Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp5298956rwb; Wed, 7 Sep 2022 00:01:42 -0700 (PDT) X-Google-Smtp-Source: AA6agR6vaawsenSFI/e50/WaSPbwLt8Y8eN/ce7rNPKxOBLpBl7zXvhbQne0FfWQCqlM6M0HmVzJ X-Received: by 2002:a17:902:d4c8:b0:175:3cb9:8919 with SMTP id o8-20020a170902d4c800b001753cb98919mr2478198plg.170.1662534101906; Wed, 07 Sep 2022 00:01:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662534101; cv=none; d=google.com; s=arc-20160816; b=rjKEOeDIL1QxK/95u0QU20c6gNJP/sE2C+nQVkHXyUjrOUPqWCp2KjGPt3Wdhpwtbw OpdYxR9o5W9DK1aKUyzGxozWbkp8UrdXWki3hOEM97M5e434SmnUKtsoFubHqGl4vjeK ZBKBSOzO1ot31Krit84EaZrh7VIOJhVWv+LBbOOv8MslxL+eRN0qz7uvbRZu4lu6/6cU PfjxTq9GnUoSr7oFd4w76SQUNfKnYSqWZ7hBpwCicIjs8HTjrp4orvFKcF20L+6cdx5m famnEdFKlGjBTTKcF9HVgC155MepNN6ZrzSXq/JN0x2bfMvv45NqUNuiUGiPbm2u4jVm E6/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=BVuk17Av+bi2jPnkL9wfgDXhvd64IxzBdo6fgEYGs04=; b=htkvSjxb4pnCp3QhD8OSPkQYXgQfP96pf6/XJ3e6yNAiwcsXj7qB4iV6uqZQfOp5vZ 4yCIgBE3M62T653Y3zJbIs6f5D4epmIoZp+NbNqf9VR19pWMjCEDQzAtyPOLmT7Nyt4L dUdxpNhRG8GpgslvraUDkbYP/pCZ6W562ON9sV9/tmig6c40sNmVd0byEVxi1pgXCxfw yJcII//FpJR6Bz78CmZqvuTvjsJseRljxGX9QfJDUrMSVjgRnlsqiTAtRCHcSUuSNRjX 8uNSs3xfjuILhEV8irZqPAVxax0q7LJ1sefh93LrGlU3NvrB9aDQNnlZ0lSGXWxKII3i bdfw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=l+Ix4zgC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s78-20020a632c51000000b004345ffb9987si8185557pgs.144.2022.09.07.00.01.29; Wed, 07 Sep 2022 00:01:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=l+Ix4zgC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229904AbiIGGss (ORCPT + 99 others); Wed, 7 Sep 2022 02:48:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46010 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230045AbiIGGsP (ORCPT ); Wed, 7 Sep 2022 02:48:15 -0400 Received: from mail-ej1-x62b.google.com (mail-ej1-x62b.google.com [IPv6:2a00:1450:4864:20::62b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CCEE58604B for ; Tue, 6 Sep 2022 23:48:07 -0700 (PDT) Received: by mail-ej1-x62b.google.com with SMTP id fy31so28178910ejc.6 for ; Tue, 06 Sep 2022 23:48:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date; bh=BVuk17Av+bi2jPnkL9wfgDXhvd64IxzBdo6fgEYGs04=; b=l+Ix4zgCkeWJQbwso5ymf9RKOOdyJP++7E7Hn7qNe8++KSvt+whxkZnLOMrQDs0DOx 8Bnxfj3DRwnWqEyzdSyphQxdWMFT3V9Qs7b/tDHbUlIorwV6gri3bErqpuPWekLHhOlc 95QccTtWJAE1QfDqOjrgxBl7o3tHfz3Xov6eefmcjs15qr03X6yCbHQUZzOjBwtnJ2Ce v3MSn5FI8PTpUV7LwrFWYTCWsHEzEAT0OYOVxybHCEP0lYHSssUuWNBoYyY5Iuisb3F8 v4ZMnm1GSBiSXQSM4x8txzQJ+vXfmqGl5JiI3TvxUzzycXJ69jn0CXTzpi52Mui/bNAT qL5g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date; bh=BVuk17Av+bi2jPnkL9wfgDXhvd64IxzBdo6fgEYGs04=; b=az9fMkpPBfSUNZ3olXKirtm90klMQDYm5LUaCUD+PUqWkol00jlxx2YrBV5VW2JL/r CrWCcVxQFWEvVsExb+q4EYhJmOUEMcVp9XqMyaa98YAsgqFPgcKlgoCXzzRg8kU/nEjW qyX0WnpdT/5NZ8QNP0xlZsEWVtUY5copp3UkcLo8xf7DzgkymEyuJFvu0c94wnvQNKOk Hzx5Z1tfafd+9iwgGQB2DZFDX6o3eBvHToMVgvKTmiKdxd1+xNjfsJOoEj+UVX6dcTNI 0ZsmSyfbBVPUxhVZYDrOxAUtpkXclHecVUFMt1l2F22zoNPt9oNFB2a8JOAnHu2NwAo9 ZRsA== X-Gm-Message-State: ACgBeo0cRBPMIloZc/jSdOo30Q5ymcI8O6SrQDCZ9ssJmtUBh+KozAcH ScZLPDBgE6oKIHAek8bUtnPOJfuetnNAgmyLTZk= X-Received: by 2002:a17:907:6d16:b0:731:17b5:699 with SMTP id sa22-20020a1709076d1600b0073117b50699mr1428930ejc.23.1662533286189; Tue, 06 Sep 2022 23:48:06 -0700 (PDT) MIME-Version: 1.0 References: <20220907030754.GU1089@zhen-hp.sh.intel.com> In-Reply-To: <20220907030754.GU1089@zhen-hp.sh.intel.com> From: Zheng Hacker Date: Wed, 7 Sep 2022 14:47:54 +0800 Message-ID: Subject: Re: [PATCH] drm/i915/gvt: fix double-free bug in split_2MB_gtt_entry. To: Zhenyu Wang Cc: Greg KH , alex000young@gmail.com, security@kernel.org, dri-devel@lists.freedesktop.org, tvrtko.ursulin@linux.intel.com, airlied@linux.ie, intel-gfx@lists.freedesktop.org, joonas.lahtinen@linux.intel.com, linux-kernel@vger.kernel.org, xmzyshypnc <1002992920@qq.com>, jani.nikula@linux.intel.com, daniel@ffwll.ch, rodrigo.vivi@intel.com, intel-gvt-dev@lists.freedesktop.org, zhi.a.wang@intel.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Zhenyu, Very glad for your reply. I agree that the bug is hard to trigger in userspace. But it is possible to happen in some specific scene. For example, if calling pfn_valid failed, the bug will be triggered. And it did happened as the [1] commit description illustrates. As for the patch, I think your plan is the best. We need to free the spt only in bad case. [1] https://github.com/torvalds/linux/commit/39b4cbadb9a95bf3f13ea102d6ec84= 1940916ee2 Regards, Zheng Wang Zhenyu Wang =E4=BA=8E2022=E5=B9=B49=E6=9C=887=E6= =97=A5=E5=91=A8=E4=B8=89 11:33=E5=86=99=E9=81=93=EF=BC=9A > > On 2022.09.06 19:36:56 +0800, Zheng Hacker wrote: > > Hi Greg, > > > > Alex has explained how we figured out the patch. We did analyze the > > code and found it possible to reach the vulnerability code. But we > > have no physical device in hand to test the driver. So we'd like to > > discuss with developers to see if the issue exists or not. > > > > Best regards, > > Zheng Wang. > > > > Greg KH ???2022???9???5????????? 16:04????= ????? > > > > > > On Mon, Sep 05, 2022 at 03:46:09PM +0800, Zheng Hacker wrote: > > > > I rewrote the letter. Hope it works. > > > > > > > > There is a double-free security bug in split_2MB_gtt_entry. > > > > > > > > Here is a calling chain : > > > > ppgtt_populate_spt->ppgtt_populate_shadow_entry->split_2MB_gtt_entr= y. > > > > If intel_gvt_dma_map_guest_page failed, it will call > > > > ppgtt_invalidate_spt, which will finally call ppgtt_free_spt and > > > > kfree(spt). But the caller does not notice that, and it will call > > > > ppgtt_free_spt again in error path. > > > > > > It's a little mess in code so in theory it might be possible but > intel_gvt_dma_map_guest_page won't fail in practise... > > > > > Fix this by returning the result of ppgtt_invalidate_spt to split_2= MB_gtt_entry. > > > > > > I don't see why changing ret value can fix this issue, as it doesn't chan= ge > any behavior e.g caller of ppgtt_populate_spt to handle possible differen= t error return. > > As current code looks assuming that ppgtt_invalidate_spt would free spt i= n good case, > I think the real cleanup should split that assumption and handle free in = error case properly. > > > > > Signed-off-by: Zheng Wang > > This misses proper email address. > > thanks > > > > > > > > > --- > > > > drivers/gpu/drm/i915/gvt/gtt.c | 2 +- > > > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > > > > > diff --git a/drivers/gpu/drm/i915/gvt/gtt.c b/drivers/gpu/drm/i915/= gvt/gtt.c > > > > index ce0eb03709c3..9f14fded8c0c 100644 > > > > --- a/drivers/gpu/drm/i915/gvt/gtt.c > > > > +++ b/drivers/gpu/drm/i915/gvt/gtt.c > > > > @@ -1215,7 +1215,7 @@ static int split_2MB_gtt_entry(struct intel_v= gpu *vgpu, > > > > ret =3D intel_gvt_dma_map_guest_page(vgpu, start_gf= n + sub_index, > > > > PAGE_SIZE, &dma_= addr); > > > > if (ret) { > > > > - ppgtt_invalidate_spt(spt); > > > > + ret =3D ppgtt_invalidate_spt(spt); > > > > return ret; > > > > > > But now you just lost the original error, shouldn't this succeed even= if > > > intel_gvt_dma_map_guest_page() failed? > > > > > > And how are you causing intel_gvt_dma_map_guest_page() to fail in a r= eal > > > system? > > > > > > thanks, > > > > > > greg k-h