Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp5214204ybi; Tue, 30 Jul 2019 16:17:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqwnErpwGjVSWGcRNANQsvGcGV5z7bxspHWLRI9astEphyZzxaMcETLjBJSgTr71ng+pK7Jh X-Received: by 2002:aa7:90d4:: with SMTP id k20mr396782pfk.78.1564528640108; Tue, 30 Jul 2019 16:17:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564528640; cv=none; d=google.com; s=arc-20160816; b=B0RGm820lhVTr3NrLpq52U6qMkoFNaLZwF/UGFQ6aua6WX66uJEvDwV9lihwYG8kLC 95o6oyDU6jAcDLxQyfe+Q1H3o+QtoyfN2D/J+pfPRvZIOWvSvKIx0oowcDEiaSzNx+Wm TTaAR77tyMD+dtdNIPL1OpeIjlGVcnZYxPieL8l4vMZqHw4/r5wSTOgi6+J/KPuS/Fo/ M5gS7k8eznyCcUOQYfPWdzr5bIymYKNU8sktMkQDtM/qKtgWNykzqUCWpElUJvckwM04 /dVp9GpXAKjFl8bZLDcXvbqeDBBByWa34ztAi3ywYUlrY4IsBQpzoVQ642vvTV6JbsUq qThA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=Wf6pS8cGlGFMIcA9kF+AdZ0dScJo2DJt4ICsmjPdptw=; b=jl3jxyfjbFg634ACQ5qKzglUD9hDt2Oaq5Z4HP9qFi8omoFML7TiNLurB6phv1RmDO UpHzI5seYOINS6qaEqnK/Ya0dn+iv2NiSKsqkx3RxnQJvCyvvoApl4D/eNZEPNQNufcM kY3B4SIic7dbxtgfOM8jU7Ez9oo54q5vwtcquwYe3SzvVJKlxSJlAQeY6GtQiI+2YntQ BxjXB+PTNN0nhszvRjM42SyJreW+LhWUa6/zcTVttpJZIo7O5409Fp9cHaJ6EADuJ7G0 XUbaRqL0fZPFBZdO/TeM5xd5hyn+qGHSlc2ImvBb4rGzqEtHS8CRAvIeMxOHP/F3+uLw HUSA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a18si32215085pgn.132.2019.07.30.16.17.05; Tue, 30 Jul 2019 16:17:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728184AbfG3UYK (ORCPT + 99 others); Tue, 30 Jul 2019 16:24:10 -0400 Received: from mga09.intel.com ([134.134.136.24]:36452 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726194AbfG3UYK (ORCPT ); Tue, 30 Jul 2019 16:24:10 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 30 Jul 2019 13:24:09 -0700 X-IronPort-AV: E=Sophos;i="5.64,327,1559545200"; d="scan'208";a="166061281" Received: from agluck-desk2.sc.intel.com ([10.3.52.68]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 30 Jul 2019 13:24:08 -0700 From: Tony Luck To: Doug Ledford Cc: Tony Luck , Jason Gunthorpe , Leon Romanovsky , Parav Pandit , Ira Weiny , linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] IB/core: Add mitigation for Spectre V1 Date: Tue, 30 Jul 2019 13:24:07 -0700 Message-Id: <20190730202407.31046-1-tony.luck@intel.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Some processors may mispredict an array bounds check and speculatively access memory that they should not. With a user supplied array index we like to play things safe by masking the value with the array size before it is used as an index. Signed-off-by: Tony Luck --- [I don't have h/w, so just compile tested] drivers/infiniband/core/user_mad.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/infiniband/core/user_mad.c b/drivers/infiniband/core/user_mad.c index 9f8a48016b41..fdce254e4f65 100644 --- a/drivers/infiniband/core/user_mad.c +++ b/drivers/infiniband/core/user_mad.c @@ -49,6 +49,7 @@ #include #include #include +#include #include @@ -888,6 +889,7 @@ static int ib_umad_unreg_agent(struct ib_umad_file *file, u32 __user *arg) mutex_lock(&file->port->file_mutex); mutex_lock(&file->mutex); + id = array_index_nospec(id, IB_UMAD_MAX_AGENTS); if (id >= IB_UMAD_MAX_AGENTS || !__get_agent(file, id)) { ret = -EINVAL; goto out; -- 2.20.1