From: "Laszlo Ersek" <lersek@redhat.com>
To: Zhichao Gao <zhichao.gao@intel.com>, devel@edk2.groups.io
Cc: Eric Dong <eric.dong@intel.com>, Ray Ni <ray.ni@intel.com>,
Liming Gao <liming.gao@intel.com>
Subject: Re: [PATCH] UefiCpuPkg/MpInitLib: Move checksum part for valid microcode data
Date: Mon, 24 Jun 2019 22:33:43 +0200 [thread overview]
Message-ID: <f754f038-a595-537f-60cc-ccbefbf91c04@redhat.com> (raw)
In-Reply-To: <20190624061437.33744-1-zhichao.gao@intel.com>
On 06/24/19 08:14, Zhichao Gao wrote:
> REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1934
>
> Originally, the checksum part would done before verfiy the microcode
> data. Which meas the checksum would be done for a meaningless data.
> It would cause a incorrect TotalSize (the size of microcode data),
> then incorrect checksum and incorrect pointer increasing would happen.
> To fix this, move the checksum part 1 section in
> 'if (MicrocodeEntryPoint->HeaderVersion == 0x1)' section for a valid
> microcode data.
>
> Cc: Eric Dong <eric.dong@intel.com>
> Cc: Ray Ni <ray.ni@intel.com>
> Cc: Laszlo Ersek <lersek@redhat.com>
> Cc: Liming Gao <liming.gao@intel.com>
> Signed-off-by: Zhichao Gao <zhichao.gao@intel.com>
> ---
> UefiCpuPkg/Library/MpInitLib/Microcode.c | 52 ++++++++++++------------
> 1 file changed, 26 insertions(+), 26 deletions(-)
I'll defer on this patch to the (other) UefiCpuPkg reviewers /
maintainers. OVMF inherits the default zero value for
"PcdCpuMicrocodePatchRegionSize", from "UefiCpuPkg.dec". Therefore the
first check in MicrocodeDetect() evaluates to TRUE, and the function
exits immediately, in OVMF.
Thanks
Laszlo
> diff --git a/UefiCpuPkg/Library/MpInitLib/Microcode.c b/UefiCpuPkg/Library/MpInitLib/Microcode.c
> index 4763dcfebe..f1a42f2d4e 100644
> --- a/UefiCpuPkg/Library/MpInitLib/Microcode.c
> +++ b/UefiCpuPkg/Library/MpInitLib/Microcode.c
> @@ -1,7 +1,7 @@
> /** @file
> Implementation of loading microcode on processors.
>
> - Copyright (c) 2015 - 2018, Intel Corporation. All rights reserved.<BR>
> + Copyright (c) 2015 - 2019, Intel Corporation. All rights reserved.<BR>
> SPDX-License-Identifier: BSD-2-Clause-Patent
>
> **/
> @@ -160,34 +160,34 @@ MicrocodeDetect (
> //
> CorrectMicrocode = FALSE;
>
> - if (MicrocodeEntryPoint->DataSize == 0) {
> - TotalSize = sizeof (CPU_MICROCODE_HEADER) + 2000;
> - } else {
> - TotalSize = sizeof (CPU_MICROCODE_HEADER) + MicrocodeEntryPoint->DataSize;
> - }
> + if (MicrocodeEntryPoint->HeaderVersion == 0x1) {
> + if (MicrocodeEntryPoint->DataSize == 0) {
> + TotalSize = sizeof (CPU_MICROCODE_HEADER) + 2000;
> + } else {
> + TotalSize = sizeof (CPU_MICROCODE_HEADER) + MicrocodeEntryPoint->DataSize;
> + }
>
> - ///
> - /// Check overflow and whether TotalSize is aligned with 4 bytes.
> - ///
> - if ( ((UINTN)MicrocodeEntryPoint + TotalSize) > MicrocodeEnd ||
> - (TotalSize & 0x3) != 0
> - ) {
> - MicrocodeEntryPoint = (CPU_MICROCODE_HEADER *) (((UINTN) MicrocodeEntryPoint) + SIZE_1KB);
> - continue;
> - }
> + ///
> + /// Check overflow and whether TotalSize is aligned with 4 bytes.
> + ///
> + if ( ((UINTN)MicrocodeEntryPoint + TotalSize) > MicrocodeEnd ||
> + (TotalSize & 0x3) != 0
> + ) {
> + MicrocodeEntryPoint = (CPU_MICROCODE_HEADER *) (((UINTN) MicrocodeEntryPoint) + SIZE_1KB);
> + continue;
> + }
>
> - //
> - // Save an in-complete CheckSum32 from CheckSum Part1 for common parts.
> - //
> - InCompleteCheckSum32 = CalculateSum32 (
> - (UINT32 *) MicrocodeEntryPoint,
> - TotalSize
> - );
> - InCompleteCheckSum32 -= MicrocodeEntryPoint->ProcessorSignature.Uint32;
> - InCompleteCheckSum32 -= MicrocodeEntryPoint->ProcessorFlags;
> - InCompleteCheckSum32 -= MicrocodeEntryPoint->Checksum;
> + //
> + // Save an in-complete CheckSum32 from CheckSum Part1 for common parts.
> + //
> + InCompleteCheckSum32 = CalculateSum32 (
> + (UINT32 *) MicrocodeEntryPoint,
> + TotalSize
> + );
> + InCompleteCheckSum32 -= MicrocodeEntryPoint->ProcessorSignature.Uint32;
> + InCompleteCheckSum32 -= MicrocodeEntryPoint->ProcessorFlags;
> + InCompleteCheckSum32 -= MicrocodeEntryPoint->Checksum;
>
> - if (MicrocodeEntryPoint->HeaderVersion == 0x1) {
> //
> // It is the microcode header. It is not the padding data between microcode patches
> // because the padding data should not include 0x00000001 and it should be the repeated
>
prev parent reply other threads:[~2019-06-24 20:33 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-06-24 6:14 [PATCH] UefiCpuPkg/MpInitLib: Move checksum part for valid microcode data Gao, Zhichao
2019-06-24 20:33 ` Laszlo Ersek [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=f754f038-a595-537f-60cc-ccbefbf91c04@redhat.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox