Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2911583pxj; Mon, 14 Jun 2021 09:55:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxAXVaP/epohjgbvq1JO4haOfnwqTh3diQAFiDMANRxjMCkxEv5Tu+IDjUDLd8Lc8NMyuM0 X-Received: by 2002:a50:9b06:: with SMTP id o6mr18465527edi.284.1623689711142; Mon, 14 Jun 2021 09:55:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623689711; cv=none; d=google.com; s=arc-20160816; b=cZBydsIf6xPhNdZ5QGJyXES6a2xRXDX51Kp7i7EOGajqHnoURTahThCUeNh1r89PzU vcJjOFnApSxtHEP1wl2HT2I8+OTDN79w7bV8p+GSVs5UHNfQACeebWGM3BZXhhoVQttO Iyirrg+ittigRMpfis7l5TQtlLfJq5Qq8oc++MzmEKgqyTp5curmu8LmxbolmL9OJvIu oYyNq+x/fo7Z7sHXMj8tf8EPOuKOiPJoMElSQN+djLqGjRqQNGJ+RFShMF8Jiyd7bp7M SUY+VDLCZpal7lIkLmpobkUt8pnHjrTofKDrliCoG5SavJdjmzsmu6CjiuUubGNrmTTy +ZWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=sDC3ZriKuVVoRuBGYwoz1mVyNzfXvYt35uc+KrWkBHo=; b=OlEdIbW8K8r//v58xZ98hEdhmPy0XRoiOXsl7vYauF2B8UzvUI3jv0dUxzLWxZU3+G 3lT24c0NbLgksMQ1z6TaNILdUgMz0S9Sm+PmYb2h/t969SEtzMZNhHHhAHMBZMw6sqEb CKjsI+pUy/inpgoMvMknZVQv53b/3FzNw0fPvme3f5ZGdTvbjIttDMkeO7TYgbb+rhBg pk25SACFDxzD57RoBD/cekUxOweN6Y+olUU2+hVnu4YVgW2JGBzXGGqwTLBJ4jMSFvta zpIDQ084AkxQHyDDh4tCEaHXTi66ukvqZlOM/XY1l3FbTyFIjVxRRlGqlPPhtQ7LGvlI CXeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass (test mode) header.i=@ideasonboard.com header.s=mail header.b=fZ9RGzyx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y11si12025487edt.542.2021.06.14.09.54.48; Mon, 14 Jun 2021 09:55:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass (test mode) header.i=@ideasonboard.com header.s=mail header.b=fZ9RGzyx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235186AbhFNQxT (ORCPT + 99 others); Mon, 14 Jun 2021 12:53:19 -0400 Received: from perceval.ideasonboard.com ([213.167.242.64]:37500 "EHLO perceval.ideasonboard.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234032AbhFNQxQ (ORCPT ); Mon, 14 Jun 2021 12:53:16 -0400 Received: from pendragon.ideasonboard.com (62-78-145-57.bb.dnainternet.fi [62.78.145.57]) by perceval.ideasonboard.com (Postfix) with ESMTPSA id AFC50A59; Mon, 14 Jun 2021 18:51:11 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ideasonboard.com; s=mail; t=1623689471; bh=8qOYKilo3VDR4JOmaCNCxvAPF/6CG2VJgci4N0Qz8Zc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=fZ9RGzyx+SHbsZzn4TIBrM9xMJ/3HQN+ccsKwoBqmBhyIpK+d/OhxRm1KK6J2H0Vg yyF1SQUH+MwZf5Z6mwNRtIWI9ZqyOS/Ea0sy2g3ceKIhnPnK/G/R8GMrBYkQamjYlL 6AbVOUUHwYPHvXGFugFi4UUrPSjFy/0GXPqFtY5E= Date: Mon, 14 Jun 2021 19:50:52 +0300 From: Laurent Pinchart To: Arnd Bergmann Cc: Hans Verkuil , Mauro Carvalho Chehab , Arnd Bergmann , "Lad, Prabhakar" , Eduardo Valentin , Sakari Ailus , Greg Kroah-Hartman , Vaibhav Gupta , Liu Shixin , Jacopo Mondi , Andy Shevchenko , linux-kernel@vger.kernel.org, linux-media@vger.kernel.org, linux-staging@lists.linux.dev, syzbot+142888ffec98ab194028@syzkaller.appspotmail.com Subject: Re: [PATCH v3 1/8] media: v4l2-core: ignore native time32 ioctls on 64-bit Message-ID: References: <20210614103409.3154127-1-arnd@kernel.org> <20210614103409.3154127-2-arnd@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20210614103409.3154127-2-arnd@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Arnd, Thank you for the patch. On Mon, Jun 14, 2021 at 12:34:02PM +0200, Arnd Bergmann wrote: > From: Arnd Bergmann > > Syzbot found that passing ioctl command 0xc0505609 into a 64-bit > kernel from a 32-bit process causes uninitialized kernel memory to > get passed to drivers instead of the user space data: > > BUG: KMSAN: uninit-value in check_array_args drivers/media/v4l2-core/v4l2-ioctl.c:3041 [inline] > BUG: KMSAN: uninit-value in video_usercopy+0x1631/0x3d30 drivers/media/v4l2-core/v4l2-ioctl.c:3315 > CPU: 0 PID: 19595 Comm: syz-executor.4 Not tainted 5.11.0-rc7-syzkaller #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:79 [inline] > dump_stack+0x21c/0x280 lib/dump_stack.c:120 > kmsan_report+0xfb/0x1e0 mm/kmsan/kmsan_report.c:118 > __msan_warning+0x5f/0xa0 mm/kmsan/kmsan_instr.c:197 > check_array_args drivers/media/v4l2-core/v4l2-ioctl.c:3041 [inline] > video_usercopy+0x1631/0x3d30 drivers/media/v4l2-core/v4l2-ioctl.c:3315 > video_ioctl2+0x9f/0xb0 drivers/media/v4l2-core/v4l2-ioctl.c:3391 > v4l2_ioctl+0x255/0x290 drivers/media/v4l2-core/v4l2-dev.c:360 > v4l2_compat_ioctl32+0x2c6/0x370 drivers/media/v4l2-core/v4l2-compat-ioctl32.c:1248 > __do_compat_sys_ioctl fs/ioctl.c:842 [inline] > __se_compat_sys_ioctl+0x53d/0x1100 fs/ioctl.c:793 > __ia32_compat_sys_ioctl+0x4a/0x70 fs/ioctl.c:793 > do_syscall_32_irqs_on arch/x86/entry/common.c:79 [inline] > __do_fast_syscall_32+0x102/0x160 arch/x86/entry/common.c:141 > do_fast_syscall_32+0x6a/0xc0 arch/x86/entry/common.c:166 > do_SYSENTER_32+0x73/0x90 arch/x86/entry/common.c:209 > entry_SYSENTER_compat_after_hwframe+0x4d/0x5c > > The time32 commands are defined but were never meant to be called on > 64-bit machines, as those have always used time64 interfaces. I missed > this in my patch that introduced the time64 handling on 32-bit platforms. > > The problem in this case is the mismatch of one function checking for > the numeric value of the command and another function checking for the > type of process (native vs compat) instead, with the result being that > for this combination, nothing gets copied into the buffer at all. > > Avoid this by only trying to convert the time32 commands when running > on a 32-bit kernel where these are defined in a meaningful way. > > Fixes: 577c89b0ce72 ("media: v4l2-core: fix v4l2_buffer handling for time64 ABI") > Reported-by: syzbot+142888ffec98ab194028@syzkaller.appspotmail.com > Tested-by: Hans Verkuil > Signed-off-by: Arnd Bergmann > --- > This patch adds two more changes than the version that Hans tested > Signed-off-by: Arnd Bergmann Reviewed-by: Laurent Pinchart > --- > drivers/media/v4l2-core/v4l2-ioctl.c | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) > > diff --git a/drivers/media/v4l2-core/v4l2-ioctl.c b/drivers/media/v4l2-core/v4l2-ioctl.c > index 2673f51aafa4..58df927aec7e 100644 > --- a/drivers/media/v4l2-core/v4l2-ioctl.c > +++ b/drivers/media/v4l2-core/v4l2-ioctl.c > @@ -3073,7 +3073,7 @@ static int check_array_args(unsigned int cmd, void *parg, size_t *array_size, > static unsigned int video_translate_cmd(unsigned int cmd) > { > switch (cmd) { > -#ifdef CONFIG_COMPAT_32BIT_TIME > +#if !defined(CONFIG_64BIT) && defined(CONFIG_COMPAT_32BIT_TIME) > case VIDIOC_DQEVENT_TIME32: > return VIDIOC_DQEVENT; > case VIDIOC_QUERYBUF_TIME32: > @@ -3127,7 +3127,7 @@ static int video_get_user(void __user *arg, void *parg, > err = v4l2_compat_get_user(arg, parg, cmd); > } else { > switch (cmd) { > -#ifdef CONFIG_COMPAT_32BIT_TIME > +#if !defined(CONFIG_64BIT) && defined(CONFIG_COMPAT_32BIT_TIME) > case VIDIOC_QUERYBUF_TIME32: > case VIDIOC_QBUF_TIME32: > case VIDIOC_DQBUF_TIME32: > @@ -3182,7 +3182,7 @@ static int video_put_user(void __user *arg, void *parg, > return v4l2_compat_put_user(arg, parg, cmd); > > switch (cmd) { > -#ifdef CONFIG_COMPAT_32BIT_TIME > +#if !defined(CONFIG_64BIT) && defined(CONFIG_COMPAT_32BIT_TIME) > case VIDIOC_DQEVENT_TIME32: { > struct v4l2_event *ev = parg; > struct v4l2_event_time32 ev32; -- Regards, Laurent Pinchart