qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: "Philippe Mathieu-Daudé" <philmd@redhat.com>
To: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Alexander Bulekov <alxndr@bu.edu>,
	qemu-devel@nongnu.org, Stefan Hajnoczi <stefanha@redhat.com>
Subject: Re: Abort in mch_update_pciexbar
Date: Mon, 11 May 2020 09:42:57 +0200	[thread overview]
Message-ID: <49e451a3-0cdf-39ba-db9c-c61af6a58492@redhat.com> (raw)
In-Reply-To: <20200511033045-mutt-send-email-mst@kernel.org>

On 5/11/20 9:39 AM, Michael S. Tsirkin wrote:
> On Mon, May 11, 2020 at 09:10:48AM +0200, Philippe Mathieu-Daudé wrote:
>> On 5/11/20 8:19 AM, Philippe Mathieu-Daudé wrote:
>>> On 5/11/20 6:59 AM, Alexander Bulekov wrote:
>>>> Hello,
>>>> While fuzzing, I found an input that triggers an assertion failure in
>>>> mch_update_pciexbar:
>>>>
>>>> #6 0x7f38d387c55a in abort
>>>> /build/glibc-GwnBeO/glibc-2.30/stdlib/abort.c:79:7
>>>> #7 0x55c27e94ffd0 in mch_update_pciexbar hw/pci-host/q35.c:331:9
>>>> #8 0x55c27e94db38 in mch_write_config hw/pci-host/q35.c:487:9
>>>> #9 0x55c27e9e3f4c in pci_host_config_write_common hw/pci/pci_host.c:81:5
>>>> #10 0x55c27e9e5307 in pci_data_write hw/pci/pci_host.c:118:5
>>>> #11 0x55c27e9e6601 in pci_host_data_write hw/pci/pci_host.c:165:9
>>>> #12 0x55c27ca3b17b in memory_region_write_accessor memory.c:496:5
>>>> #13 0x55c27ca3a5e4 in access_with_adjusted_size memory.c:557:18
>>>> #14 0x55c27ca38177 in memory_region_dispatch_write memory.c:1488:16
>>>> #15 0x55c27c721325 in flatview_write_continue exec.c:3174:23
>>>> #16 0x55c27c70994d in flatview_write exec.c:3214:14
>>>> #17 0x55c27c709462 in address_space_write exec.c:3305:18
>>>
>>> These lines don't match QEMU v5.0.0.
>>>
>>>>
>>>> I can reproduce it in a qemu 5.0 build using:
>>>> cat << EOF | ~/Development/qemu/build/i386-softmmu/qemu-system-i386
>>>> -M pc-q35-5.0 -display none -nodefaults -nographic -qtest stdio
>>>> outl 0xcf8 0xf2000060
>>>> outl 0xcfc 0x8400056e
>>>
>>> The guest shouldn't ask for a reserved bar length (grep for
>>> MCH_HOST_BRIDGE_PCIEXBAR_LENGTH_RVD). I suppose we should simply report
>>> it as GUEST_ERROR and ignore it.
>>
>> This patch prevent the crash:
>>
>> -- >8 --
>> diff --git a/hw/pci-host/q35.c b/hw/pci-host/q35.c
>> index 2bbc90b28f..2b744aca93 100644
>> --- a/hw/pci-host/q35.c
>> +++ b/hw/pci-host/q35.c
>> @@ -36,6 +36,7 @@
>>   #include "qapi/error.h"
>>   #include "qapi/visitor.h"
>>   #include "qemu/module.h"
>> +#include "qemu/log.h"
>>
>>
>> /****************************************************************************
>>    * Q35 host
>> @@ -320,6 +321,9 @@ static void mch_update_pciexbar(MCHPCIState *mch)
>>           addr_mask |= MCH_HOST_BRIDGE_PCIEXBAR_64ADMSK;
>>           break;
>>       case MCH_HOST_BRIDGE_PCIEXBAR_LENGTH_RVD:
>> +        qemu_log_mask(LOG_GUEST_ERROR, "%s: Invalid use of reserved
>> value\n",
>> +                                       __func__);
>> +        return;
>>       default:
>>           abort();
>>       }
> 
> Maybe report the value too.

This is a 2 bit field, all are covered except 0b11 which is the RESERVED 
case, and the abort() now will never fire. It is unclear why the 
compiler doesn't notice that.

> 
>> ---
>>
>> But the real question is what would the real hardware do in this case.
> 
> Spec doesn't say unfortunately. All it says is:
> 	Designers must not rely on the absence or characteristics of any
> 	features or instructions marked "reserved" or "undefined." Intel
> 	reserves these for
> 
> 	future definition and shall have no responsibility whatsoever
> 	for conflicts or incompatibilities arising from future changes to them.

OK, thanks for checking. I'll submit formal patch with proper description.

> 
>>>
>>>> EOF
>>>>
>>>> I also uploaded the above trace, in case the formatting is broken:
>>>>
>>>> curl https://paste.debian.net/plain/1146095 | qemu-system-i386 -M
>>>> pc-q35-5.0 -display none -nodefaults -nographic -qtest stdio
>>>>
>>>> Please let me know if I can provide any further info.
>>>
>>> It would help the community if you fill your bug reports with Launchpad,
>>> so they don't get lost in the high email flow, and we can track/update
>>> them. See for example:
>>> https://bugs.launchpad.net/qemu/+bug/1835865 and
>>> https://lists.gnu.org/archive/html/qemu-devel/2020-03/msg06082.html
>>> which refers it.
> 



  reply	other threads:[~2020-05-11  7:43 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-05-11  4:59 Abort in mch_update_pciexbar Alexander Bulekov
2020-05-11  6:19 ` Philippe Mathieu-Daudé
2020-05-11  7:10   ` Philippe Mathieu-Daudé
2020-05-11  7:39     ` Michael S. Tsirkin
2020-05-11  7:42       ` Philippe Mathieu-Daudé [this message]
2020-05-11 15:31     ` Alexander Bulekov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=49e451a3-0cdf-39ba-db9c-c61af6a58492@redhat.com \
    --to=philmd@redhat.com \
    --cc=alxndr@bu.edu \
    --cc=mst@redhat.com \
    --cc=qemu-devel@nongnu.org \
    --cc=stefanha@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).