Linux IOMMU Development
 help / color / mirror / Atom feed
From: Dan Carpenter <error27@gmail.com>
To: Jason Gunthorpe <jgg@ziepe.ca>
Cc: iommu@lists.linux.dev
Subject: Re: [bug report] iommufd: vfio container FD ioctl compatibility
Date: Wed, 16 Nov 2022 21:11:00 +0300	[thread overview]
Message-ID: <Y3UntBjV51+MNwep@kadam> (raw)
In-Reply-To: <Y3P2oEIICOTiVOBH@ziepe.ca>

On Tue, Nov 15, 2022 at 04:29:20PM -0400, Jason Gunthorpe wrote:
> On Tue, Nov 15, 2022 at 03:45:00PM +0300, Dan Carpenter wrote:
> > [ Resending two weeks of email because mutt + msmtp has been silently
> >   eating my outgoing mail instead of delivering it.  *sigh* -dan ]
> > 
> > Hello Jason Gunthorpe,
> > 
> > The patch 32c328dc9b73: "iommufd: vfio container FD ioctl
> > compatibility" from Dec 15, 2021, leads to the following Smatch
> > static checker warning:
> > 
> > 	drivers/iommu/iommufd/vfio_compat.c:174 iommufd_vfio_unmap_dma()
> > 	warn: potential integer overflow from user (local copy) 'unmap.iova + unmap.size'
> > 
> > drivers/iommu/iommufd/vfio_compat.c
> >     140 static int iommufd_vfio_unmap_dma(struct iommufd_ctx *ictx, unsigned int cmd,
> >     141                                   void __user *arg)
> >     142 {
> >     143         size_t minsz = offsetofend(struct vfio_iommu_type1_dma_unmap, size);
> >     144         /*
> >     145          * VFIO_DMA_UNMAP_FLAG_GET_DIRTY_BITMAP is obsoleted by the new
> >     146          * dirty tracking direction:
> >     147          *  https://lore.kernel.org/kvm/20220731125503.142683-1-yishaih@nvidia.com/
> >     148          *  https://lore.kernel.org/kvm/20220428210933.3583-1-joao.m.martins@oracle.com/
> >     149          */
> >     150         u32 supported_flags = VFIO_DMA_UNMAP_FLAG_ALL;
> >     151         struct vfio_iommu_type1_dma_unmap unmap;
> >     152         struct iommufd_ioas *ioas;
> >     153         unsigned long unmapped;
> >     154         int rc;
> >     155 
> >     156         if (copy_from_user(&unmap, arg, minsz))
> >     157                 return -EFAULT;
> >     158 
> >     159         if (unmap.argsz < minsz || unmap.flags & ~supported_flags)
> >     160                 return -EINVAL;
> >     161 
> >     162         ioas = get_compat_ioas(ictx);
> >     163         if (IS_ERR(ioas))
> >     164                 return PTR_ERR(ioas);
> >     165 
> >     166         if (unmap.flags & VFIO_DMA_UNMAP_FLAG_ALL) {
> >     167                 if (unmap.iova != 0 || unmap.size != 0) {
> >     168                         rc = -EINVAL;
> >     169                         goto err_put;
> >     170                 }
> >     171                 rc = iopt_unmap_all(&ioas->iopt, &unmapped);
> >     172         } else {
> >     173                 if (READ_ONCE(ioas->iopt.disable_large_pages)) {
> > --> 174                         unsigned long iovas[] = { unmap.iova + unmap.size - 1,
> > 
> > The unmap.iova + unmap.size addition can have an integer overflow.  It's
> > unclear to me if this is caught later or if it has any negative
> > implications.
> 
> There are no negative implications to the kernel, which is why I left
> it unchecked here.
> 
> Do you think we should have the check for the sake of static tools?

No.  I've written something like five different integer overflow checks.
One is pretty decent but the problem is a hard nut to crack.  This
heuristic here is not useful enough to the point where we'd want to
silence false positives.

regards,
dan carpenter


      reply	other threads:[~2022-11-16 18:11 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-11-15 12:45 [bug report] iommufd: vfio container FD ioctl compatibility Dan Carpenter
2022-11-15 20:29 ` Jason Gunthorpe
2022-11-16 18:11   ` Dan Carpenter [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=Y3UntBjV51+MNwep@kadam \
    --to=error27@gmail.com \
    --cc=iommu@lists.linux.dev \
    --cc=jgg@ziepe.ca \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox