summaryrefslogtreecommitdiff
path: root/kernel
diff options
context:
space:
mode:
authorAndreas Herrmann <andreas.herrmann3@amd.com>2012-07-31 15:41:45 +0200
committerH. Peter Anvin <hpa@linux.intel.com>2012-08-22 16:10:41 -0700
commit36bf50d7697be18c6bfd0401e037df10bff1e573 (patch)
treee32aeb6e6077c3eecc569f9f2ad4f393ba8b63d8 /kernel
parentcb09cad44f07044d9810f18f6f9a6a6f3771f979 (diff)
x86, microcode, AMD: Fix broken ucode patch size check
This issue was recently observed on an AMD C-50 CPU where a patch of maximum size was applied. Commit be62adb49294 ("x86, microcode, AMD: Simplify ucode verification") added current_size in get_matching_microcode(). This is calculated as size of the ucode patch + 8 (ie. size of the header). Later this is compared against the maximum possible ucode patch size for a CPU family. And of course this fails if the patch has already maximum size. Cc: <stable@vger.kernel.org> [3.3+] Signed-off-by: Andreas Herrmann <andreas.herrmann3@amd.com> Signed-off-by: Borislav Petkov <borislav.petkov@amd.com> Link: http://lkml.kernel.org/r/1344361461-10076-1-git-send-email-bp@amd64.org Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions