Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp386897ybe; Thu, 12 Sep 2019 22:43:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqySh7GpX1lIZqhSWrCfGXKVrMngBvm/ucM8Lkrju5AVyqAN9HHy0XrB4RyuAFxrs9Erm/1J X-Received: by 2002:aa7:d59a:: with SMTP id r26mr45964481edq.137.1568353435118; Thu, 12 Sep 2019 22:43:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568353435; cv=none; d=google.com; s=arc-20160816; b=u2v4+wX9pzSSqDS3GBv5/He9GRR76JtNft0g50V7HyI5PNboD+3ZrpJBCDJMKjb45Z xhG6bEEpQmeEA+k13rDH5afiIoZXiRN2L1WkIdNJTn7tA1slygozlfLPffkPsulrEBcX d6SZB91hYtEA9hGpBN+0sQkXoD+fuOcOUkeGg2KSV1hMF+mkbsH0Gly9yTaLpmOuSqs2 gmMt6GUyeLwzT6SFB+Qpx2Ap0fAsF21t9Se+U0MuQNlVdS/YPPi/5OPA5uoxW2Tjxkuz LhPJrD9uE+hFut01VnwF73lsDc6ll6kKuifRnpo/r61kw82+3yKWpdzsjAceEu3PBiw+ Kjzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=mg0h5LGjp0jnTlt36IQ7AfQ64EZxtw0rPvJVBDArGKk=; b=LUphLVuGh7J/tSVUqhaWG/D8B0msPmjbcSZ0QlFdoINutaxUKIqg3nAhSHkKzvG3M5 e4v3CB6TmSBaUcWRHi3zC0mHB+c0ITORh3PMPmlL6tuBsHZEFaqVmeq4lgZvWj/9s6eu VImnkOxCrVhmClePespmq40WbJbLvCZKiu+4ijW7fJY0yPwKIDrtVFGHfvFWDZrETtwn yD2pcK9MBXwPbf6a8RnkK36VrB5q8TdvtQ7GFDMernjJacsaCm4LhDfTmim0WzFKE6xZ ERR4+x3mKUZ+sOFHNi1j1yr2/X4oOOiVDPz6CVskMigzcKqrs+Ya4/tfrENGhdFTVWlP gqug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nAxqE1je; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n22si9943848edq.33.2019.09.12.22.43.31; Thu, 12 Sep 2019 22:43:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nAxqE1je; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726891AbfIMEqU (ORCPT + 99 others); Fri, 13 Sep 2019 00:46:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:44036 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725817AbfIMEqU (ORCPT ); Fri, 13 Sep 2019 00:46:20 -0400 Received: from localhost (unknown [84.241.200.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E110E20644; Fri, 13 Sep 2019 04:46:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568349979; bh=t3fz3+C+Rszs5v117iwBq01Z8XVjIxQhv9Gun6u8tMU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=nAxqE1jeHzcBqj7vt2s31JX2mZM36TzeeTNCnxyL124j8DT8qYynyf9uvPTX1WWBE C75UMsP2UwpAl28q5wSIIUIlBB6QPBGHaqSDmsd2y2Zh6WjEoo/yKgvSstp7N1vntj xDZK3JeX1rIm8lqy0gvUtH0FvxXLVy4WRzEMdS+c= Date: Fri, 13 Sep 2019 05:46:14 +0100 From: Greg Kroah-Hartman To: Paolo Bonzini Cc: Vitaly Kuznetsov , kvm@vger.kernel.org, bp@alien8.de, carlo@caione.org, catalin.marinas@arm.com, devicetree@vger.kernel.org, hpa@zytor.com, jmattson@google.com, joro@8bytes.org, khilman@baylibre.com, linux-amlogic@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, mark.rutland@arm.com, mingo@redhat.com, narmstrong@baylibre.com, rkrcmar@redhat.com, robh+dt@kernel.org, sean.j.christopherson@intel.com, syzkaller-bugs@googlegroups.com, tglx@linutronix.de, wanpengli@tencent.com, will.deacon@arm.com, x86@kernel.org, syzbot , Dmitry Vyukov , USB list Subject: Re: KASAN: slab-out-of-bounds Read in handle_vmptrld Message-ID: <20190913044614.GA120223@kroah.com> References: <000000000000a9d4f705924cff7a@google.com> <87lfutei1j.fsf@vitty.brq.redhat.com> <5218e70e-8a80-7c5f-277b-01d9ab70692a@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5218e70e-8a80-7c5f-277b-01d9ab70692a@redhat.com> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 