Re: [PATCH kvmtool 5/5] mmio: Sanitize addr and len

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

On Mon, Mar 28, 2022 at 12:00:30AM +0300, Martin Radev wrote:
> Thanks Alex.
> 
> I needed to make a small update to the patch as you recommented in one
> of the other emails. I still kept the reviewed by line with your name.

That's quite fine, please send it in a new iteration of the series.

Thanks,
Alex

> 
> From 090f373c0bc868cc4551620568d47b21b6ac044a Mon Sep 17 00:00:00 2001
> From: Martin Radev <martin.b.radev@xxxxxxxxx>
> Date: Mon, 17 Jan 2022 23:17:25 +0200
> Subject: [PATCH kvmtool 2/6] mmio: Sanitize addr and len
> 
> This patch verifies that adding the addr and length arguments
> from an MMIO op do not overflow. This is necessary because the
> arguments are controlled by the VM. The length may be set to
> an arbitrary value by using the rep prefix.
> 
> Reviewed-by: Alexandru Elisei <alexandru.elisei@xxxxxxx>
> Signed-off-by: Martin Radev <martin.b.radev@xxxxxxxxx>
> ---
>  mmio.c        | 4 ++++
>  virtio/mmio.c | 6 ++++++
>  2 files changed, 10 insertions(+)
> 
> diff --git a/mmio.c b/mmio.c
> index a6dd3aa..5a114e9 100644
> --- a/mmio.c
> +++ b/mmio.c
> @@ -32,6 +32,10 @@ static struct mmio_mapping *mmio_search(struct rb_root *root, u64 addr, u64 len)
>  {
>  	struct rb_int_node *node;
>  
> +	/* If len is zero or if there's an overflow, the MMIO op is invalid. */
> +	if (addr + len <= addr)
> +		return NULL;
> +
>  	node = rb_int_search_range(root, addr, addr + len);
>  	if (node == NULL)
>  		return NULL;
> diff --git a/virtio/mmio.c b/virtio/mmio.c
> index 875a288..979fa8c 100644
> --- a/virtio/mmio.c
> +++ b/virtio/mmio.c
> @@ -105,6 +105,12 @@ static void virtio_mmio_device_specific(struct kvm_cpu *vcpu,
>  	struct virtio_mmio *vmmio = vdev->virtio;
>  	u32 i;
>  
> +	/* Check for wrap-around and zero length. */
> +	if (addr + len <= addr) {
> +		WARN_ONCE(1, "addr (%llu) + length (%u) wraps-around.\n", addr, len);
> +		return;
> +	}
> +
>  	for (i = 0; i < len; i++) {
>  		if (is_write)
>  			vdev->ops->get_config(vmmio->kvm, vmmio->dev)[addr + i] =
> -- 
> 2.25.1
> 
> On Wed, Mar 16, 2022 at 03:39:55PM +0000, Alexandru Elisei wrote:
> > Hi,
> > 
> > On Fri, Mar 04, 2022 at 01:10:50AM +0200, Martin Radev wrote:
> > > This patch verifies that adding the addr and length arguments
> > > from an MMIO op do not overflow. This is necessary because the
> > > arguments are controlled by the VM. The length may be set to
> > > an arbitrary value by using the rep prefix.
> > > 
> > > Signed-off-by: Martin Radev <martin.b.radev@xxxxxxxxx>
> > 
> > The patch looks correct to me:
> > 
> > Reviewed-by: Alexandru Elisei <alexandru.elisei@xxxxxxx>
> > 
> > Thanks,
> > Alex
> > 
> > > ---
> > >  mmio.c | 4 ++++
> > >  1 file changed, 4 insertions(+)
> > > 
> > > diff --git a/mmio.c b/mmio.c
> > > index a6dd3aa..5a114e9 100644
> > > --- a/mmio.c
> > > +++ b/mmio.c
> > > @@ -32,6 +32,10 @@ static struct mmio_mapping *mmio_search(struct rb_root *root, u64 addr, u64 len)
> > >  {
> > >  	struct rb_int_node *node;
> > >  
> > > +	/* If len is zero or if there's an overflow, the MMIO op is invalid. */
> > > +	if (addr + len <= addr)
> > > +		return NULL;
> > > +
> > >  	node = rb_int_search_range(root, addr, addr + len);
> > >  	if (node == NULL)
> > >  		return NULL;
> > > -- 
> > > 2.25.1
> > > 



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux