("patch size mismatch\n"); + if (patch_size > min_t(u32, size, max_size)) return 0; - } return patch_size; }