public inbox for linux-s390@vger.kernel.org
 help / color / mirror / Atom feed
* buffer overflow in vfio_ccw_async_region_write/vfio_ccw_async_region_read
@ 2022-07-12  9:52 sohu0106
  2022-08-30 19:13 ` Eric Farman
  0 siblings, 1 reply; 2+ messages in thread
From: sohu0106 @ 2022-07-12  9:52 UTC (permalink / raw)
  To: vneethv, oberpar; +Cc: linux-s390


In the vfio_ccw_async_region_write/vfio_ccw_async_region_read function of drivers/s390/cio/vfio_ccw_async.c, parameter "size_t count" is pass by userland, if "count" is very large, it will bypass "if (pos + count > sizeof(*region))".(such as count=0xffffffff). Then it will lead to buffer overflow in "copy_from_user((void *)region + pos, buf, count)". 




diff --git a/vfio_ccw_async.c_org b/vfio_ccw_async.c
index 7a838e3..33339ad 100644
--- a/vfio_ccw_async.c_org
+++ b/vfio_ccw_async.c
@@ -21,7 +21,7 @@ static ssize_t vfio_ccw_async_region_read(struct vfio_ccw_private *private,
        struct ccw_cmd_region *region;
        int ret;


-       if (pos + count > sizeof(*region))
+       if (pos + count > sizeof(*region) && pos + count > pos)
                return -EINVAL;


        mutex_lock(&private->io_mutex);
@@ -43,7 +43,7 @@ static ssize_t vfio_ccw_async_region_write(struct vfio_ccw_private *private,
        struct ccw_cmd_region *region;
        int ret;


-       if (pos + count > sizeof(*region))
+       if (pos + count > sizeof(*region) && pos + count > pos)
                return -EINVAL;


        if (!mutex_trylock(&private->io_mutex))


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: buffer overflow in vfio_ccw_async_region_write/vfio_ccw_async_region_read
  2022-07-12  9:52 buffer overflow in vfio_ccw_async_region_write/vfio_ccw_async_region_read sohu0106
@ 2022-08-30 19:13 ` Eric Farman
  0 siblings, 0 replies; 2+ messages in thread
From: Eric Farman @ 2022-08-30 19:13 UTC (permalink / raw)
  To: sohu0106, vneethv, oberpar; +Cc: linux-s390

(Apologies for the delay; I was on holiday when this came in and it was
lost in the noise.)

On Tue, 2022-07-12 at 17:52 +0800, sohu0106 wrote:
> > 
> > In the vfio_ccw_async_region_write/vfio_ccw_async_region_read >
> > function of drivers/s390/cio/vfio_ccw_async.c, parameter "size_t >
> > count" is pass by userland, if "count" is very large, it will
> > bypass > "if (pos + count > sizeof(*region))".(such as
> > count=0xffffffff). Then > it will lead to buffer overflow in
> > "copy_from_user((void *)region + > pos, buf, count)". 

There are some mechanical problems with this patch. It needs a Signed-
off-by tag, and is not applicable in its current form. All easy to
resolve, and documented in: 

Documentation/process/submitting-patches.rst

Having said that, I'm not sure that the problem exists as you describe.
In my tests, submitting a very large count (0xffffffff, per your
example) gets capped to MAX_RW_COUNT [1] before it gets here. If you
have a mechanism that shows otherwise, I'd like to see it so that I can
revisit my own test scenarios. Seeing it fail would imply that the
async region is not the only one affected, and a new version of this
patch would need to also address the io and schib regions in vfio-ccw.

Thanks,
Eric

[1]
https://lore.kernel.org/all/CAADWXX9rrESSEGmA4C9F85E9jo7H-pv+CUtyAU_kyB=DfcHRpA@mail.gmail.com/


> > 
> > 
> > 
> > 
> > diff --git a/vfio_ccw_async.c_org b/vfio_ccw_async.c
> > index 7a838e3..33339ad 100644
> > --- a/vfio_ccw_async.c_org
> > +++ b/vfio_ccw_async.c
> > @@ -21,7 +21,7 @@ static ssize_t vfio_ccw_async_region_read(struct
> > > vfio_ccw_private *private,
> >         struct ccw_cmd_region *region;
> >         int ret;
> > 
> > 
> > -       if (pos + count > sizeof(*region))
> > +       if (pos + count > sizeof(*region) && pos + count > pos)
> >                 return -EINVAL;
> > 
> > 
> >         mutex_lock(&private->io_mutex);
> > @@ -43,7 +43,7 @@ static ssize_t vfio_ccw_async_region_write(struct
> > > vfio_ccw_private *private,
> >         struct ccw_cmd_region *region;
> >         int ret;
> > 
> > 
> > -       if (pos + count > sizeof(*region))
> > +       if (pos + count > sizeof(*region) && pos + count > pos)
> >                 return -EINVAL;
> > 
> > 
> >         if (!mutex_trylock(&private->io_mutex))
> > 


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-08-30 19:13 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-07-12  9:52 buffer overflow in vfio_ccw_async_region_write/vfio_ccw_async_region_read sohu0106
2022-08-30 19:13 ` Eric Farman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox