* [PATCH v2 0/2] Ensure PCI configuration access is within bounds @ 2020-06-03 20:22 P J P 2020-06-03 20:22 ` [PATCH v2 1/2] ait-vga: check address before reading configuration bytes P J P 2020-06-03 20:22 ` [PATCH v2 2/2] pci: ensure configuration access is within bounds P J P 0 siblings, 2 replies; 22+ messages in thread From: P J P @ 2020-06-03 20:22 UTC (permalink / raw) To: Gerd Hoffmann, Philippe Mathieu-Daudé Cc: Daniel P . Berrangé, Prasad J Pandit, Michael S . Tsirkin, Yi Ren, QEMU Developers, Ren Ding, Hanqing Zhao From: Prasad J Pandit <pjp@fedoraproject.org> Hello, This patch series fixes 1. While reading PCI configuration bytes, a guest may send an address towards the end of the configuration space. It may lead to an OOB access issue. Add check to ensure 'addr + size' is within bounds. 2. Assert that PCI configuration access is within bounds. Thank you. -- Prasad J Pandit (2): ait-vga: check address before reading configuration bytes pci: ensure configuration access is within bounds hw/display/ati.c | 5 ++++- hw/pci/pci.c | 2 ++ 2 files changed, 6 insertions(+), 1 deletion(-) -- 2.26.2 ^ permalink raw reply [flat|nested] 22+ messages in thread
* [PATCH v2 1/2] ait-vga: check address before reading configuration bytes 2020-06-03 20:22 [PATCH v2 0/2] Ensure PCI configuration access is within bounds P J P @ 2020-06-03 20:22 ` P J P 2020-06-03 21:58 ` BALATON Zoltan 2020-06-04 8:43 ` Daniel P. Berrangé 2020-06-03 20:22 ` [PATCH v2 2/2] pci: ensure configuration access is within bounds P J P 1 sibling, 2 replies; 22+ messages in thread From: P J P @ 2020-06-03 20:22 UTC (permalink / raw) To: Gerd Hoffmann, Philippe Mathieu-Daudé Cc: Daniel P . Berrangé, Prasad J Pandit, Michael S . Tsirkin, Yi Ren, QEMU Developers, Ren Ding, Hanqing Zhao From: Prasad J Pandit <pjp@fedoraproject.org> While reading PCI configuration bytes, a guest may send an address towards the end of the configuration space. It may lead to an OOB access issue. Add check to ensure 'address + size' is within PCI configuration space. Reported-by: Ren Ding <rding@gatech.edu> Reported-by: Hanqing Zhao <hanqing@gatech.edu> Reported-by: Yi Ren <c4tren@gmail.com> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> --- hw/display/ati.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) Update v2: add check to avoid OOB PCI configuration space access -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html diff --git a/hw/display/ati.c b/hw/display/ati.c index bda4a2d816..6671959e5d 100644 --- a/hw/display/ati.c +++ b/hw/display/ati.c @@ -384,7 +384,10 @@ static uint64_t ati_mm_read(void *opaque, hwaddr addr, unsigned int size) val = s->regs.crtc_pitch; break; case 0xf00 ... 0xfff: - val = pci_default_read_config(&s->dev, addr - 0xf00, size); + addr = addr - 0xf00; + if (addr + size <= 0xff) { + val = pci_default_read_config(&s->dev, addr, size); + } break; case CUR_OFFSET: val = s->regs.cur_offset; -- 2.26.2 ^ permalink raw reply related [flat|nested] 22+ messages in thread
* Re: [PATCH v2 1/2] ait-vga: check address before reading configuration bytes 2020-06-03 20:22 ` [PATCH v2 1/2] ait-vga: check address before reading configuration bytes P J P @ 2020-06-03 21:58 ` BALATON Zoltan 2020-06-04 8:43 ` Daniel P. Berrangé 1 sibling, 0 replies; 22+ messages in thread From: BALATON Zoltan @ 2020-06-03 21:58 UTC (permalink / raw) To: P J P Cc: Daniel P . Berrangé, Prasad J Pandit, Michael S . Tsirkin, Yi Ren, QEMU Developers, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao On Thu, 4 Jun 2020, P J P wrote: > From: Prasad J Pandit <pjp@fedoraproject.org> > > While reading PCI configuration bytes, a guest may send an > address towards the end of the configuration space. It may lead > to an OOB access issue. Add check to ensure 'address + size' is > within PCI configuration space. > > Reported-by: Ren Ding <rding@gatech.edu> > Reported-by: Hanqing Zhao <hanqing@gatech.edu> > Reported-by: Yi Ren <c4tren@gmail.com> > Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > --- > hw/display/ati.c | 5 ++++- > 1 file changed, 4 insertions(+), 1 deletion(-) > > Update v2: add check to avoid OOB PCI configuration space access > -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html > > diff --git a/hw/display/ati.c b/hw/display/ati.c > index bda4a2d816..6671959e5d 100644 > --- a/hw/display/ati.c > +++ b/hw/display/ati.c > @@ -384,7 +384,10 @@ static uint64_t ati_mm_read(void *opaque, hwaddr addr, unsigned int size) > val = s->regs.crtc_pitch; > break; > case 0xf00 ... 0xfff: > - val = pci_default_read_config(&s->dev, addr - 0xf00, size); > + addr = addr - 0xf00; I'd write this as addr -= 0xf00 but modifying addr here breaks the trace print out at end of function so better drop this line and do if (addr + size <= 0xfff) { instead. Or is that really (addr + size - 1 <= 0xfff) considering that reading the last byte with addr = 0xfff size = 1 should probably be valid. Regards, BALATON Zoltan > + if (addr + size <= 0xff) { > + val = pci_default_read_config(&s->dev, addr, size); > + } > break; > case CUR_OFFSET: > val = s->regs.cur_offset; > ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 1/2] ait-vga: check address before reading configuration bytes 2020-06-03 20:22 ` [PATCH v2 1/2] ait-vga: check address before reading configuration bytes P J P 2020-06-03 21:58 ` BALATON Zoltan @ 2020-06-04 8:43 ` Daniel P. Berrangé 2020-06-04 9:18 ` P J P 1 sibling, 1 reply; 22+ messages in thread From: Daniel P. Berrangé @ 2020-06-04 8:43 UTC (permalink / raw) To: P J P Cc: Prasad J Pandit, Michael S . Tsirkin, Yi Ren, QEMU Developers, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao Typo: s/ait/ati/ On Thu, Jun 04, 2020 at 01:52:50AM +0530, P J P wrote: > From: Prasad J Pandit <pjp@fedoraproject.org> > > While reading PCI configuration bytes, a guest may send an > address towards the end of the configuration space. It may lead > to an OOB access issue. Add check to ensure 'address + size' is > within PCI configuration space. Please include a CVE number for this security flaw if there is one. > > Reported-by: Ren Ding <rding@gatech.edu> > Reported-by: Hanqing Zhao <hanqing@gatech.edu> > Reported-by: Yi Ren <c4tren@gmail.com> > Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > --- > hw/display/ati.c | 5 ++++- > 1 file changed, 4 insertions(+), 1 deletion(-) > > Update v2: add check to avoid OOB PCI configuration space access > -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html > > diff --git a/hw/display/ati.c b/hw/display/ati.c > index bda4a2d816..6671959e5d 100644 > --- a/hw/display/ati.c > +++ b/hw/display/ati.c > @@ -384,7 +384,10 @@ static uint64_t ati_mm_read(void *opaque, hwaddr addr, unsigned int size) > val = s->regs.crtc_pitch; > break; > case 0xf00 ... 0xfff: > - val = pci_default_read_config(&s->dev, addr - 0xf00, size); > + addr = addr - 0xf00; > + if (addr + size <= 0xff) { > + val = pci_default_read_config(&s->dev, addr, size); > + } > break; > case CUR_OFFSET: > val = s->regs.cur_offset; > -- > 2.26.2 > Regards, Daniel -- |: https://berrange.com -o- https://www.flickr.com/photos/dberrange :| |: https://libvirt.org -o- https://fstop138.berrange.com :| |: https://entangle-photo.org -o- https://www.instagram.com/dberrange :| ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 1/2] ait-vga: check address before reading configuration bytes 2020-06-04 8:43 ` Daniel P. Berrangé @ 2020-06-04 9:18 ` P J P 2020-06-04 9:40 ` Michael S. Tsirkin 0 siblings, 1 reply; 22+ messages in thread From: P J P @ 2020-06-04 9:18 UTC (permalink / raw) To: Daniel P. Berrangé Cc: Michael S . Tsirkin, Yi Ren, QEMU Developers, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao [-- Attachment #1: Type: text/plain, Size: 1040 bytes --] Hello Phil, +-- On Thu, 4 Jun 2020, Philippe Mathieu-Daudé wrote --+ | >> @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, | >> + assert(address + len <= pci_config_size(d)); | | Yes, maybe I was not clear while reviewing v1, we need to audit the | callers and fix them first, then we can safely add the assert here. That's an elaborate task. Could we please make that into another patch series? +-- On Thu, 4 Jun 2020, Daniel P. Berrangé wrote --+ | On Thu, Jun 04, 2020 at 01:52:50AM +0530, P J P wrote: | > While reading PCI configuration bytes, a guest may send an | > address towards the end of the configuration space. It may lead | > to an OOB access issue. Add check to ensure 'address + size' is | > within PCI configuration space. | | Please include a CVE number for this security flaw if there is | one. Yes. For now I'll send a revised patch to fix this ati-vga OOB access issue. Thank you. -- Prasad J Pandit / Red Hat Product Security Team 8685 545E B54C 486B C6EB 271E E285 8B5A F050 DE8D ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 1/2] ait-vga: check address before reading configuration bytes 2020-06-04 9:18 ` P J P @ 2020-06-04 9:40 ` Michael S. Tsirkin 0 siblings, 0 replies; 22+ messages in thread From: Michael S. Tsirkin @ 2020-06-04 9:40 UTC (permalink / raw) To: P J P Cc: Daniel P. Berrangé, Yi Ren, QEMU Developers, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao On Thu, Jun 04, 2020 at 02:48:59PM +0530, P J P wrote: > Hello Phil, > > +-- On Thu, 4 Jun 2020, Philippe Mathieu-Daudé wrote --+ > | >> @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, > | >> +   assert(address + len <= pci_config_size(d)); > | > | Yes, maybe I was not clear while reviewing v1, we need to audit the > | callers and fix them first, then we can safely add the assert here. > > That's an elaborate task. Could we please make that into another patch series? So let's make this a separate patch as defence in depth in case there are more bugs somewhere. Patch 1 is a CVE fix. Patch 2 is not. > +-- On Thu, 4 Jun 2020, Daniel P. Berrangé wrote --+ > | On Thu, Jun 04, 2020 at 01:52:50AM +0530, P J P wrote: > | > While reading PCI configuration bytes, a guest may send an > | > address towards the end of the configuration space. It may lead > | > to an OOB access issue. Add check to ensure 'address + size' is > | > within PCI configuration space. > | > | Please include a CVE number for this security flaw if there is > | one. > > Yes. For now I'll send a revised patch to fix this ati-vga OOB access issue. > > Thank you. > -- > Prasad J Pandit / Red Hat Product Security Team > 8685 545E B54C 486B C6EB 271E E285 8B5A F050 DE8D ^ permalink raw reply [flat|nested] 22+ messages in thread
* [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-03 20:22 [PATCH v2 0/2] Ensure PCI configuration access is within bounds P J P 2020-06-03 20:22 ` [PATCH v2 1/2] ait-vga: check address before reading configuration bytes P J P @ 2020-06-03 20:22 ` P J P 2020-06-03 22:13 ` BALATON Zoltan ` (2 more replies) 1 sibling, 3 replies; 22+ messages in thread From: P J P @ 2020-06-03 20:22 UTC (permalink / raw) To: Gerd Hoffmann, Philippe Mathieu-Daudé Cc: Daniel P . Berrangé, Prasad J Pandit, Michael S . Tsirkin, Yi Ren, QEMU Developers, Ren Ding, Hanqing Zhao From: Prasad J Pandit <pjp@fedoraproject.org> While reading PCI configuration bytes, a guest may send an address towards the end of the configuration space. It may lead to an OOB access issue. Assert that 'address + len' is within PCI configuration space. Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> --- hw/pci/pci.c | 2 ++ 1 file changed, 2 insertions(+) Update v2: assert PCI configuration access is within bounds -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html diff --git a/hw/pci/pci.c b/hw/pci/pci.c index 70c66965f5..173bec4fd5 100644 --- a/hw/pci/pci.c +++ b/hw/pci/pci.c @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, { uint32_t val = 0; + assert(address + len <= pci_config_size(d)); + if (pci_is_express_downstream_port(d) && ranges_overlap(address, len, d->exp.exp_cap + PCI_EXP_LNKSTA, 2)) { pcie_sync_bridge_lnk(d); -- 2.26.2 ^ permalink raw reply related [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-03 20:22 ` [PATCH v2 2/2] pci: ensure configuration access is within bounds P J P @ 2020-06-03 22:13 ` BALATON Zoltan 2020-06-04 5:14 ` Gerd Hoffmann ` (2 more replies) 2020-06-04 9:10 ` Peter Maydell 2020-06-04 9:38 ` Michael S. Tsirkin 2 siblings, 3 replies; 22+ messages in thread From: BALATON Zoltan @ 2020-06-03 22:13 UTC (permalink / raw) To: P J P Cc: Daniel P . Berrangé, Prasad J Pandit, Michael S . Tsirkin, Yi Ren, QEMU Developers, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao [-- Attachment #1: Type: text/plain, Size: 1637 bytes --] On Thu, 4 Jun 2020, P J P wrote: > From: Prasad J Pandit <pjp@fedoraproject.org> > > While reading PCI configuration bytes, a guest may send an > address towards the end of the configuration space. It may lead > to an OOB access issue. Assert that 'address + len' is within > PCI configuration space. > > Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> > Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > --- > hw/pci/pci.c | 2 ++ > 1 file changed, 2 insertions(+) > > Update v2: assert PCI configuration access is within bounds > -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html > > diff --git a/hw/pci/pci.c b/hw/pci/pci.c > index 70c66965f5..173bec4fd5 100644 > --- a/hw/pci/pci.c > +++ b/hw/pci/pci.c > @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, > { > uint32_t val = 0; > > + assert(address + len <= pci_config_size(d)); Does this allow guest now to crash QEMU? I think it was suggested that assert should only be used for cases that can only arise from a programming error and not from values set by the guest. If this is considered to be an error now to call this function with wrong parameters did you check other callers? I've found a few such as: hw/scsi/esp-pci.c hw/watchdog/wdt_i6300esb.c hw/ide/cmd646.c hw/vfio/pci.c and maybe others. Would it be better to not crash just log invalid access and either fix up parameters or return some garbage like 0? Regards, BALATON Zoltan > + > if (pci_is_express_downstream_port(d) && > ranges_overlap(address, len, d->exp.exp_cap + PCI_EXP_LNKSTA, 2)) { > pcie_sync_bridge_lnk(d); > ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-03 22:13 ` BALATON Zoltan @ 2020-06-04 5:14 ` Gerd Hoffmann 2020-06-04 9:44 ` Michael S. Tsirkin 2020-06-04 5:31 ` P J P 2020-06-04 6:07 ` Philippe Mathieu-Daudé 2 siblings, 1 reply; 22+ messages in thread From: Gerd Hoffmann @ 2020-06-04 5:14 UTC (permalink / raw) To: BALATON Zoltan Cc: Daniel P . Berrangé, Prasad J Pandit, Michael S . Tsirkin, Yi Ren, QEMU Developers, P J P, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao Hi, > > + assert(address + len <= pci_config_size(d)); > > Does this allow guest now to crash QEMU? Looks like it does (didn't actually try though). > I think it was suggested that assert should only be used for cases > that can only arise from a programming error and not from values set > by the guest. Correct. We do have guest-triggerable asserts in the code base. They are not the end of the world as the guest will only hurt itself. But in general we try to get rid of them instead of adding new ones ... Often you can just ignore the illegal guest action (bonus points for logging GUEST_ERROR as debugging aid). Sometimes it is more difficult to deal with it (in case the hardware is expected to throw an error irq for example). take care, Gerd ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-04 5:14 ` Gerd Hoffmann @ 2020-06-04 9:44 ` Michael S. Tsirkin 0 siblings, 0 replies; 22+ messages in thread From: Michael S. Tsirkin @ 2020-06-04 9:44 UTC (permalink / raw) To: Gerd Hoffmann Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, P J P, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao On Thu, Jun 04, 2020 at 07:14:00AM +0200, Gerd Hoffmann wrote: > Hi, > > > > + assert(address + len <= pci_config_size(d)); > > > > Does this allow guest now to crash QEMU? > > Looks like it does (didn't actually try though). > > > I think it was suggested that assert should only be used for cases > > that can only arise from a programming error and not from values set > > by the guest. > > Correct. We do have guest-triggerable asserts in the code base. They > are not the end of the world as the guest will only hurt itself. But > in general we try to get rid of them instead of adding new ones ... > > Often you can just ignore the illegal guest action (bonus points for > logging GUEST_ERROR as debugging aid). Sometimes it is more difficult > to deal with it (in case the hardware is expected to throw an error irq > for example). > > take care, > Gerd In this case it's not supposed to be guest triggerable, so I'm inlined to merge this, but as a separate patch from patch 1, and commit log need to be clearer that it's defence in depth not a bugfix. ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-03 22:13 ` BALATON Zoltan 2020-06-04 5:14 ` Gerd Hoffmann @ 2020-06-04 5:31 ` P J P 2020-06-04 6:07 ` Philippe Mathieu-Daudé 2 siblings, 0 replies; 22+ messages in thread From: P J P @ 2020-06-04 5:31 UTC (permalink / raw) To: Michael S . Tsirkin Cc: Daniel P . Berrangé, Yi Ren, QEMU Developers, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao +-- On Thu, 4 Jun 2020, BALATON Zoltan wrote --+ | On Thu, 4 Jun 2020, P J P wrote: | > + assert(address + len <= pci_config_size(d)); | | Does this allow guest now to crash QEMU? Yes, possible. Such crash (assert failure) can be a regular bug, as reading PCI configuration is likely a privileged operation inside guest. | If this is considered to be an error now to call this function with wrong | parameters did you check other callers? No, I haven't checked all other cases. | Would it be better to not crash just log invalid access and either fix up | parameters or return some garbage like 0? * Earlier patch v1 did the same, returned 0. * Assert(3) may help to fix current and future incorrect usage of the call. @mst ...? Thank you. -- Prasad J Pandit / Red Hat Product Security Team 8685 545E B54C 486B C6EB 271E E285 8B5A F050 DE8D ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-03 22:13 ` BALATON Zoltan 2020-06-04 5:14 ` Gerd Hoffmann 2020-06-04 5:31 ` P J P @ 2020-06-04 6:07 ` Philippe Mathieu-Daudé 2020-06-04 9:41 ` Michael S. Tsirkin 2 siblings, 1 reply; 22+ messages in thread From: Philippe Mathieu-Daudé @ 2020-06-04 6:07 UTC (permalink / raw) To: BALATON Zoltan, P J P Cc: Daniel P . Berrangé, Prasad J Pandit, Michael S . Tsirkin, Yi Ren, QEMU Developers, Gerd Hoffmann, Ren Ding, Hanqing Zhao On 6/4/20 12:13 AM, BALATON Zoltan wrote: > On Thu, 4 Jun 2020, P J P wrote: >> From: Prasad J Pandit <pjp@fedoraproject.org> >> >> While reading PCI configuration bytes, a guest may send an >> address towards the end of the configuration space. It may lead >> to an OOB access issue. Assert that 'address + len' is within >> PCI configuration space. >> >> Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> >> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> >> --- >> hw/pci/pci.c | 2 ++ >> 1 file changed, 2 insertions(+) >> >> Update v2: assert PCI configuration access is within bounds >> -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html >> >> diff --git a/hw/pci/pci.c b/hw/pci/pci.c >> index 70c66965f5..173bec4fd5 100644 >> --- a/hw/pci/pci.c >> +++ b/hw/pci/pci.c >> @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, >> { >> uint32_t val = 0; >> >> + assert(address + len <= pci_config_size(d)); > > Does this allow guest now to crash QEMU? I think it was suggested that > assert should only be used for cases that can only arise from a > programming error and not from values set by the guest. If this is > considered to be an error now to call this function with wrong > parameters did you check other callers? I've found a few such as: > > hw/scsi/esp-pci.c > hw/watchdog/wdt_i6300esb.c > hw/ide/cmd646.c > hw/vfio/pci.c > > and maybe others. Would it be better to not crash just log invalid > access and either fix up parameters or return some garbage like 0? Yes, maybe I was not clear while reviewing v1, we need to audit the callers and fix them first, then we can safely add the assert here. > > Regards, > BALATON Zoltan > >> + >> if (pci_is_express_downstream_port(d) && >> ranges_overlap(address, len, d->exp.exp_cap + PCI_EXP_LNKSTA, >> 2)) { >> pcie_sync_bridge_lnk(d); >> ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-04 