Linux EDAC development
 help / color / mirror / Atom feed
* [bug report] x86/mce: Prevent severity computation from being instrumented
@ 2021-12-17 10:20 Dan Carpenter
  2021-12-17 11:29 ` Borislav Petkov
  0 siblings, 1 reply; 4+ messages in thread
From: Dan Carpenter @ 2021-12-17 10:20 UTC (permalink / raw)
  To: bp; +Cc: linux-edac

Hello Borislav Petkov,

This is a semi-automatic email about new static checker warnings.

The patch 0a5b288e85bb: "x86/mce: Prevent severity computation from
being instrumented" from Oct 13, 2021, leads to the following Smatch
complaint:

    arch/x86/kernel/cpu/mce/severity.c:286 error_context()
    warn: variable dereferenced before check 'regs' (see line 280)

arch/x86/kernel/cpu/mce/severity.c
   279		fixup_type = ex_get_fixup_type(m->ip);
   280		copy_user  = is_copy_from_user(regs);
                                               ^^^^
New unchecked dereference

   281		instrumentation_end();
   282	
   283		switch (fixup_type) {
   284		case EX_TYPE_UACCESS:
   285		case EX_TYPE_COPY:
   286			if (!regs || !copy_user)
                             ^^^^
Old code checked for NULL

   287				return IN_KERNEL;
   288			m->kflags |= MCE_IN_KERNEL_COPYIN;

regards,
dan carpenter

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [bug report] x86/mce: Prevent severity computation from being instrumented
  2021-12-17 10:20 [bug report] x86/mce: Prevent severity computation from being instrumented Dan Carpenter
@ 2021-12-17 11:29 ` Borislav Petkov
  2021-12-17 17:13   ` Luck, Tony
  0 siblings, 1 reply; 4+ messages in thread
From: Borislav Petkov @ 2021-12-17 11:29 UTC (permalink / raw)
  To: Dan Carpenter; +Cc: linux-edac, Tony Luck

+ Tony.

On Fri, Dec 17, 2021 at 01:20:29PM +0300, Dan Carpenter wrote:
> Hello Borislav Petkov,
> 
> This is a semi-automatic email about new static checker warnings.
> 
> The patch 0a5b288e85bb: "x86/mce: Prevent severity computation from
> being instrumented" from Oct 13, 2021, leads to the following Smatch
> complaint:
> 
>     arch/x86/kernel/cpu/mce/severity.c:286 error_context()
>     warn: variable dereferenced before check 'regs' (see line 280)
> 
> arch/x86/kernel/cpu/mce/severity.c
>    279		fixup_type = ex_get_fixup_type(m->ip);
>    280		copy_user  = is_copy_from_user(regs);
>                                                ^^^^
> New unchecked dereference
> 
>    281		instrumentation_end();
>    282	
>    283		switch (fixup_type) {
>    284		case EX_TYPE_UACCESS:
>    285		case EX_TYPE_COPY:
>    286			if (!regs || !copy_user)
>                              ^^^^
> Old code checked for NULL
> 
>    287				return IN_KERNEL;
>    288			m->kflags |= MCE_IN_KERNEL_COPYIN;

Good catch, thanks!

I guess we can do something like this:

---
diff --git a/arch/x86/kernel/cpu/mce/severity.c b/arch/x86/kernel/cpu/mce/severity.c
index a32646769705..7aa2bda93cbb 100644
--- a/arch/x86/kernel/cpu/mce/severity.c
+++ b/arch/x86/kernel/cpu/mce/severity.c
@@ -222,6 +222,9 @@ static bool is_copy_from_user(struct pt_regs *regs)
 	struct insn insn;
 	int ret;
 
+	if (!regs)
+		return false;
+
 	if (copy_from_kernel_nofault(insn_buf, (void *)regs->ip, MAX_INSN_SIZE))
 		return false;
 
@@ -283,7 +286,7 @@ static noinstr int error_context(struct mce *m, struct pt_regs *regs)
 	switch (fixup_type) {
 	case EX_TYPE_UACCESS:
 	case EX_TYPE_COPY:
-		if (!regs || !copy_user)
+		if (!copy_user)
 			return IN_KERNEL;
 		m->kflags |= MCE_IN_KERNEL_COPYIN;
 		fallthrough;

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [bug report] x86/mce: Prevent severity computation from being instrumented
  2021-12-17 11:29 ` Borislav Petkov
@ 2021-12-17 17:13   ` Luck, Tony
  2021-12-17 23:50     ` [PATCH] x86/mce: Check regs before accessing it Borislav Petkov
  0 siblings, 1 reply; 4+ messages in thread
From: Luck, Tony @ 2021-12-17 17:13 UTC (permalink / raw)
  To: Borislav Petkov; +Cc: Dan Carpenter, linux-edac

On Fri, Dec 17, 2021 at 12:29:45PM +0100, Borislav Petkov wrote:
> + Tony.
> 
> On Fri, Dec 17, 2021 at 01:20:29PM +0300, Dan Carpenter wrote:
> > Hello Borislav Petkov,
> > 
> > This is a semi-automatic email about new static checker warnings.
> > 
> > The patch 0a5b288e85bb: "x86/mce: Prevent severity computation from
> > being instrumented" from Oct 13, 2021, leads to the following Smatch
> > complaint:
> > 
> >     arch/x86/kernel/cpu/mce/severity.c:286 error_context()
> >     warn: variable dereferenced before check 'regs' (see line 280)
> > 
> > arch/x86/kernel/cpu/mce/severity.c
> >    279		fixup_type = ex_get_fixup_type(m->ip);
> >    280		copy_user  = is_copy_from_user(regs);
> >                                                ^^^^
> > New unchecked dereference
> > 
> >    281		instrumentation_end();
> >    282	
> >    283		switch (fixup_type) {
> >    284		case EX_TYPE_UACCESS:
> >    285		case EX_TYPE_COPY:
> >    286			if (!regs || !copy_user)
> >                              ^^^^
> > Old code checked for NULL
> > 
> >    287				return IN_KERNEL;
> >    288			m->kflags |= MCE_IN_KERNEL_COPYIN;
> 
> Good catch, thanks!
> 
> I guess we can do something like this:
> 
> ---
> diff --git a/arch/x86/kernel/cpu/mce/severity.c b/arch/x86/kernel/cpu/mce/severity.c
> index a32646769705..7aa2bda93cbb 100644
> --- a/arch/x86/kernel/cpu/mce/severity.c
> +++ b/arch/x86/kernel/cpu/mce/severity.c
> @@ -222,6 +222,9 @@ static bool is_copy_from_user(struct pt_regs *regs)
>  	struct insn insn;
>  	int ret;
>  
> +	if (!regs)
> +		return false;
> +
>  	if (copy_from_kernel_nofault(insn_buf, (void *)regs->ip, MAX_INSN_SIZE))
>  		return false;
>  
> @@ -283,7 +286,7 @@ static noinstr int error_context(struct mce *m, struct pt_regs *regs)
>  	switch (fixup_type) {
>  	case EX_TYPE_UACCESS:
>  	case EX_TYPE_COPY:
> -		if (!regs || !copy_user)
> +		if (!copy_user)
>  			return IN_KERNEL;
>  		m->kflags |= MCE_IN_KERNEL_COPYIN;
>  		fallthrough;
> 

Looks good to me.

Reviewed-by: Tony Luck <tony.luck@intel.com>

-Tony

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [PATCH] x86/mce: Check regs before accessing it
  2021-12-17 17:13   ` Luck, Tony
@ 2021-12-17 23:50     ` Borislav Petkov
  0 siblings, 0 replies; 4+ messages in thread
From: Borislav Petkov @ 2021-12-17 23:50 UTC (permalink / raw)
  To: Luck, Tony; +Cc: Dan Carpenter, linux-edac, lkml

From: Borislav Petkov <bp@suse.de>

Commit in Fixes accesses pt_regs before checking whether it is NULL or
not. Change the flow so that the NULL pointer check happens first.

Fixes: 0a5b288e85bb ("x86/mce: Prevent severity computation from being instrumented")
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Reviewed-by: Tony Luck <tony.luck@intel.com>
Link: https://lore.kernel.org/r/20211217102029.GA29708@kili
---
 arch/x86/kernel/cpu/mce/severity.c | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/arch/x86/kernel/cpu/mce/severity.c b/arch/x86/kernel/cpu/mce/severity.c
index a32646769705..7aa2bda93cbb 100644
--- a/arch/x86/kernel/cpu/mce/severity.c
+++ b/arch/x86/kernel/cpu/mce/severity.c
@@ -222,6 +222,9 @@ static bool is_copy_from_user(struct pt_regs *regs)
 	struct insn insn;
 	int ret;
 
+	if (!regs)
+		return false;
+
 	if (copy_from_kernel_nofault(insn_buf, (void *)regs->ip, MAX_INSN_SIZE))
 		return false;
 
@@ -283,7 +286,7 @@ static noinstr int error_context(struct mce *m, struct pt_regs *regs)
 	switch (fixup_type) {
 	case EX_TYPE_UACCESS:
 	case EX_TYPE_COPY:
-		if (!regs || !copy_user)
+		if (!copy_user)
 			return IN_KERNEL;
 		m->kflags |= MCE_IN_KERNEL_COPYIN;
 		fallthrough;
-- 
2.29.2


-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

^ permalink raw reply related	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2021-12-17 23:50 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2021-12-17 10:20 [bug report] x86/mce: Prevent severity computation from being instrumented Dan Carpenter
2021-12-17 11:29 ` Borislav Petkov
2021-12-17 17:13   ` Luck, Tony
2021-12-17 23:50     ` [PATCH] x86/mce: Check regs before accessing it Borislav Petkov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox