lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3E5A0FA7E9CA944F9D5414FEC6C71220077879BF@ORSMSX105.amr.corp.intel.com>
Date:	Sun, 19 Aug 2012 02:38:46 +0000
From:	"Yu, Fenghua" <fenghua.yu@...el.com>
To:	Henrique de Moraes Holschuh <hmh@....eng.br>
CC:	H Peter Anvin <hpa@...or.com>, Ingo Molnar <mingo@...e.hu>,
	Thomas Gleixner <tglx@...utronix.de>,
	"Mallick, Asit K" <asit.k.mallick@...el.com>,
	Tigran Aivazian <tigran@...azian.fsnet.co.uk>,
	Andreas Herrmann <andreas.herrmann3@....com>,
	Borislav Petkov <borislav.petkov@....com>,
	linux-kernel <linux-kernel@...r.kernel.org>, x86 <x86@...nel.org>
Subject: RE: [PATCH 04/11] x86/microcode_core_early.c: Define interfaces for
 early load ucode

> -----Original Message-----
> From: Henrique de Moraes Holschuh [mailto:hmh@....eng.br]
> Sent: Saturday, August 18, 2012 3:45 PM
> To: Yu, Fenghua
> Cc: H Peter Anvin; Ingo Molnar; Thomas Gleixner; Mallick, Asit K;
> Tigran Aivazian; Andreas Herrmann; Borislav Petkov; linux-kernel; x86
> Subject: Re: [PATCH 04/11] x86/microcode_core_early.c: Define
> interfaces for early load ucode
> 
> On Sat, 18 Aug 2012, Fenghua Yu wrote:
> > +	char ucode_name[] =
> "kernel/x86/microcode/GenuineIntel/microcode.hex";
> 
> Why name it ".hex" when you're loading binary data?  I suggest ".bin".
> It
> is confusing to have .hex there, since you're not dealing with the
> Intel HEX
> format, nor anything text-like.
> 
> > +void __init load_ucode_bsp(char *real_mode_data)
> > +{
> > +	u64 ramdisk_image, ramdisk_size, ramdisk_end;
> > +	unsigned long initrd_start, initrd_end;
> > +	struct boot_params *boot_params;
> > +
> > +	boot_params = (struct boot_params *)real_mode_data;
> > +	ramdisk_image = boot_params->hdr.ramdisk_image;
> > +	ramdisk_size  = boot_params->hdr.ramdisk_size;
> > +
> > +#ifdef CONFIG_X86_64
> > +	ramdisk_end  = PAGE_ALIGN(ramdisk_image + ramdisk_size);
> > +	initrd_start = ramdisk_image + PAGE_OFFSET;
> > +#else
> > +	ramdisk_end  = ramdisk_image + ramdisk_size;
> > +	initrd_start = ramdisk_image;
> > +#endif
> > +	initrd_end = initrd_start + ramdisk_size;
> > +
> > +	/*
> > +	 * It's early to get CPU vendor info at this point.
> > +	 * By searching initrd to find right name for vendor's microcode,
> > +	 * it's relative easier to get CPU vendor info.
> > +	 */
> > +	if (find_ucode_intel(initrd_start, initrd_end) == UCODE_OK)
> > +		load_ucode_intel_bsp(real_mode_data);
> > +}
> 
> I'd say something down the load_ucode_intel_bsp() chain better check
> the CPU
> vendor to make sure the Intel driver won't attempt to load microcode on
> some
> other vendor's processor.
> 
> Or are cpu signatures a global namespace and x86 cpu vendors make sure
> (past, present and future) to never use the same cpu signature as
> someone
> else is going to use?  Anyway, it would still might be a good thing to
> do
> the vendor check somewhere to avoid wasting time going over every
> microcode
> of the wrong vendor on generic boot images that have both AMD and Intel
> microcode.
> 

In this early phase, detecting vendor in initrd is much simpler code. Otherwise, detecting vendor by cpuid (and without cpuid) needs similar but different code as existing functions and coding would be awkward. 

I fully thought and agreed the usage complexity you describe here. It might be good thing to do a bit ugly but more practical coding here.

Thanks.

-Fenghua
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