From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:56343) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1blvx0-0001RQ-63 for qemu-devel@nongnu.org; Mon, 19 Sep 2016 06:37:27 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1blvwu-00080j-P3 for qemu-devel@nongnu.org; Mon, 19 Sep 2016 06:37:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:35220) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1blvwu-00080C-I9 for qemu-devel@nongnu.org; Mon, 19 Sep 2016 06:37:20 -0400 References: <1474275971-3546-1-git-send-email-ppandit@redhat.com> From: Laszlo Ersek Message-ID: <87fdb7dd-34a6-6b6f-0119-afc483c8604e@redhat.com> Date: Mon, 19 Sep 2016 12:37:16 +0200 MIME-Version: 1.0 In-Reply-To: <1474275971-3546-1-git-send-email-ppandit@redhat.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH v2] virtio: add check for descriptor's mapped address List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: P J P , Qemu Developers Cc: Qinghao Tang , "Michael S. Tsirkin" , Stefan Hajnoczi , Prasad J Pandit On 09/19/16 11:06, P J P wrote: > From: Prasad J Pandit > > virtio back end uses set of buffers to facilitate I/O operations. > If its size is too large, 'cpu_physical_memory_map' could return > a null address. This would result in a null dereference while > un-mapping descriptors. Add check to avoid it. > > Reported-by: Qinghao Tang > Signed-off-by: Prasad J Pandit > --- > hw/virtio/virtio.c | 5 +++++ > 1 file changed, 5 insertions(+) > > Update per: > -> https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03889.html > > diff --git a/hw/virtio/virtio.c b/hw/virtio/virtio.c > index 15ee3a7..311dd0b 100644 > --- a/hw/virtio/virtio.c > +++ b/hw/virtio/virtio.c > @@ -472,6 +472,11 @@ static void virtqueue_map_desc(unsigned int *p_num_sg, hwaddr *addr, struct iove > } > > iov[num_sg].iov_base = cpu_physical_memory_map(pa, &len, is_write); > + if (!iov[num_sg].iov_base) { > + error_report("virtio: bogus descriptor or out of resources"); > + exit(EXIT_FAILURE); > + } > + > iov[num_sg].iov_len = len; > addr[num_sg] = pa; > > Reviewed-by: Laszlo Ersek