From: Andre Przywara <andre.przywara@arm.com>
To: Christopher Covington <cov@codeaurora.org>
Cc: Marc Zyngier <Marc.Zyngier@arm.com>,
"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
"kvmarm@lists.cs.columbia.edu" <kvmarm@lists.cs.columbia.edu>,
"linux-arm-kernel@lists.infradead.org"
<linux-arm-kernel@lists.infradead.org>
Subject: Re: [PATCH] KVM: arm/arm64: check IRQ number on userland injection
Date: Fri, 10 Apr 2015 17:52:05 +0100 [thread overview]
Message-ID: <5527FFB5.9020103@arm.com> (raw)
In-Reply-To: <5527EC52.4050500@codeaurora.org>
Hi Christopher,
On 10/04/15 16:29, Christopher Covington wrote:
> Hi Andre,
>
> On 04/10/2015 11:17 AM, Andre Przywara wrote:
>> When userland injects a SPI via the KVM_IRQ_LINE ioctl we currently
>> only check it against a fixed limit, which historically is set
>> to 127. With the new dynamic IRQ allocation the effective limit may
>> actually be smaller (64).
>> So when now a malicious or buggy userland injects a SPI in that
>> range, we spill over on our VGIC bitmaps and bytemaps memory.
>> I could trigger a host kernel NULL pointer dereference with current
>> mainline by injecting some bogus IRQ number from a hacked kvmtool:
>
>> --- a/arch/arm/include/uapi/asm/kvm.h
>> +++ b/arch/arm/include/uapi/asm/kvm.h
>> @@ -195,7 +195,11 @@ struct kvm_arch_memory_slot {
>> #define KVM_ARM_IRQ_CPU_IRQ 0
>> #define KVM_ARM_IRQ_CPU_FIQ 1
>>
>> -/* Highest supported SPI, from VGIC_NR_IRQS */
>> +/*
>> + * This used to hold the highest supported SPI, but it is now obsolete
>> + * and only here to provide source code level compatibility with older
>> + * userland. The highest SPI number can be set via KVM_DEV_ARM_VGIC_GRP_NR_IRQS.
>> + */
>> #define KVM_ARM_IRQ_GIC_MAX 127
>
> If that's the case should it maybe only defined when __KERNEL__ is not defined?
Mmmh, I am not sure it's really worth the hassle. Actually it seems like
that neither kvmtool nor QEMU use this definition, so it's more or less
orphaned by now. I am confident we can avoid it sneaking in in the
kernel again.
Cheers,
Andre.
WARNING: multiple messages have this Message-ID (diff)
From: andre.przywara@arm.com (Andre Przywara)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH] KVM: arm/arm64: check IRQ number on userland injection
Date: Fri, 10 Apr 2015 17:52:05 +0100 [thread overview]
Message-ID: <5527FFB5.9020103@arm.com> (raw)
In-Reply-To: <5527EC52.4050500@codeaurora.org>
Hi Christopher,
On 10/04/15 16:29, Christopher Covington wrote:
> Hi Andre,
>
> On 04/10/2015 11:17 AM, Andre Przywara wrote:
>> When userland injects a SPI via the KVM_IRQ_LINE ioctl we currently
>> only check it against a fixed limit, which historically is set
>> to 127. With the new dynamic IRQ allocation the effective limit may
>> actually be smaller (64).
>> So when now a malicious or buggy userland injects a SPI in that
>> range, we spill over on our VGIC bitmaps and bytemaps memory.
>> I could trigger a host kernel NULL pointer dereference with current
>> mainline by injecting some bogus IRQ number from a hacked kvmtool:
>
>> --- a/arch/arm/include/uapi/asm/kvm.h
>> +++ b/arch/arm/include/uapi/asm/kvm.h
>> @@ -195,7 +195,11 @@ struct kvm_arch_memory_slot {
>> #define KVM_ARM_IRQ_CPU_IRQ 0
>> #define KVM_ARM_IRQ_CPU_FIQ 1
>>
>> -/* Highest supported SPI, from VGIC_NR_IRQS */
>> +/*
>> + * This used to hold the highest supported SPI, but it is now obsolete
>> + * and only here to provide source code level compatibility with older
>> + * userland. The highest SPI number can be set via KVM_DEV_ARM_VGIC_GRP_NR_IRQS.
>> + */
>> #define KVM_ARM_IRQ_GIC_MAX 127
>
> If that's the case should it maybe only defined when __KERNEL__ is not defined?
Mmmh, I am not sure it's really worth the hassle. Actually it seems like
that neither kvmtool nor QEMU use this definition, so it's more or less
orphaned by now. I am confident we can avoid it sneaking in in the
kernel again.
Cheers,
Andre.
next prev parent reply other threads:[~2015-04-10 16:44 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-04-10 15:17 [PATCH] KVM: arm/arm64: check IRQ number on userland injection Andre Przywara
2015-04-10 15:17 ` Andre Przywara
2015-04-10 15:25 ` Marc Zyngier
2015-04-10 15:25 ` Marc Zyngier
2015-04-10 16:43 ` Paolo Bonzini
2015-04-10 16:43 ` Paolo Bonzini
2015-04-10 16:46 ` Marc Zyngier
2015-04-10 16:46 ` Marc Zyngier
2015-04-10 15:29 ` Christopher Covington
2015-04-10 15:29 ` Christopher Covington
2015-04-10 16:52 ` Andre Przywara [this message]
2015-04-10 16:52 ` Andre Przywara
2015-04-13 10:04 ` Christoffer Dall
2015-04-13 10:04 ` Christoffer Dall
2015-04-13 10:21 ` Marc Zyngier
2015-04-13 10:21 ` Marc Zyngier
2015-04-13 10:35 ` Christoffer Dall
2015-04-13 10:35 ` Christoffer Dall
2015-04-13 10:21 ` Andre Przywara
2015-04-13 10:21 ` Andre Przywara
2015-04-13 10:02 ` Christoffer Dall
2015-04-13 10:02 ` Christoffer Dall
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5527FFB5.9020103@arm.com \
--to=andre.przywara@arm.com \
--cc=Marc.Zyngier@arm.com \
--cc=cov@codeaurora.org \
--cc=kvm@vger.kernel.org \
--cc=kvmarm@lists.cs.columbia.edu \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.