Received: by 10.223.185.116 with SMTP id b49csp3023771wrg; Mon, 12 Feb 2018 19:39:20 -0800 (PST) X-Google-Smtp-Source: AH8x226w11/d31MyUFZm3S9w5Volt8UqrZa0lbvCakEDISAYnBrSFb18+9FmViwGgGWcg1COIprL X-Received: by 2002:a17:902:61:: with SMTP id 88-v6mr12940814pla.428.1518493160025; Mon, 12 Feb 2018 19:39:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518493160; cv=none; d=google.com; s=arc-20160816; b=VBlPgML2eiwyJLwhP8uSjQ4gzZFZAs6XowTc4ZH8z1vo9lrv04SIcqsp2phJm91zpF ENgHdFPQTLbzYojjQDmWH0FYvaYA8WfV1v0rgMO7K7VhX+mTqsQzc9vsdLjVz9WNMsuA 4cjXl8uRkwhIhF0DyKeDVrgyZcbTSZffpkTI148ouXmjI5bVBAFZPcrpppUizBDYuoAO DPSV3CrLfGPnVPOitdUZa95lRLrcJUyecZ0LYAlXX37HAewaGJp5tf/8YB4MoSxBaZek xhplU30cLYa5SyMge8ku7fawpbkm4xH+Ubq4HOycyH8CHb39uvbGdGI9M2gOrVMU+2Dk CO/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=55wwDwRrNhLvkesQgSBAetKKCQdGuc5yYlM6Ir5gAsU=; b=NEthrYN5E97zPoU6NdNdnO/1lTh9JqHSscbPxHJCpSgpia8rfwJif8wVA7bwpxeS3C p+RN1EkyQN3C3TNNM6PEmc31dqYpwAIAGac9IQjxN5Be9AoMJ4Kzac9mDCsycMDyITgE NuZAneDmqAS/cFhd9SbbiExkyvlIrcKHpuRyh/sm60UDiTIgkFNdJ4PFoZAtLQWPDM4H RXou7YixTakLqcYemjtfTB/v2wiUywlTfxsYi/h9I1zhd8wwGSvtk/4kbhHH+6+Kkc86 bFAnQqxc76Qui2Leh0IQnsCwBHdpKoI+PsTdr1rHtitWGNcCd8z7Xraj87z1VExIGO3B k9Hg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=dtUmXrjY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c23-v6si795200plo.45.2018.02.12.19.39.04; Mon, 12 Feb 2018 19:39:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=dtUmXrjY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933386AbeBMDi1 (ORCPT + 99 others); Mon, 12 Feb 2018 22:38:27 -0500 Received: from mail-pg0-f67.google.com ([74.125.83.67]:40116 "EHLO mail-pg0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933323AbeBMDiY (ORCPT ); Mon, 12 Feb 2018 22:38:24 -0500 Received: by mail-pg0-f67.google.com with SMTP id g2so8972844pgn.7; Mon, 12 Feb 2018 19:38:24 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=55wwDwRrNhLvkesQgSBAetKKCQdGuc5yYlM6Ir5gAsU=; b=dtUmXrjYL8LgTBajTAQAQ4r4d967NcNWt8EwYbDY13g+kCjDuCGrOdzRpAqIK2k898 yqAPvT5U+U7o/JJQg55rLbsTN+yoGPd/XbKWRvlMYyu0+YC//6+LgGkhhlXIA8UkXrty XUqoMKhB5GBfXUpQe31hfi+7QwIIRJHXqi6Zmismgqnyv4xU5PxgrxdUuOZdkcc5rmTm bYwG9HIMdVwrbDNEVX4Ixy/Rmr0k/gr5Tl0s1795W9RPesYPV8j2Xs1SnrIXWQ96SIGP 9pUM2e983litJWsag3RamFQI7FiVyO1Y6cLaLNT724dEB/AKqae1vP96pdsFDGYmPE6j Wbjw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=55wwDwRrNhLvkesQgSBAetKKCQdGuc5yYlM6Ir5gAsU=; b=YKqqIApSZn3Oywgl+sJh8tCzShchCKnA0mxxbnA937WKW91tFj7xzLa/COKT98iI9y j0RcWXPk9JL1Ij3bKoZu9Z99FeTFhU5rxUEf3p7DMQLt3ci28PZtK/yKsDB1j78QL8vS 8tN/sdHhVySHeJEBhh9/xbtrIfHCYIOYVTmEPRUZI52tSVUYBBbwJ7+Oi7Nms0HC+PGZ g88nM96WMIgkRCFDlIEIT8N9DyA0tnKReKL0WfJBQLErHd4leI+4TiiC5rD38rzzo9Jt 1ImSSbOaIdVKdzpqRMajd8M8HqHSM+6bj/i63/GhBJh2PsasrDtUZ12M45yUzB2Zunbq