12, 2019 at 06:49:26PM +0200, Paolo Bonzini wrote: > [tl;dr: there could be a /dev/usb bug only affecting KASAN > configurations, jump to the end to skip the analysis and get to the bug > details] > > On 12/09/19 15:54, Vitaly Kuznetsov wrote: > > Hm, the bisection seems bogus but the stack points us to the following > > piece of code: > > > > 4776) if (kvm_vcpu_map(vcpu, gpa_to_gfn(vmptr), &map)) { > > > > 4783) return nested_vmx_failValid(vcpu, > > 4784) VMXERR_VMPTRLD_INCORRECT_VMCS_REVISION_ID); > > 4785) } > > 4786) > > 4787) new_vmcs12 = map.hva; > > 4788) > > *4789) if (new_vmcs12->hdr.revision_id != VMCS12_REVISION || > > 4790) (new_vmcs12->hdr.shadow_vmcs && > > 4791) !nested_cpu_has_vmx_shadow_vmcs(vcpu))) { > > > > the reported problem seems to be on VMCS12 region access but it's part > > of guest memory and we successfuly managed to map it. We're definitely > > within 1-page range. Maybe KASAN is just wrong here? > > Here is the relevant part of the syzkaller repro: > > syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, > &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) > r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', > 0x40000fffffd, 0x200800000000042) > mmap$IORING_OFF_SQES(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x4, 0x13, > r3, 0x10000000) > syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, > &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) > ioctl$KVM_RUN(r2, 0xae80, 0x0) > > The mmap$IORING_OFF_SQES is just a normal mmap from a device, which > replaces the previous mapping for guest memory and in particular > 0x7f0000007000 which is the VMCS (from the C reproducer: "#define > ADDR_VAR_VMCS 0x7000"). > > The previous mapping is freed with do_munmap and then repopulated in > usbdev_mmap with remap_pfn_range. In KVM this means that kvm_vcpu_map > goes through hva_to_pfn_remapped, which correctly calls get_page via > kvm_get_pfn. (Note that although drivers/usb/core/devio.c's usbdev_mmap > sets VM_IO *after* calling remap_pfn_range, remap_pfn_range itself > helpfully sets it before calling remap_p4d_range. And anyway KVM is > looking at vma->vm_flags under mmap_sem, which is held during mmap). > > So, KVM should be doing the right thing. Now, the error is: > > > Read of size 4 at addr ffff888091e10000 by task syz-executor758/10006 > > The buggy address belongs to the object at ffff888091e109c0 > > The buggy address is located 2496 bytes to the left of > > 8192-byte region [ffff888091e109c0, ffff888091e129c0) > > And given the use of remap_pfn_range in devusb_mmap, the simplest > explanation could be that USB expects kmalloc-8k to return 8k-aligned > values, but this is not true anymore with KASAN. CCing Dmitry, Greg and > linux-usb. USB drivers expect kmalloc to return DMA-able memory. I don't know about specific alignment issues, that should only an issue for the host controller being used here, which you do not say in the above list. We have had some reports that usbdev_mmap() does not do the "correct thing" for all host controllers, but a lot of the DMA work that is in linux-next for 5.4-rc1 should have helped resolve those issues. What tree are you seeing these bug reports happening from? thanks, greg k-h