lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20250814161718.GA3117411-robh@kernel.org>
Date: Thu, 14 Aug 2025 11:17:18 -0500
From: Rob Herring <robh@...nel.org>
To: Daniel Stone <daniel@...ishbar.org>
Cc: Tomeu Vizoso <tomeu@...euvizoso.net>,
	Krzysztof Kozlowski <krzk+dt@...nel.org>,
	Conor Dooley <conor+dt@...nel.org>,
	Oded Gabbay <ogabbay@...nel.org>,
	Maarten Lankhorst <maarten.lankhorst@...ux.intel.com>,
	Maxime Ripard <mripard@...nel.org>,
	Thomas Zimmermann <tzimmermann@...e.de>,
	David Airlie <airlied@...il.com>, Simona Vetter <simona@...ll.ch>,
	Sumit Semwal <sumit.semwal@...aro.org>,
	Christian König <christian.koenig@....com>,
	Robin Murphy <robin.murphy@....com>,
	Steven Price <steven.price@....com>, devicetree@...r.kernel.org,
	linux-kernel@...r.kernel.org, dri-devel@...ts.freedesktop.org,
	linux-media@...r.kernel.org, linaro-mm-sig@...ts.linaro.org
Subject: Re: [PATCH v2 2/2] accel: Add Arm Ethos-U NPU driver

On Thu, Aug 14, 2025 at 11:51:44AM +0100, Daniel Stone wrote:
> Hi Rob,

Thanks for the review.

> 
> On Tue, 12 Aug 2025 at 13:53, Daniel Stone <daniel@...ishbar.org> wrote:
> > On Mon, 11 Aug 2025 at 22:05, Rob Herring (Arm) <robh@...nel.org> wrote:
> > > +static int ethos_ioctl_submit_job(struct drm_device *dev, struct drm_file *file,
> > > +                                  struct drm_ethos_job *job)
> > > +{
> > > +       [...]
> > > +       ejob->cmd_bo = drm_gem_object_lookup(file, job->cmd_bo);
> > > +       cmd_info = to_ethos_bo(ejob->cmd_bo)->info;
> > > +       if (!ejob->cmd_bo)
> > > +               goto out_cleanup_job;
> >
> > NULL deref here if this points to a non-command BO. Which is better
> > than wild DMA, but hey.
> 
> Sorry this wasn't more clear. There are two NULL derefs here. If you
> pass an invalid BO, ejob->cmd_bo is dereferenced before the NULL
> check, effectively neutering it and winning you a mail from the other
> Dan when he runs sparse on it. Secondly you pass a BO which is valid
> but not a command BO, cmd_info gets unconditionally dereferenced so it
> will fall apart there too.

Yep. And there's a 3rd issue that I'm not setting 'ret' to an error 
value.

> 
> > > +       for (int i = 0; i < NPU_BASEP_REGION_MAX; i++) {
> > > +               struct drm_gem_object *gem;
> > > +
> > > +               if (job->region_bo_handles[i] == 0)
> > > +                       continue;
> > > +
> > > +               /* Don't allow a region to point to the cmd BO */
> > > +               if (job->region_bo_handles[i] == job->cmd_bo) {
> > > +                       ret = -EINVAL;
> > > +                       goto out_cleanup_job;
> > > +               }
> >
> > And here I suppose you want to check if the BO's info pointer is
> > non-NULL, i.e. disallow use of _any_ command BO instead of only
> > disallowing this job's own command BO.
> 
> This is the main security issue, since it would allow writes a
> cmdstream BO which has been created but is not _the_ cmdstream BO for
> this job. Fixing that is pretty straightforward, but given that
> someone will almost certainly try to add dmabuf support to this
> driver, it's also probably worth a comment in the driver flags telling
> anyone who tries to add DRIVER_PRIME that they need to disallow export
> of cmdbuf BOs.

What would be the usecase for exporting BOs here?

I suppose if one wants to feed in camera data and we need to do the 
allocation in the ethos driver since it likely has more constraints 
(i.e. must be contiguous). (Whatever happened on the universal allocator 
or constraint solver? I haven't been paying attention for a while...)

> Relatedly, I think there's missing validity checks around the regions.
> AFAICT it would be possible to do wild memory access:
> * create a cmdstream BO which accesses one region
> * submit a job using that cmdstream with one data BO correctly
> attached to the region, execute the job and wait for completion
> * free the data BO
> * resubmit that job but declare zero BO handles
> 
> The first issue is that the job will be accepted by the processing
> ioctl, because it doesn't check that all the regions specified by the
> cmdstream are properly filled in by the job, which is definitely one
> to fix for validation. The second issue is that region registers are
> not cleared in any way, so in the above example, the second job will
> reuse the region configuration from the first. I'm not sure if
> clearing out unused job fields would be helpful defence in depth or
> not; your call.

I had considered clearing unused the region registers. That really has 
little effect. There's not any way to disable regions. And region 
offsets are a full 64-bits, so even if one set base address to 0 or some 
faulting region, a cmdstream can still get to any address.

The other issue is just whether there's leftover cmdstream state from 
prior jobs. That's why the cmd_info is initialized to all 1s so that the 
cmdstream has to setup all the state.

> > (There's also a NULL deref if an invalid GEM handle is specified.)
> 
> This one is similar to the first; drm_gem_object_lookup() return isn't
> checked so it gets dereferenced unconditionally.

Here's the reworked (but not yet tested) code which I think should solve 
all of the above issues. There was also an issue with the cleanup path 
that we wouldn't do a put on the last BO if there was a size error. We 
just need to set ejob->region_bo[ejob->region_cnt] and increment 
region_cnt before any checks.

	ejob->cmd_bo = drm_gem_object_lookup(file, job->cmd_bo);
	if (!ejob->cmd_bo) {
		ret = -ENOENT;
		goto out_cleanup_job;
	}
	cmd_info = to_ethos_bo(ejob->cmd_bo)->info;
	if (!cmd_info) {
		ret = -EINVAL;
		goto out_cleanup_job;
	}

	for (int i = 0; i < NPU_BASEP_REGION_MAX; i++) {
		struct drm_gem_object *gem;

		/* Can only omit a BO handle if the region is not used or used for SRAM */
		if (!job->region_bo_handles[i] &&
		    (!cmd_info->region_size[i] || (i == ETHOS_SRAM_REGION && job->sram_size)))
			continue;

		gem = drm_gem_object_lookup(file, job->region_bo_handles[i]);
		if (!gem) {
			dev_err(dev->dev,
				"Invalid BO handle %d for region %d\n",
				job->region_bo_handles[i], i);
			ret = -ENOENT;
			goto out_cleanup_job;
		}

		ejob->region_bo[ejob->region_cnt] = gem;
		ejob->region_bo_num[ejob->region_cnt] = i;
		ejob->region_cnt++;

		if (to_ethos_bo(gem)->info) {
			dev_err(dev->dev,
				"Cmdstream BO handle %d used for region %d\n",
				job->region_bo_handles[i], i);
			ret = -EINVAL;
			goto out_cleanup_job;
		}

		/* Verify the command stream doesn't have accesses outside the BO */
		if (cmd_info->region_size[i] > gem->size) {
			dev_err(dev->dev,
				"cmd stream region %d size greater than BO size (%llu > %zu)\n",
				i, cmd_info->region_size[i], gem->size);
			ret = -EOVERFLOW;
			goto out_cleanup_job;
		}
	}

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