UTvw== X-Gm-Message-State: APf1xPDBh2il4igdYHtKfAkfa4h5tpIzL1ScxykH0Azw9NY2geZFlTTl k/OD6B0jowvfGLmjawOhEV0= X-Received: by 10.98.102.88 with SMTP id a85mr13786187pfc.235.1518493104019; Mon, 12 Feb 2018 19:38:24 -0800 (PST) Received: from zzz.localdomain (c-67-185-97-198.hsd1.wa.comcast.net. [67.185.97.198]) by smtp.gmail.com with ESMTPSA id r2sm23085613pgt.75.2018.02.12.19.38.22 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 12 Feb 2018 19:38:23 -0800 (PST) Date: Mon, 12 Feb 2018 19:38:21 -0800 From: Eric Biggers To: Wanpeng Li Cc: kvm , Paolo Bonzini , Radim =?utf-8?B?S3LEjW3DocWZ?= , linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, Eric Biggers , stable@vger.kernel.org, Alex Williamson Subject: Re: [PATCH] KVM: prevent overlap between user and private memslots Message-ID: <20180213033821.GA23301@zzz.localdomain> References: <94eb2c06f65e7ece95055cf1aafd@google.com> <20180119081820.30803-1-ebiggers3@gmail.com> <20180119185716.rmjh7nts6cubkvgw@gmail.com> <20180130204921.trzixusqdorm4a7w@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180130204921.trzixusqdorm4a7w@gmail.com> User-Agent: Mutt/1.9.3 (2018-01-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 30, 2018 at 12:49:21PM -0800, Eric Biggers wrote: > On Fri, Jan 19, 2018 at 10:57:16AM -0800, Eric Biggers wrote: > > +Cc alex.williamson@redhat.com > > > > On Fri, Jan 19, 2018 at 05:03:47PM +0800, Wanpeng Li wrote: > > > 2018-01-19 17:01 GMT+08:00 Wanpeng Li : > > > > 2018-01-19 16:18 GMT+08:00 Eric Biggers : > > > >> From: Eric Biggers > > > >> > > > >> Memslots must not overlap in guest physical memory, since otherwise some > > > >> guest physical addresses will not uniquely map to a memslot. Yet, the > > > >> overlap check in __kvm_set_memory_region() allows a memslot that > > > >> overlaps one of the "private" memslots, e.g. the memslot reserved for > > > >> the TSS on x86. > > > >> > > > >> This seems to be a very old bug that was introduced years ago when > > > >> private memory slots were first added. It seems that later refactoring > > > >> incorrectly assumed this bug was intentional and preserved it. > > > >> > > > >> Fix it by removing the loophole for private memslots, so we just check > > > >> for overlap against all memslots. > > > >> > > > >> This bug was found by syzkaller, which used a memslot overlap to make > > > >> pte_list_remove() be called for the wrong memslot, hitting a BUG(): > > > >> > > > >> pte_list_remove: 000000007185ed42 0->BUG > > > >> kernel BUG at arch/x86/kvm/mmu.c:1209! > > > >> [...] > > > >> RIP: 0010:pte_list_remove+0x107/0x110 arch/x86/kvm/mmu.c:1208 > > > >> [...] > > > >> Call Trace: > > > >> mmu_page_zap_pte+0x7e/0xd0 arch/x86/kvm/mmu.c:2499 > > > >> kvm_mmu_page_unlink_children arch/x86/kvm/mmu.c:2521 [inline] > > > >> kvm_mmu_prepare_zap_page+0x4f/0x340 arch/x86/kvm/mmu.c:2565 > > > >> kvm_zap_obsolete_pages arch/x86/kvm/mmu.c:5348 [inline] > > > >> kvm_mmu_invalidate_zap_all_pages+0xa6/0x100 arch/x86/kvm/mmu.c:5389 > > > >> kvm_mmu_notifier_release+0x4f/0x80 arch/x86/kvm/../../../virt/kvm/kvm_main.c:468 > > > >> __mmu_notifier_release+0x63/0x100 mm/mmu_notifier.c:75 > > > >> mmu_notifier_release include/linux/mmu_notifier.h:244 [inline] > > > >> exit_mmap+0x160/0x170 mm/mmap.c:3009 > > > >> __mmput kernel/fork.c:966 [inline] > > > >> mmput+0x44/0xd0 kernel/fork.c:987 > > > >> exit_mm kernel/exit.c:544 [inline] > > > >> do_exit+0x24a/0xb50 kernel/exit.c:856 > > > >> do_group_exit+0x34/0xb0 kernel/exit.c:972 > > > >> SYSC_exit_group kernel/exit.c:983 [inline] > > > >> SyS_exit_group+0xb/0x10 kernel/exit.c:981 > > > >> entry_SYSCALL_64_fastpath+0x1e/0x8b > > > >> > > > >> Reproducer: > > > >> > > > >> #include > > > >> #include > > > >> #include > > > >> > > > >> int main() > > > >> { > > > >> static char buf[4096*3] __attribute__((aligned(4096))); > > > >> int kvm, vm, cpu; > > > >> struct kvm_mp_state mp_state = { KVM_MP_STATE_SIPI_RECEIVED }; > > > >> struct kvm_userspace_memory_region memreg = { > > > >> .memory_size = sizeof(buf), > > > >> .userspace_addr = (__u64)buf, > > > >> }; > > > >> > > > >> kvm = open("/dev/kvm", O_RDWR); > > > >> vm = ioctl(kvm, KVM_CREATE_VM, 0); > > > >> ioctl(vm, KVM_CREATE_IRQCHIP); > > > >> cpu = ioctl(vm, KVM_CREATE_VCPU, 0); > > > >> ioctl(cpu, KVM_SET_MP_STATE, &mp_state); > > > >> ioctl(vm, KVM_SET_TSS_ADDR, 0); > > > >> ioctl(cpu, KVM_RUN, 0); > > > >> ioctl(vm, KVM_SET_USER_MEMORY_REGION, &memreg); > > > >> } > > > >> > > > >> Reported-by: syzbot > > > >> Fixes: e0d62c7f4860 ("KVM: Add kernel-internal memory slots") > > > >> Cc: # v2.6.25+ > > > >> Signed-off-by: Eric Biggers > > > > > > > > Please refer to this one. https://patchwork.kernel.org/patch/9645377/ > > > > > > https://lkml.org/lkml/2017/3/27/57 > > > > > > > Ah, so this was reported before, and you sent the same fix. Well, it was never > > applied, so the bug is still there, and anyone who can use /dev/kvm can trigger > > it. So one of these patches needs to be applied, unless there is a better fix. > > > > I don't agree with the "Fixes:" line in your version of the patch. The bug was > > actually there prior to 5419369ed, which might explain why that commit seemed to > > preserve the behavior intentionally. (Note that KVM_MEMORY_SLOTS did not > > include the private memory slots; it was later renamed to KVM_USER_MEM_SLOTS.) > > > > Eric > > Ping. Paolo or Radim, can you please consider applying one of these patches? > > Eric Ping.