[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <YGXzY5h1eCQj6aU0@google.com>
Date: Thu, 1 Apr 2021 16:22:59 +0000
From: Sean Christopherson <seanjc@...gle.com>
To: Vitaly Kuznetsov <vkuznets@...hat.com>
Cc: Yang Li <yang.lee@...ux.alibaba.com>, pbonzini@...hat.com,
wanpengli@...cent.com, jmattson@...gle.com, joro@...tes.org,
tglx@...utronix.de, mingo@...hat.com, bp@...en8.de, x86@...nel.org,
hpa@...or.com, kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] KVM: x86: Fix potential memory access error
On Thu, Apr 01, 2021, Vitaly Kuznetsov wrote:
> Sean Christopherson <seanjc@...gle.com> writes:
>
> > On Wed, Mar 31, 2021, Yang Li wrote:
> >> Using __set_bit() to set a bit in an integer is not a good idea, since
> >> the function expects an unsigned long as argument, which can be 64bit wide.
> >> Coverity reports this problem as
> >>
> >> High:Out-of-bounds access(INCOMPATIBLE_CAST)
> >> CWE119: Out-of-bounds access to a scalar
> >> Pointer "&vcpu->arch.regs_avail" points to an object whose effective
> >> type is "unsigned int" (32 bits, unsigned) but is dereferenced as a
> >> wider "unsigned long" (64 bits, unsigned). This may lead to memory
> >> corruption.
> >>
> >> /home/heyuan.shy/git-repo/linux/arch/x86/kvm/kvm_cache_regs.h:
> >> kvm_register_is_available
> >>
> >> Just use BIT instead.
> >
> > Meh, we're hosed either way. Using BIT() will either result in undefined
> > behavior due to SHL shifting beyond the size of a u64, or setting random bits
> > if the truncated shift ends up being less than 63.
> >
>
> A stupid question: why can't we just make 'regs_avail'/'regs_dirty'
> 'unsigned long' and drop a bunch of '(unsigned long *)' casts?
It wouldn't break anything, but it would create a weird situation where x86-64
has more bits for tracking registers than i386. Obviously not the end of the
world, but it's also not clearly an improvement across the board.
We could do something like:
DECLARE_BITMAP(regs_avail, NR_VCPU_TRACKED_REGS);
DECLARE_BITMAP(regs_dirty, NR_VCPU_TRACKED_REGS);
but that would complicate the vendor code, e.g. vmx_register_cache_reset().
The casting crud is quite contained, and likely isn't going to expand anytime
soon. So, at least for me, this is one of the few cases where I'm content to
let sleeping dogs lie. :-)
Powered by blists - more mailing lists