From: "Krzysztof Wilczyński" <kw@linux.com>
To: Kurt Schwemmer <kurt.schwemmer@microsemi.com>
Cc: Logan Gunthorpe <logang@deltatee.com>,
Bjorn Helgaas <helgaas@kernel.org>,
"Gustavo A . R . Silva" <gustavo@embeddedor.com>,
linux-pci@vger.kernel.org
Subject: [PATCH] PCI/switchtec: Fix Spectre v1 vulnerability
Date: Sat, 20 Feb 2021 06:28:37 +0000 [thread overview]
Message-ID: <20210220062837.1683159-1-kw@linux.com> (raw)
The "partition" member of the struct switchtec_ioctl_pff_port can be
indirectly controlled from user-space through an IOCTL that the device
driver provides enabling conversion between a PCI Function Framework
(PFF) number and Switchtec logical port ID and partition number, thus
allowing for command-line tooling [1] interact with the device from
user-space.
This can lead to potential exploitation of the Spectre variant 1 [2]
vulnerability since the value of the partition is then used directly
as an index to mmio_part_cfg_all of the struct switchtec_dev to retrieve
configuration from Switchtec for a specific partition number.
Fix this by sanitizing the value coming from user-space through the
available IOCTL before it's then used as an index to mmio_part_cfg_all.
This issue was detected with the help of Smatch:
drivers/pci/switch/switchtec.c:1118 ioctl_port_to_pff() warn:
potential spectre issue 'stdev->mmio_part_cfg_all' [r] (local cap)
Notice that given that speculation windows are large, the policy is
to kill the speculation on the first load and not worry if it can be
completed with a dependent load/store [3].
Related commit 46feb6b495f7 ("switchtec: Fix Spectre v1 vulnerability").
1. https://github.com/Microsemi/switchtec-user/blob/master/lib/platform/linux.c
2. https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/spectre.html
3. https://lore.kernel.org/lkml/CAPcyv4gLKYiCtXsKFX2FY+rW93aRtQt9zB8hU1hMsj770m8gxQ@mail.gmail.com/
Signed-off-by: Krzysztof Wilczyński <kw@linux.com>
---
drivers/pci/switch/switchtec.c | 9 ++++++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/drivers/pci/switch/switchtec.c b/drivers/pci/switch/switchtec.c
index ba52459928f7..bb6957101fc0 100644
--- a/drivers/pci/switch/switchtec.c
+++ b/drivers/pci/switch/switchtec.c
@@ -1112,12 +1112,15 @@ static int ioctl_port_to_pff(struct switchtec_dev *stdev,
if (copy_from_user(&p, up, sizeof(p)))
return -EFAULT;
- if (p.partition == SWITCHTEC_IOCTL_EVENT_LOCAL_PART_IDX)
+ if (p.partition == SWITCHTEC_IOCTL_EVENT_LOCAL_PART_IDX) {
pcfg = stdev->mmio_part_cfg;
- else if (p.partition < stdev->partition_count)
+ } else if (p.partition < stdev->partition_count) {
+ p.partition = array_index_nospec(p.partition,
+ stdev->partition_count);
pcfg = &stdev->mmio_part_cfg_all[p.partition];
- else
+ } else {
return -EINVAL;
+ }
switch (p.port) {
case 0:
--
2.30.0
next reply other threads:[~2021-02-20 6:29 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-02-20 6:28 Krzysztof Wilczyński [this message]
2021-02-22 16:37 ` [PATCH] PCI/switchtec: Fix Spectre v1 vulnerability Logan Gunthorpe
2021-03-10 22:09 ` Bjorn Helgaas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210220062837.1683159-1-kw@linux.com \
--to=kw@linux.com \
--cc=gustavo@embeddedor.com \
--cc=helgaas@kernel.org \
--cc=kurt.schwemmer@microsemi.com \
--cc=linux-pci@vger.kernel.org \
--cc=logang@deltatee.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox