From: Arnd Bergmann <arnd@arndb.de>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>,
Juergen Gross <jgross@suse.com>
Cc: Nicolas Pitre <nico@linaro.org>, Andi Kleen <ak@linux.intel.com>,
Dan Carpenter <dan.carpenter@oracle.com>,
Jan Beulich <jbeulich@suse.com>, Arnd Bergmann <arnd@arndb.de>,
xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org
Subject: [PATCH] xen: hypercall: fix out-of-bounds memcpy
Date: Fri, 2 Feb 2018 16:32:31 +0100 [thread overview]
Message-ID: <20180202153240.1190361-1-arnd@arndb.de> (raw)
The legacy hypercall handlers were originally added with
a comment explaining that "copying the argument structures in
HYPERVISOR_event_channel_op() and HYPERVISOR_physdev_op() into the local
variable is sufficiently safe" and only made sure to not write
past the end of the argument structure, the checks in linux/string.h
disagree with that, when link-time optimizations are used:
In function 'memcpy',
inlined from 'pirq_query_unmask' at drivers/xen/fallback.c:53:2,
inlined from '__startup_pirq' at drivers/xen/events/events_base.c:529:2,
inlined from 'restore_pirqs' at drivers/xen/events/events_base.c:1439:3,
inlined from 'xen_irq_resume' at drivers/xen/events/events_base.c:1581:2:
include/linux/string.h:350:3: error: call to '__read_overflow2' declared with attribute error: detected read beyond size of object passed as 2nd parameter
__read_overflow2();
^
make[3]: *** [ccLujFNx.ltrans15.ltrans.o] Error 1
make[3]: Target 'all' not remade because of errors.
lto-wrapper: fatal error: make returned 2 exit status
compilation terminated.
ld: error: lto-wrapper failed
This changes the functions so that each argument is accessed with
exactly the correct length based on the command code.
Fixes: cf47a83fb06e ("xen/hypercall: fix hypercall fallback code for very old hypervisors")
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
---
drivers/xen/fallback.c | 94 ++++++++++++++++++++++++++++----------------------
1 file changed, 53 insertions(+), 41 deletions(-)
diff --git a/drivers/xen/fallback.c b/drivers/xen/fallback.c
index b04fb64c5a91..eded8dd821ad 100644
--- a/drivers/xen/fallback.c
+++ b/drivers/xen/fallback.c
@@ -7,75 +7,87 @@
int xen_event_channel_op_compat(int cmd, void *arg)
{
- struct evtchn_op op;
+ struct evtchn_op op = { .cmd = cmd, };
+ size_t len;
int rc;
- op.cmd = cmd;
- memcpy(&op.u, arg, sizeof(op.u));
- rc = _hypercall1(int, event_channel_op_compat, &op);
-
switch (cmd) {
+ case EVTCHNOP_bind_interdomain:
+ len = sizeof(struct evtchn_bind_interdomain);
+ break;
+ case EVTCHNOP_bind_virq:
+ len = sizeof(struct evtchn_bind_virq);
+ break;
+ case EVTCHNOP_bind_pirq:
+ len = sizeof(struct evtchn_bind_pirq);
+ break;
case EVTCHNOP_close:
+ len = sizeof(struct evtchn_close);
+ break;
case EVTCHNOP_send:
+ len = sizeof(struct evtchn_send);
+ break;
+ case EVTCHNOP_alloc_unbound:
+ len = sizeof(struct evtchn_alloc_unbound);
+ break;
+ case EVTCHNOP_bind_ipi:
+ len = sizeof(struct evtchn_bind_ipi);
