From: "Dr. David Alan Gilbert" <dgilbert@redhat.com>
To: "Philippe Mathieu-Daudé" <philmd@redhat.com>
Cc: "Daniel P . Berrange" <berrange@redhat.com>,
qemu-trivial@nongnu.org, "Markus Armbruster" <armbru@redhat.com>,
qemu-devel@nongnu.org,
"Fakhri Zulkifli" <mohdfakhrizulkifli@gmail.com>,
qemu-stable@nongnu.org,
"Marc-André Lureau" <marcandre.lureau@redhat.com>,
"Stefan Hajnoczi" <stefanha@redhat.com>,
"Paolo Bonzini" <pbonzini@redhat.com>,
"Sameeh Jubran" <sjubran@redhat.com>,
"Basil Salman" <basil@daynix.com>,
"Dietmar Maurer" <dietmar@proxmox.com>
Subject: Re: [PATCH-for-5.0] qga-posix: Avoid crashing process when failing to allocate memory
Date: Mon, 30 Mar 2020 17:38:05 +0100 [thread overview]
Message-ID: <20200330163805.GB2843@work-vm> (raw)
In-Reply-To: <81317f7f-7de9-f616-27dc-c389f06792c3@redhat.com>
* Philippe Mathieu-Daudé (philmd@redhat.com) wrote:
> Cc'ing the ppl who responded the thread you quoted.
>
> On 3/30/20 4:11 PM, Markus Armbruster wrote:
> > Philippe Mathieu-Daudé <philmd@redhat.com> writes:
> > ---
> > qga/commands-posix.c | 8 +++++++-
> > 1 file changed, 7 insertions(+), 1 deletion(-)
> >
> > diff --git a/qga/commands-posix.c b/qga/commands-posix.c
> > index 93474ff770..8f127788e6 100644
> > --- a/qga/commands-posix.c
> > +++ b/qga/commands-posix.c
> > @@ -493,7 +493,13 @@ struct GuestFileRead *qmp_guest_file_read(int64_t
> handle, bool has_count,
> > gfh->state = RW_STATE_NEW;
> > }
> >
> > - buf = g_malloc0(count+1);
> > + buf = g_try_malloc0(count + 1);
> > + if (!buf) {
> > + error_setg(errp,
> > + "failed to allocate sufficient memory "
> > + "to complete the requested service");
> > + return NULL;
> > + }
> > read_count = fread(buf, 1, count, fh);
> > if (ferror(fh)) {
> > error_setg_errno(errp, errno, "failed to read file");
> >
>
> > > On 3/25/20 7:19 AM, Dietmar Maurer wrote:
> > > > but error_setg() also calls malloc, so this does not help at all?
> > >
> > > IIUC the problem, you can send a QMP command to ask to read let's say
> > > 3GB of a file, and QEMU crashes. But this doesn't mean there the .heap
> > > is empty, there is probably few bytes still available, enough to
> > > respond with an error message.
> >
> > We've discussed how to handle out-of-memory conditions many times.
> > Here's one instance:
> >
> > Subject: When it's okay to treat OOM as fatal?
> > Message-ID: <87efcqniza.fsf@dusky.pond.sub.org>
> > https://lists.nongnu.org/archive/html/qemu-devel/2018-10/msg03212.html
> >
> > No improvement since then; there's no guidance on when to check for OOM.
> > Actual code tends to check only "large" allocations (for subjective
> > values of "large").
> >
> > I reiterate my opinion that whatever OOM handling we have is too
> > unreliable to be worth much, since it can only help when (1) allocations
> > actually fail (they generally don't[*]), and (2) the allocation that
> > fails is actually handled (they generally aren't), and (3) the handling
> > actually works (we don't test OOM, so it generally doesn't).
> >
> >
> > [*] Linux overcommits memory, which means malloc() pretty much always
> > succeeds, but when you try to use "too much" of the memory you
> > supposedly allocated, a lethal signal is coming your way. Reasd the
> > thread I quoted for examples.
>
> So this patch takes Stefan reasoning:
> https://lists.nongnu.org/archive/html/qemu-devel/2018-10/msg03525.html
>
> My thinking has been to use g_new() for small QEMU-internal structures
> and g_try_new() for large amounts of memory allocated in response to
> untrusted inputs. (Untrusted inputs must never be used for unbounded
> allocation sizes but those bounded sizes can still be large.)
>
> In any cases (malloc/malloc_try) we have a denial of service
> (https://www.openwall.com/lists/oss-security/2018/10/17/4) and the service
> is restarted.
>
> Daniel suggests such behavior should be catched by external firewall guard
> (either on the process or on the network). This seems out of scope of QEMU
> and hard to fix.
>
> So, can we improve something? Or should we let this code as it?
I'll agree with Stefan's description; we should use 'try' for anything
'large' (badly defined) or user controlled.
So I think this should switch to having the try.
Dave
--
Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK
next prev parent reply other threads:[~2020-03-30 16:39 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-03-24 19:48 [PATCH-for-5.0] qga-posix: Avoid crashing process when failing to allocate memory Philippe Mathieu-Daudé
2020-03-25 6:19 ` Dietmar Maurer
2020-03-25 12:10 ` Philippe Mathieu-Daudé
2020-03-30 14:11 ` Markus Armbruster
2020-03-30 16:04 ` Philippe Mathieu-Daudé
2020-03-30 16:08 ` Philippe Mathieu-Daudé
2020-03-30 16:38 ` Dr. David Alan Gilbert [this message]
2020-03-30 16:47 ` Daniel P. Berrangé
2020-03-30 17:06 ` Daniel P. Berrangé
2020-03-31 13:32 ` Philippe Mathieu-Daudé
2020-03-30 16:25 ` Daniel P. Berrangé
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200330163805.GB2843@work-vm \
--to=dgilbert@redhat.com \
--cc=armbru@redhat.com \
--cc=basil@daynix.com \
--cc=berrange@redhat.com \
--cc=dietmar@proxmox.com \
--cc=marcandre.lureau@redhat.com \
--cc=mohdfakhrizulkifli@gmail.com \
--cc=pbonzini@redhat.com \
--cc=philmd@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=qemu-stable@nongnu.org \
--cc=qemu-trivial@nongnu.org \
--cc=sjubran@redhat.com \
--cc=stefanha@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).