6:07 ` Philippe Mathieu-Daudé @ 2020-06-04 9:41 ` Michael S. Tsirkin 2020-06-04 11:37 ` BALATON Zoltan 0 siblings, 1 reply; 22+ messages in thread From: Michael S. Tsirkin @ 2020-06-04 9:41 UTC (permalink / raw) To: Philippe Mathieu-Daudé Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, P J P, Gerd Hoffmann, Ren Ding, Hanqing Zhao On Thu, Jun 04, 2020 at 08:07:52AM +0200, Philippe Mathieu-Daudé wrote: > On 6/4/20 12:13 AM, BALATON Zoltan wrote: > > On Thu, 4 Jun 2020, P J P wrote: > >> From: Prasad J Pandit <pjp@fedoraproject.org> > >> > >> While reading PCI configuration bytes, a guest may send an > >> address towards the end of the configuration space. It may lead > >> to an OOB access issue. Assert that 'address + len' is within > >> PCI configuration space. > >> > >> Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> > >> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > >> --- > >> hw/pci/pci.c | 2 ++ > >> 1 file changed, 2 insertions(+) > >> > >> Update v2: assert PCI configuration access is within bounds > >>  -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html > >> > >> diff --git a/hw/pci/pci.c b/hw/pci/pci.c > >> index 70c66965f5..173bec4fd5 100644 > >> --- a/hw/pci/pci.c > >> +++ b/hw/pci/pci.c > >> @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, > >> { > >>    uint32_t val = 0; > >> > >> +   assert(address + len <= pci_config_size(d)); > > > > Does this allow guest now to crash QEMU? I think it was suggested that > > assert should only be used for cases that can only arise from a > > programming error and not from values set by the guest. If this is > > considered to be an error now to call this function with wrong > > parameters did you check other callers? I've found a few such as: > > > > hw/scsi/esp-pci.c > > hw/watchdog/wdt_i6300esb.c > > hw/ide/cmd646.c > > hw/vfio/pci.c > > > > and maybe others. Would it be better to not crash just log invalid > > access and either fix up parameters or return some garbage like 0? > > Yes, maybe I was not clear while reviewing v1, we need to audit the > callers and fix them first, then we can safely add the assert here. We can add assert here regardless of auditing callers. Doing that will also make fuzzying easier. But the assert is unrelated to CVE imho. > > > > Regards, > > BALATON Zoltan > > > >> + > >>    if (pci_is_express_downstream_port(d) && > >>        ranges_overlap(address, len, d->exp.exp_cap + PCI_EXP_LNKSTA, > >> 2)) { > >>        pcie_sync_bridge_lnk(d); > >> ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-04 9:41 ` Michael S. Tsirkin @ 2020-06-04 11:37 ` BALATON Zoltan 2020-06-04 11:40 ` Michael S. Tsirkin 0 siblings, 1 reply; 22+ messages in thread From: BALATON Zoltan @ 2020-06-04 11:37 UTC (permalink / raw) To: Michael S. Tsirkin Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, P J P, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao [-- Attachment #1: Type: text/plain, Size: 2316 bytes --] On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: > On Thu, Jun 04, 2020 at 08:07:52AM +0200, Philippe Mathieu-Daudé wrote: >> On 6/4/20 12:13 AM, BALATON Zoltan wrote: >>> On Thu, 4 Jun 2020, P J P wrote: >>>> From: Prasad J Pandit <pjp@fedoraproject.org> >>>> >>>> While reading PCI configuration bytes, a guest may send an >>>> address towards the end of the configuration space. It may lead >>>> to an OOB access issue. Assert that 'address + len' is within >>>> PCI configuration space. >>>> >>>> Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> >>>> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> >>>> --- >>>> hw/pci/pci.c | 2 ++ >>>> 1 file changed, 2 insertions(+) >>>> >>>> Update v2: assert PCI configuration access is within bounds >>>>  -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html >>>> >>>> diff --git a/hw/pci/pci.c b/hw/pci/pci.c >>>> index 70c66965f5..173bec4fd5 100644 >>>> --- a/hw/pci/pci.c >>>> +++ b/hw/pci/pci.c >>>> @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, >>>> { >>>>    uint32_t val = 0; >>>> >>>> +   assert(address + len <= pci_config_size(d)); >>> >>> Does this allow guest now to crash QEMU? I think it was suggested that >>> assert should only be used for cases that can only arise from a >>> programming error and not from values set by the guest. If this is >>> considered to be an error now to call this function with wrong >>> parameters did you check other callers? I've found a few such as: >>> >>> hw/scsi/esp-pci.c >>> hw/watchdog/wdt_i6300esb.c >>> hw/ide/cmd646.c >>> hw/vfio/pci.c >>> >>> and maybe others. Would it be better to not crash just log invalid >>> access and either fix up parameters or return some garbage like 0? >> >> Yes, maybe I was not clear while reviewing v1, we need to audit the >> callers and fix them first, then we can safely add the assert here. > > We can add assert here regardless of auditing callers. Doing that > will also make fuzzying easier. But the assert is unrelated to CVE imho. I wonder why isn't the check added to pci_default_read_config() right away? If we have an assert there the overhead is the same and adding the check there would make it unnecessary to patch all callers so it's just one patch instead of a whole series. Regards, BALATON Zoltan ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-04 11:37 ` BALATON Zoltan @ 2020-06-04 11:40 ` Michael S. Tsirkin 2020-06-04 11:49 ` BALATON Zoltan 0 siblings, 1 reply; 22+ messages in thread From: Michael S. Tsirkin @ 2020-06-04 11:40 UTC (permalink / raw) To: BALATON Zoltan Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, P J P, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao On Thu, Jun 04, 2020 at 01:37:13PM +0200, BALATON Zoltan wrote: > On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: > > On Thu, Jun 04, 2020 at 08:07:52AM +0200, Philippe Mathieu-Daudé wrote: > > > On 6/4/20 12:13 AM, BALATON Zoltan wrote: > > > > On Thu, 4 Jun 2020, P J P wrote: > > > > > From: Prasad J Pandit <pjp@fedoraproject.org> > > > > > > > > > > While reading PCI configuration bytes, a guest may send an > > > > > address towards the end of the configuration space. It may lead > > > > > to an OOB access issue. Assert that 'address + len' is within > > > > > PCI configuration space. > > > > > > > > > > Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> > > > > > Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > > > > > --- > > > > > hw/pci/pci.c | 2 ++ > > > > > 1 file changed, 2 insertions(+) > > > > > > > > > > Update v2: assert PCI configuration access is within bounds > > > > > à-> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html > > > > > > > > > > diff --git a/hw/pci/pci.c b/hw/pci/pci.c > > > > > index 70c66965f5..173bec4fd5 100644 > > > > > --- a/hw/pci/pci.c > > > > > +++ b/hw/pci/pci.c > > > > > @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, > > > > > { > > > > > àààuint32_t val = 0; > > > > > > > > > > +àààassert(address + len <= pci_config_size(d)); > > > > > > > > Does this allow guest now to crash QEMU? I think it was suggested that > > > > assert should only be used for cases that can only arise from a > > > > programming error and not from values set by the guest. If this is > > > > considered to be an error now to call this function with wrong > > > > parameters did you check other callers? I've found a few such as: > > > > > > > > hw/scsi/esp-pci.c > > > > hw/watchdog/wdt_i6300esb.c > > > > hw/ide/cmd646.c > > > > hw/vfio/pci.c > > > > > > > > and maybe others. Would it be better to not crash just log invalid > > > > access and either fix up parameters or return some garbage like 0? > > > > > > Yes, maybe I was not clear while reviewing v1, we need to audit the > > > callers and fix them first, then we can safely add the assert here. > > > > We can add assert here regardless of auditing callers. Doing that > > will also make fuzzying easier. But the assert is unrelated to CVE imho. > > I wonder why isn't the check added to pci_default_read_config() right away? > If we have an assert there the overhead is the same and adding the check > there would make it unnecessary to patch all callers so it's just one patch > instead of a whole series. > > Regards, > BALATON Zoltan We need to return something, and we can't be sure that callers will handle returning random stuff correctly. Callers know what to do on errors, we don't. -- MST ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-04 11:40 ` Michael S. Tsirkin @ 2020-06-04 11:49 ` BALATON Zoltan 2020-06-04 11:58 ` Michael S. Tsirkin 0 siblings, 1 reply; 22+ messages in thread From: BALATON Zoltan @ 2020-06-04 11:49 UTC (permalink / raw) To: Michael S. Tsirkin Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, P J P, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao [-- Attachment #1: Type: text/plain, Size: 3621 bytes --] On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: > On Thu, Jun 04, 2020 at 01:37:13PM +0200, BALATON Zoltan wrote: >> On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: >>> On Thu, Jun 04, 2020 at 08:07:52AM +0200, Philippe Mathieu-Daudé wrote: >>>> On 6/4/20 12:13 AM, BALATON Zoltan wrote: >>>>> On Thu, 4 Jun 2020, P J P wrote: >>>>>> From: Prasad J Pandit <pjp@fedoraproject.org> >>>>>> >>>>>> While reading PCI configuration bytes, a guest may send an >>>>>> address towards the end of the configuration space. It may lead >>>>>> to an OOB access issue. Assert that 'address + len' is within >>>>>> PCI configuration space. >>>>>> >>>>>> Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> >>>>>> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> >>>>>> --- >>>>>> hw/pci/pci.c | 2 ++ >>>>>> 1 file changed, 2 insertions(+) >>>>>> >>>>>> Update v2: assert PCI configuration access is within bounds >>>>>>  -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html >>>>>> >>>>>> diff --git a/hw/pci/pci.c b/hw/pci/pci.c >>>>>> index 70c66965f5..173bec4fd5 100644 >>>>>> --- a/hw/pci/pci.c >>>>>> +++ b/hw/pci/pci.c >>>>>> @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, >>>>>> { >>>>>>    uint32_t val = 0; >>>>>> >>>>>> +   assert(address + len <= pci_config_size(d)); >>>>> >>>>> Does this allow guest now to crash QEMU? I think it was suggested that >>>>> assert should only be used for cases that can only arise from a >>>>> programming error and not from values set by the guest. If this is >>>>> considered to be an error now to call this function with wrong >>>>> parameters did you check other callers? I've found a few such as: >>>>> >>>>> hw/scsi/esp-pci.c >>>>> hw/watchdog/wdt_i6300esb.c >>>>> hw/ide/cmd646.c >>>>> hw/vfio/pci.c >>>>> >>>>> and maybe others. Would it be better to not crash just log invalid >>>>> access and either fix up parameters or return some garbage like 0? >>>> >>>> Yes, maybe I was not clear while reviewing v1, we need to audit the >>>> callers and fix them first, then we can safely add the assert here. >>> >>> We can add assert here regardless of auditing callers. Doing that >>> will also make fuzzying easier. But the assert is unrelated to CVE imho. >> >> I wonder why isn't the check added to pci_default_read_config() right away? >> If we have an assert there the overhead is the same and adding the check >> there would make it unnecessary to patch all callers so it's just one patch >> instead of a whole series. >> >> Regards, >> BALATON Zoltan > > We need to return something, and we can't be sure that callers will > handle returning random stuff correctly. Callers know what > to do on errors, we don't. This is an invalid case where behaviour will be undefined anyway so returning anything such as 0 or -1 is probably OK (what do most hardware return in this case?). If callers need better error handling they can do a check before calling the function but for other (most) callers which will just return the same random value you would return from pci_default_read_config() having an assert instead makes it necessary to modify all of them one by one and doubles the check overhead by unnecessarily double checking. So I think having a default check and error handling in pci_default_read_config() would be better so callers who don't care would work and those few who might care could check before calling or actually implement their own callback (which I expect they already do as this is just the default implementation of this callback). ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-04 11:49 ` BALATON Zoltan @ 2020-06-04 11:58 ` Michael S. Tsirkin 2020-06-04 12:14 ` BALATON Zoltan 0 siblings, 1 reply; 22+ messages in thread From: Michael S. Tsirkin @ 2020-06-04 11:58 UTC (permalink / raw) To: BALATON Zoltan Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, P J P, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao On Thu, Jun 04, 2020 at 01:49:53PM +0200, BALATON Zoltan wrote: > On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: > > On Thu, Jun 04, 2020 at 01:37:13PM +0200, BALATON Zoltan wrote: > > > On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: > > > > On Thu, Jun 04, 2020 at 08:07:52AM +0200, Philippe Mathieu-Daudé wrote: > > > > > On 6/4/20 12:13 AM, BALATON Zoltan wrote: > > > > > > On Thu, 4 Jun 2020, P J P wrote: > > > > > > > From: Prasad J Pandit <pjp@fedoraproject.org> > > > > > > > > > > > > > > While reading PCI configuration bytes, a guest may send an > > > > > > > address towards the end of the configuration space. It may lead > > > > > > > to an OOB access issue. Assert that 'address + len' is within > > > > > > > PCI configuration space. > > > > > > > > > > > > > > Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> > > > > > > > Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > > > > > > > --- > > > > > > > hw/pci/pci.c | 2 ++ > > > > > > > 1 file changed, 2 insertions(+) > > > > > > > > > > > > > > Update v2: assert PCI configuration access is within bounds > > > > > > >  -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html > > > > > > > > > > > > > > diff --git a/hw/pci/pci.c b/hw/pci/pci.c > > > > > > > index 70c66965f5..173bec4fd5 100644 > > > > > > > --- a/hw/pci/pci.c > > > > > > > +++ b/hw/pci/pci.c > > > > > > > @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, > > > > > > > { > > > > > > >    uint32_t val = 0; > > > > > > > > > > > > > > +   assert(address + len <= pci_config_size(d)); > > > > > > > > > > > > Does this allow guest now to crash QEMU? I think it was suggested that > > > > > > assert should only be used for cases that can only arise from a > > > > > > programming error and not from values set by the guest. If this is > > > > > > considered to be an error now to call this function with wrong > > > > > > parameters did you check other callers? I've found a few such as: > > > > > > > > > > > > hw/scsi/esp-pci.c > > > > > > hw/watchdog/wdt_i6300esb.c > > > > > > hw/ide/cmd646.c > > > > > > hw/vfio/pci.c > > > > > > > > > > > > and maybe others. Would it be better to not crash just log invalid > > > > > > access and either fix up parameters or return some garbage like 0? > > > > > > > > > > Yes, maybe I was not clear while reviewing v1, we need to audit the > > > > > callers and fix them first, then we can safely add the assert here. > > > > > > > > We can add assert here regardless of auditing callers. Doing that > > > > will also make fuzzying easier. But the assert is unrelated to CVE imho. > > > > > > I wonder why isn't the check added to pci_default_read_config() right away? > > > If we have an assert there the overhead is the same and adding the check > > > there would make it unnecessary to patch all callers so it's just one patch > > > instead of a whole series. > > > > > > Regards, > > > BALATON Zoltan > > > > We need to return something, and we can't be sure that callers will > > handle returning random stuff correctly. Callers know what > > to do on errors, we don't. > > This is an invalid case where behaviour will be undefined anyway so > returning anything such as 0 or -1 is probably OK (what do most hardware > return in this case?). This is an internal detail of the API. It's not about what hardware returns. Look at the ati as an example. > If callers need better error handling they can do a > check before calling the function but for other (most) callers which will > just return the same random value you would return from > pci_default_read_config() having an assert instead makes it necessary to > modify all of them one by one and doubles the check overhead by > unnecessarily double checking. So I think having a default check and error > handling in pci_default_read_config() would be better so callers who don't > care would work and those few who might care could check before calling or > actually implement their own callback (which I expect they already do as > this is just the default implementation of this callback). Basically if you look at the specific example, you will see that it triggers because of a misaligned access which device code never expected. Which memory core should not allow at all. It will likely trigger other bugs, some of them could be security related. assert is a reasonable way to help us catch them in fuzzying. -- MST ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-04 11:58 ` Michael S. Tsirkin @ 2020-06-04 12:14 ` BALATON Zoltan 2020-06-04 14:11 ` Michael S. Tsirkin 0 siblings, 1 reply; 22+ messages in thread From: BALATON Zoltan @ 2020-06-04 12:14 UTC (permalink / raw) To: Michael S. Tsirkin Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, P J P, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao [-- Attachment #1: Type: text/plain, Size: 4966 bytes --] On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: > On Thu, Jun 04, 2020 at 01:49:53PM +0200, BALATON Zoltan wrote: >> On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: >>> On Thu, Jun 04, 2020 at 01:37:13PM +0200, BALATON Zoltan wrote: >>>> On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: >>>>> On Thu, Jun 04, 2020 at 08:07:52AM +0200, Philippe Mathieu-Daudé wrote: >>>>>> On 6/4/20 12:13 AM, BALATON Zoltan wrote: >>>>>>> On Thu, 4 Jun 2020, P J P wrote: >>>>>>>> From: Prasad J Pandit <pjp@fedoraproject.org> >>>>>>>> >>>>>>>> While reading PCI configuration bytes, a guest may send an >>>>>>>> address towards the end of the configuration space. It may lead >>>>>>>> to an OOB access issue. Assert that 'address + len' is within >>>>>>>> PCI configuration space. >>>>>>>> >>>>>>>> Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> >>>>>>>> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> >>>>>>>> --- >>>>>>>> hw/pci/pci.c | 2 ++ >>>>>>>> 1 file changed, 2 insertions(+) >>>>>>>> >>>>>>>> Update v2: assert PCI configuration access is within bounds >>>>>>>>  -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html >>>>>>>> >>>>>>>> diff --git a/hw/pci/pci.c b/hw/pci/pci.c >>>>>>>> index 70c66965f5..173bec4fd5 100644 >>>>>>>> --- a/hw/pci/pci.c >>>>>>>> +++ b/hw/pci/pci.c >>>>>>>> @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, >>>>>>>> { >>>>>>>>    uint32_t val = 0; >>>>>>>> >>>>>>>> +   assert(address + len <= pci_config_size(d)); >>>>>>> >>>>>>> Does this allow guest now to crash QEMU? I think it was suggested that >>>>>>> assert should only be used for cases that can only arise from a >>>>>>> programming error and not from values set by the guest. If this is >>>>>>> considered to be an error now to call this function with wrong >>>>>>> parameters did you check other callers? I've found a few such as: >>>>>>> >>>>>>> hw/scsi/esp-pci.c >>>>>>> hw/watchdog/wdt_i6300esb.c >>>>>>> hw/ide/cmd646.c >>>>>>> hw/vfio/pci.c >>>>>>> >>>>>>> and maybe others. Would it be better to not crash just log invalid >>>>>>> access and either fix up parameters or return some garbage like 0? >>>>>> >>>>>> Yes, maybe I was not clear while reviewing v1, we need to audit the >>>>>> callers and fix them first, then we can safely add the assert here. >>>>> >>>>> We can add assert here regardless of auditing callers. Doing that >>>>> will also make fuzzying easier. But the assert is unrelated to CVE imho. >>>> >>>> I wonder why isn't the check added to pci_default_read_config() right away? >>>> If we have an assert there the overhead is the same and adding the check >>>> there would make it unnecessary to patch all callers so it's just one patch >>>> instead of a whole series. >>>> >>>> Regards, >>>> BALATON Zoltan >>> >>> We need to return something, and we can't be sure that callers will >>> handle returning random stuff correctly. Callers know what >>> to do on errors, we don't. >> >> This is an invalid case where behaviour will be undefined anyway so >> returning anything such as 0 or -1 is probably OK (what do most hardware >> return in this case?). > > This is an internal detail of the API. It's not about what hardware > returns. Look at the ati as an example. Considering that this function implements reading PCI config space its API should aligh with what happens on hardware normally. You could make it unrelated but that does not make much sense other than causing trouble for callers. >> If callers need better error handling they can do a >> check before calling the function but for other (most) callers which will >> just return the same random value you would return from >> pci_default_read_config() having an assert instead makes it necessary to >> modify all of them one by one and doubles the check overhead by >> unnecessarily double checking. So I think having a default check and error >> handling in pci_default_read_config() would be better so callers who don't >> care would work and those few who might care could check before calling or >> actually implement their own callback (which I expect they already do as >> this is just the default implementation of this callback). > > > Basically if you look at the specific example, you will see that it > triggers because of a misaligned access which device code never > expected. Which memory core should not allow at all. > It will likely trigger other bugs, some of them could be > security related. assert is a reasonable way to help us catch them in > fuzzying. The specific example (ati-vga) does expect and should support unaligned access. Not for all regs but for most registers, there's a table in docs which says for PCI POS registers (whatever those are) unalligned access is supported. This works now, if it should not work witout .impl.unaligned or some other value set somewhere that should be patched instead. Regards, BALATON Zoltan ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-04 12:14 ` BALATON Zoltan @ 2020-06-04 14:11 ` Michael S. Tsirkin 0 siblings, 0 replies; 22+ messages in thread From: Michael S. Tsirkin @ 2020-06-04 14:11 UTC (permalink / raw) To: BALATON Zoltan Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, P J P, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao On Thu, Jun 04, 2020 at 02:14:46PM +0200, BALATON Zoltan wrote: > On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: > > On Thu, Jun 04, 2020 at 01:49:53PM +0200, BALATON Zoltan wrote: > > > On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: > > > > On Thu, Jun 04, 2020 at 01:37:13PM +0200, BALATON Zoltan wrote: > > > > > On Thu, 4 Jun 2020, Michael S. Tsirkin wrote: > > > > > > On Thu, Jun 04, 2020 at 08:07:52AM +0200, Philippe Mathieu-Daudé wrote: > > > > > > > On 6/4/20 12:13 AM, BALATON Zoltan wrote: > > > > > > > > On Thu, 4 Jun 2020, P J P wrote: > > > > > > > > > From: Prasad J Pandit <pjp@fedoraproject.org> > > > > > > > > > > > > > > > > > > While reading PCI configuration bytes, a guest may send an > > > > > > > > > address towards the end of the configuration space. It may lead > > > > > > > > > to an OOB access issue. Assert that 'address + len' is within > > > > > > > > > PCI configuration space. > > > > > > > > > > > > > > > > > > Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> > > > > > > > > > Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > > > > > > > > > --- > > > > > > > > > hw/pci/pci.c | 2 ++ > > > > > > > > > 1 file changed, 2 insertions(+) > > > > > > > > > > > > > > > > > > Update v2: assert PCI configuration access is within bounds > > > > > > > > >  -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html > > > > > > > > > > > > > > > > > > diff --git a/hw/pci/pci.c b/hw/pci/pci.c > > > > > > > > > index 70c66965f5..173bec4fd5 100644 > > > > > > > > > --- a/hw/pci/pci.c > > > > > > > > > +++ b/hw/pci/pci.c > > > > > > > > > @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, > > > > > > > > > { > > > > > > > > >    uint32_t val = 0; > > > > > > > > > > > > > > > > > > +   assert(address + len <= pci_config_size(d)); > > > > > > > > > > > > > > > > Does this allow guest now to crash QEMU? I think it was suggested that > > > > > > > > assert should only be used for cases that can only arise from a > > > > > > > > programming error and not from values set by the guest. If this is > > > > > > > > considered to be an error now to call this function with wrong > > > > > > > > parameters did you check other callers? I've found a few such as: > > > > > > > > > > > > > > > > hw/scsi/esp-pci.c > > > > > > > > hw/watchdog/wdt_i6300esb.c > > > > > > > > hw/ide/cmd646.c > > > > > > > > hw/vfio/pci.c > > > > > > > > > > > > > > > > and maybe others. Would it be better to not crash just log invalid > > > > > > > > access and either fix up parameters or return some garbage like 0? > > > > > > > > > > > > > > Yes, maybe I was not clear while reviewing v1, we need to audit the > > > > > > > callers and fix them first, then we can safely add the assert here. > > > > > > > > > > > > We can add assert here regardless of auditing callers. Doing that > > > > > > will also make fuzzying easier. But the assert is unrelated to CVE imho. > > > > > > > > > > I wonder why isn't the check added to pci_default_read_config() right away? > > > > > If we have an assert there the overhead is the same and adding the check > > > > > there would make it unnecessary to patch all callers so it's just one patch > > > > > instead of a whole series. > > > > > > > > > > Regards, > > > > > BALATON Zoltan > > > > > > > > We need to return something, and we can't be sure that callers will > > > > handle returning random stuff correctly. Callers know what > > > > to do on errors, we don't. > > > > > > This is an invalid case where behaviour will be undefined anyway so > > > returning anything such as 0 or -1 is probably OK (what do most hardware > > > return in this case?). > > > > This is an internal detail of the API. It's not about what hardware > > returns. Look at the ati as an example. > > Considering that this function implements reading PCI config space its API > should aligh with what happens on hardware normally. You could make it > unrelated but that does not make much sense other than causing trouble for > callers. What happens on hardware is that there's no way to send to device a transaction that is out of range: on pci offset is 8 bit so <= 0xff, and on express 12 bit so <= 4K. So this handles something that never happens on real hardware and it happens because of a bug elsewhere in