+ break;
+ case EVTCHNOP_status:
+ len = sizeof(struct evtchn_status);
+ break;
case EVTCHNOP_bind_vcpu:
+ len = sizeof(struct evtchn_bind_vcpu);
+ break;
case EVTCHNOP_unmask:
- /* no output */
+ len = sizeof(struct evtchn_unmask);
break;
-
-#define COPY_BACK(eop) \
- case EVTCHNOP_##eop: \
- memcpy(arg, &op.u.eop, sizeof(op.u.eop)); \
- break
-
- COPY_BACK(bind_interdomain);
- COPY_BACK(bind_virq);
- COPY_BACK(bind_pirq);
- COPY_BACK(status);
- COPY_BACK(alloc_unbound);
- COPY_BACK(bind_ipi);
-#undef COPY_BACK
-
default:
- WARN_ON(rc != -ENOSYS);
- break;
+ return -ENOSYS;
}
+ memcpy(&op.u, arg, len);
+ rc = _hypercall1(int, event_channel_op_compat, &op);
+ memcpy(arg, &op.u, len);
+
return rc;
}
EXPORT_SYMBOL_GPL(xen_event_channel_op_compat);
int xen_physdev_op_compat(int cmd, void *arg)
{
- struct physdev_op op;
+ struct physdev_op op = { .cmd = cmd, };
+ size_t len;
int rc;
- op.cmd = cmd;
- memcpy(&op.u, arg, sizeof(op.u));
- rc = _hypercall1(int, physdev_op_compat, &op);
-
switch (cmd) {
case PHYSDEVOP_IRQ_UNMASK_NOTIFY:
+ len = 0;
+ break;
+ case PHYSDEVOP_irq_status_query:
+ len = sizeof(struct physdev_irq_status_query);
+ break;
case PHYSDEVOP_set_iopl:
+ len = sizeof(struct physdev_set_iopl);
+ break;
case PHYSDEVOP_set_iobitmap:
+ len = sizeof(struct physdev_set_iobitmap);
+ break;
+ case PHYSDEVOP_apic_read:
case PHYSDEVOP_apic_write:
- /* no output */
+ len = sizeof(struct physdev_apic);
break;
-
-#define COPY_BACK(pop, fld) \
- case PHYSDEVOP_##pop: \
- memcpy(arg, &op.u.fld, sizeof(op.u.fld)); \
- break
-
- COPY_BACK(irq_status_query, irq_status_query);
- COPY_BACK(apic_read, apic_op);
- COPY_BACK(ASSIGN_VECTOR, irq_op);
-#undef COPY_BACK
-
- default:
- WARN_ON(rc != -ENOSYS);
+ case PHYSDEVOP_ASSIGN_VECTOR:
+ len = sizeof(struct physdev_irq);
break;
+ default:
+ return -ENOSYS;
}
+ memcpy(&op.u, arg, len);
+ rc = _hypercall1(int, physdev_op_compat, &op);
+ memcpy(arg, &op.u, len);
+
return rc;
}
EXPORT_SYMBOL_GPL(xen_physdev_op_compat);
--
2.9.0
next reply other threads:[~2018-02-02 15:33 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-02-02 15:32 Arnd Bergmann [this message]
2018-02-02 15:53 ` [PATCH] xen: hypercall: fix out-of-bounds memcpy Dan Carpenter
2018-02-02 16:11 ` Arnd Bergmann
2018-02-02 16:34 ` Dan Carpenter
2018-02-02 23:33 ` Boris Ostrovsky
2018-02-03 15:12 ` Arnd Bergmann
2018-02-03 17:08 ` Boris Ostrovsky
2018-02-04 15:35 ` Arnd Bergmann
2018-02-04 18:55 ` Boris Ostrovsky
2018-02-05 12:11 ` David Laight
2018-02-05 12:37 ` Arnd Bergmann
2018-02-05 13:58 ` David Laight
2018-02-05 14:18 ` Arnd Bergmann
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180202153240.1190361-1-arnd@arndb.de \
--to=arnd@arndb.de \
--cc=ak@linux.intel.com \
--cc=boris.ostrovsky@oracle.com \
--cc=dan.carpenter@oracle.com \
--cc=jbeulich@suse.com \
--cc=jgross@suse.com \
--cc=linux-kernel@vger.kernel.org \
--cc=nico@linaro.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox