From: Christopher Covington <cov@codeaurora.org>
To: Andre Przywara <andre.przywara@arm.com>
Cc: christoffer.dall@linaro.org, marc.zyngier@arm.com,
kvmarm@lists.cs.columbia.edu,
linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org
Subject: Re: [PATCH] KVM: arm/arm64: check IRQ number on userland injection
Date: Fri, 10 Apr 2015 11:29:22 -0400 [thread overview]
Message-ID: <5527EC52.4050500@codeaurora.org> (raw)
In-Reply-To: <1428679079-16499-1-git-send-email-andre.przywara@arm.com>
Hi Andre,
On 04/10/2015 11:17 AM, Andre Przywara wrote:
> When userland injects a SPI via the KVM_IRQ_LINE ioctl we currently
> only check it against a fixed limit, which historically is set
> to 127. With the new dynamic IRQ allocation the effective limit may
> actually be smaller (64).
> So when now a malicious or buggy userland injects a SPI in that
> range, we spill over on our VGIC bitmaps and bytemaps memory.
> I could trigger a host kernel NULL pointer dereference with current
> mainline by injecting some bogus IRQ number from a hacked kvmtool:
> --- a/arch/arm/include/uapi/asm/kvm.h
> +++ b/arch/arm/include/uapi/asm/kvm.h
> @@ -195,7 +195,11 @@ struct kvm_arch_memory_slot {
> #define KVM_ARM_IRQ_CPU_IRQ 0
> #define KVM_ARM_IRQ_CPU_FIQ 1
>
> -/* Highest supported SPI, from VGIC_NR_IRQS */
> +/*
> + * This used to hold the highest supported SPI, but it is now obsolete
> + * and only here to provide source code level compatibility with older
> + * userland. The highest SPI number can be set via KVM_DEV_ARM_VGIC_GRP_NR_IRQS.
> + */
> #define KVM_ARM_IRQ_GIC_MAX 127
If that's the case should it maybe only defined when __KERNEL__ is not defined?
Chris
--
Qualcomm Innovation Center, Inc.
The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum,
a Linux Foundation Collaborative Project
WARNING: multiple messages have this Message-ID (diff)
From: cov@codeaurora.org (Christopher Covington)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH] KVM: arm/arm64: check IRQ number on userland injection
Date: Fri, 10 Apr 2015 11:29:22 -0400 [thread overview]
Message-ID: <5527EC52.4050500@codeaurora.org> (raw)
In-Reply-To: <1428679079-16499-1-git-send-email-andre.przywara@arm.com>
Hi Andre,
On 04/10/2015 11:17 AM, Andre Przywara wrote:
> When userland injects a SPI via the KVM_IRQ_LINE ioctl we currently
> only check it against a fixed limit, which historically is set
> to 127. With the new dynamic IRQ allocation the effective limit may
> actually be smaller (64).
> So when now a malicious or buggy userland injects a SPI in that
> range, we spill over on our VGIC bitmaps and bytemaps memory.
> I could trigger a host kernel NULL pointer dereference with current
> mainline by injecting some bogus IRQ number from a hacked kvmtool:
> --- a/arch/arm/include/uapi/asm/kvm.h
> +++ b/arch/arm/include/uapi/asm/kvm.h
> @@ -195,7 +195,11 @@ struct kvm_arch_memory_slot {
> #define KVM_ARM_IRQ_CPU_IRQ 0
> #define KVM_ARM_IRQ_CPU_FIQ 1
>
> -/* Highest supported SPI, from VGIC_NR_IRQS */
> +/*
> + * This used to hold the highest supported SPI, but it is now obsolete
> + * and only here to provide source code level compatibility with older
> + * userland. The highest SPI number can be set via KVM_DEV_ARM_VGIC_GRP_NR_IRQS.
> + */
> #define KVM_ARM_IRQ_GIC_MAX 127
If that's the case should it maybe only defined when __KERNEL__ is not defined?
Chris
--
Qualcomm Innovation Center, Inc.
The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum,
a Linux Foundation Collaborative Project
next prev parent reply other threads:[~2015-04-10 15:29 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-04-10 15:17 [PATCH] KVM: arm/arm64: check IRQ number on userland injection Andre Przywara
2015-04-10 15:17 ` Andre Przywara
2015-04-10 15:25 ` Marc Zyngier
2015-04-10 15:25 ` Marc Zyngier
2015-04-10 16:43 ` Paolo Bonzini
2015-04-10 16:43 ` Paolo Bonzini
2015-04-10 16:46 ` Marc Zyngier
2015-04-10 16:46 ` Marc Zyngier
2015-04-10 15:29 ` Christopher Covington [this message]
2015-04-10 15:29 ` Christopher Covington
2015-04-10 16:52 ` Andre Przywara
2015-04-10 16:52 ` Andre Przywara
2015-04-13 10:04 ` Christoffer Dall
2015-04-13 10:04 ` Christoffer Dall
2015-04-13 10:21 ` Marc Zyngier
2015-04-13 10:21 ` Marc Zyngier
2015-04-13 10:35 ` Christoffer Dall
2015-04-13 10:35 ` Christoffer Dall
2015-04-13 10:21 ` Andre Przywara
2015-04-13 10:21 ` Andre Przywara
2015-04-13 10:02 ` Christoffer Dall
2015-04-13 10:02 ` Christoffer Dall
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5527EC52.4050500@codeaurora.org \
--to=cov@codeaurora.org \
--cc=andre.przywara@arm.com \
--cc=christoffer.dall@linaro.org \
--cc=kvm@vger.kernel.org \
--cc=kvmarm@lists.cs.columbia.edu \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=marc.zyngier@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.