QEMU. assert seems appropriate. > > > If callers need better error handling they can do a > > > check before calling the function but for other (most) callers which will > > > just return the same random value you would return from > > > pci_default_read_config() having an assert instead makes it necessary to > > > modify all of them one by one and doubles the check overhead by > > > unnecessarily double checking. So I think having a default check and error > > > handling in pci_default_read_config() would be better so callers who don't > > > care would work and those few who might care could check before calling or > > > actually implement their own callback (which I expect they already do as > > > this is just the default implementation of this callback). > > > > > > Basically if you look at the specific example, you will see that it > > triggers because of a misaligned access which device code never > > expected. Which memory core should not allow at all. > > It will likely trigger other bugs, some of them could be > > security related. assert is a reasonable way to help us catch them in > > fuzzying. > > The specific example (ati-vga) does expect and should support unaligned > access. Then it should set "unaligned = true". It does not seem to do so. > Not for all regs but for most registers, there's a table in docs > which says for PCI POS registers (whatever those are) unalligned access is > supported. This works now, if it should not work witout .impl.unaligned or > some other value set somewhere that should be patched instead. Argue with the docs/devel/memory.rst about this please, that's not what it says. > > Regards, > BALATON Zoltan ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-03 20:22 ` [PATCH v2 2/2] pci: ensure configuration access is within bounds P J P 2020-06-03 22:13 ` BALATON Zoltan @ 2020-06-04 9:10 ` Peter Maydell 2020-06-04 9:35 ` Michael S. Tsirkin 2020-06-04 9:38 ` Michael S. Tsirkin 2 siblings, 1 reply; 22+ messages in thread From: Peter Maydell @ 2020-06-04 9:10 UTC (permalink / raw) To: P J P Cc: Daniel P . Berrangé, Prasad J Pandit, Michael S . Tsirkin, Yi Ren, QEMU Developers, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao On Wed, 3 Jun 2020 at 21:26, P J P <ppandit@redhat.com> wrote: > > From: Prasad J Pandit <pjp@fedoraproject.org> > > While reading PCI configuration bytes, a guest may send an > address towards the end of the configuration space. It may lead > to an OOB access issue. Assert that 'address + len' is within > PCI configuration space. What does the spec say should happen when the guest does this? Does it depend on the pci controller implementation? thanks -- PMM ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-04 9:10 ` Peter Maydell @ 2020-06-04 9:35 ` Michael S. Tsirkin 0 siblings, 0 replies; 22+ messages in thread From: Michael S. Tsirkin @ 2020-06-04 9:35 UTC (permalink / raw) To: Peter Maydell Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, P J P, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao On Thu, Jun 04, 2020 at 10:10:07AM +0100, Peter Maydell wrote: > On Wed, 3 Jun 2020 at 21:26, P J P <ppandit@redhat.com> wrote: > > > > From: Prasad J Pandit <pjp@fedoraproject.org> > > > > While reading PCI configuration bytes, a guest may send an > > address towards the end of the configuration space. It may lead > > to an OOB access issue. Assert that 'address + len' is within > > PCI configuration space. > > What does the spec say should happen when the guest does this? Spec says anything can happen *to the device*. Naturally there's an expectation that while device might crash it stays resettable and does not blow up. > Does it depend on the pci controller implementation? > > thanks > -- PMM Shouldn't I think. -- MST ^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH v2 2/2] pci: ensure configuration access is within bounds 2020-06-03 20:22 ` [PATCH v2 2/2] pci: ensure configuration access is within bounds P J P 2020-06-03 22:13 ` BALATON Zoltan 2020-06-04 9:10 ` Peter Maydell @ 2020-06-04 9:38 ` Michael S. Tsirkin 2 siblings, 0 replies; 22+ messages in thread From: Michael S. Tsirkin @ 2020-06-04 9:38 UTC (permalink / raw) To: P J P Cc: Daniel P . Berrangé, Prasad J Pandit, Yi Ren, QEMU Developers, Gerd Hoffmann, Ren Ding, Philippe Mathieu-Daudé, Hanqing Zhao On Thu, Jun 04, 2020 at 01:52:51AM +0530, P J P wrote: > From: Prasad J Pandit <pjp@fedoraproject.org> > > While reading PCI configuration bytes, a guest may send an > address towards the end of the configuration space. It may lead > to an OOB access issue. Assert that 'address + len' is within > PCI configuration space. > > Suggested-by: Philippe Mathieu-Daudé <philmd@redhat.com> > Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> My understanding is that this can't really happen normally, this is more an assert in case some pci host devices are buggy, as is the case of alt-vga. Right? Pls clarify commit log so it's obvious this is defence in depth. > --- > hw/pci/pci.c | 2 ++ > 1 file changed, 2 insertions(+) > > Update v2: assert PCI configuration access is within bounds > -> https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00711.html > > diff --git a/hw/pci/pci.c b/hw/pci/pci.c > index 70c66965f5..173bec4fd5 100644 > --- a/hw/pci/pci.c > +++ b/hw/pci/pci.c > @@ -1381,6 +1381,8 @@ uint32_t pci_default_read_config(PCIDevice *d, > { > uint32_t val = 0; > > + assert(address + len <= pci_config_size(d)); > + > if (pci_is_express_downstream_port(d) && > ranges_overlap(address, len, d->exp.exp_cap + PCI_EXP_LNKSTA, 2)) { > pcie_sync_bridge_lnk(d); > -- > 2.26.2 ^ permalink raw reply [flat|nested] 22+ messages in thread
end of thread, other threads:[~2020-06-04 14:12 UTC | newest] Thread overview: 22+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2020-06-03 20:22 [PATCH v2 0/2] Ensure PCI configuration access is within bounds P J P 2020-06-03 20:22 ` [PATCH v2 1/2] ait-vga: check address before reading configuration bytes P J P 2020-06-03 21:58 ` BALATON Zoltan 2020-06-04 8:43 ` Daniel P. Berrangé 2020-06-04 9:18 ` P J P 2020-06-04 9:40 ` Michael S. Tsirkin 2020-06-03 20:22 ` [PATCH v2 2/2] pci: ensure configuration access is within bounds P J P 2020-06-03 22:13 ` BALATON Zoltan 2020-06-04 5:14 ` Gerd Hoffmann 2020-06-04 9:44 ` Michael S. Tsirkin 2020-06-04 5:31 ` P J P 2020-06-04 6:07 ` Philippe Mathieu-Daudé 2020-06-04 9:41 ` Michael S. Tsirkin 2020-06-04 11:37 ` BALATON Zoltan 2020-06-04 11:40 ` Michael S. Tsirkin 2020-06-04 11:49 ` BALATON Zoltan 2020-06-04 11:58 ` Michael S. Tsirkin 2020-06-04 12:14 ` BALATON Zoltan 2020-06-04 14:11 ` Michael S. Tsirkin 2020-06-04 9:10 ` Peter Maydell 2020-06-04 9:35 ` Michael S. Tsirkin 2020-06-04 9:38 ` Michael S. Tsirkin
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).