qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: "Philippe Mathieu-Daudé" <philmd@redhat.com>
To: Markus Armbruster <armbru@redhat.com>
Cc: "Daniel P . Berrange" <berrange@redhat.com>,
	qemu-trivial@nongnu.org, qemu-stable@nongnu.org,
	"Fakhri Zulkifli" <mohdfakhrizulkifli@gmail.com>,
	qemu-devel@nongnu.org,
	"Marc-André Lureau" <marcandre.lureau@redhat.com>,
	"Stefan Hajnoczi" <stefanha@redhat.com>,
	"Paolo Bonzini" <pbonzini@redhat.com>,
	"Sameeh Jubran" <sjubran@redhat.com>,
	"Basil Salman" <basil@daynix.com>,
	"Dietmar Maurer" <dietmar@proxmox.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>
Subject: Re: [PATCH-for-5.0] qga-posix: Avoid crashing process when failing to allocate memory
Date: Mon, 30 Mar 2020 18:08:31 +0200	[thread overview]
Message-ID: <7f67ab75-5f7c-e0b8-2dd3-4e573a8d3f68@redhat.com> (raw)
In-Reply-To: <81317f7f-7de9-f616-27dc-c389f06792c3@redhat.com>

On 3/30/20 6:04 PM, Philippe Mathieu-Daudé wrote:
> Cc'ing the ppl who responded the thread you quoted.
> 
> On 3/30/20 4:11 PM, Markus Armbruster wrote:
>> Philippe Mathieu-Daudé <philmd@redhat.com> writes:
>  > ---
>  >   qga/commands-posix.c | 8 +++++++-
>  >   1 file changed, 7 insertions(+), 1 deletion(-)
>  >
>  > diff --git a/qga/commands-posix.c b/qga/commands-posix.c
>  > index 93474ff770..8f127788e6 100644
>  > --- a/qga/commands-posix.c
>  > +++ b/qga/commands-posix.c
>  > @@ -493,7 +493,13 @@ struct GuestFileRead 
> *qmp_guest_file_read(int64_t handle, bool has_count,
>  >           gfh->state = RW_STATE_NEW;
>  >       }
>  >
>  > -    buf = g_malloc0(count+1);
>  > +    buf = g_try_malloc0(count + 1);
>  > +    if (!buf) {
>  > +        error_setg(errp,
>  > +                   "failed to allocate sufficient memory "
>  > +                   "to complete the requested service");
>  > +        return NULL;
>  > +    }
>  >       read_count = fread(buf, 1, count, fh);
>  >       if (ferror(fh)) {
>  >           error_setg_errno(errp, errno, "failed to read file");
>  >
> 
>>> On 3/25/20 7:19 AM, Dietmar Maurer wrote:
>>>> but error_setg() also calls malloc, so this does not help at all?
>>>
>>> IIUC the problem, you can send a QMP command to ask to read let's say
>>> 3GB of a file, and QEMU crashes. But this doesn't mean there the .heap
>>> is empty, there is probably few bytes still available, enough to
>>> respond with an error message.
>>
>> We've discussed how to handle out-of-memory conditions many times.
>> Here's one instance:
>>
>>      Subject: When it's okay to treat OOM as fatal?
>>      Message-ID: <87efcqniza.fsf@dusky.pond.sub.org>
>>      
>> https://lists.nongnu.org/archive/html/qemu-devel/2018-10/msg03212.html
>>
>> No improvement since then; there's no guidance on when to check for OOM.
>> Actual code tends to check only "large" allocations (for subjective
>> values of "large").
>>
>> I reiterate my opinion that whatever OOM handling we have is too
>> unreliable to be worth much, since it can only help when (1) allocations
>> actually fail (they generally don't[*]), and (2) the allocation that
>> fails is actually handled (they generally aren't), and (3) the handling
>> actually works (we don't test OOM, so it generally doesn't).
>>
>>
>> [*] Linux overcommits memory, which means malloc() pretty much always
>> succeeds, but when you try to use "too much" of the memory you
>> supposedly allocated, a lethal signal is coming your way.  Reasd the
>> thread I quoted for examples.
> 
> So this patch takes Stefan reasoning:
> https://lists.nongnu.org/archive/html/qemu-devel/2018-10/msg03525.html
> 
>    My thinking has been to use g_new() for small QEMU-internal structures
>    and g_try_new() for large amounts of memory allocated in response to
>    untrusted inputs.  (Untrusted inputs must never be used for unbounded
>    allocation sizes but those bounded sizes can still be large.)
> 
> In any cases (malloc/malloc_try) we have a denial of service 
> (https://www.openwall.com/lists/oss-security/2018/10/17/4) and the 
> service is restarted.
> 
> Daniel suggests such behavior should be catched by external firewall 
> guard (either on the process or on the network). This seems out of scope 
> of QEMU and hard to fix.
> 
> So, can we improve something? Or should we let this code as it?

But if we don't want to modify this code, we should document somewhere 
that maintstream QEMU doesn't care about DoS and it is the 
responsibility to protect it with something else...



  reply	other threads:[~2020-03-30 16:10 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-03-24 19:48 [PATCH-for-5.0] qga-posix: Avoid crashing process when failing to allocate memory Philippe Mathieu-Daudé
2020-03-25  6:19 ` Dietmar Maurer
2020-03-25 12:10   ` Philippe Mathieu-Daudé
2020-03-30 14:11     ` Markus Armbruster
2020-03-30 16:04       ` Philippe Mathieu-Daudé
2020-03-30 16:08         ` Philippe Mathieu-Daudé [this message]
2020-03-30 16:38         ` Dr. David Alan Gilbert
2020-03-30 16:47           ` Daniel P. Berrangé
2020-03-30 17:06         ` Daniel P. Berrangé
2020-03-31 13:32           ` Philippe Mathieu-Daudé
2020-03-30 16:25 ` Daniel P. Berrangé

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=7f67ab75-5f7c-e0b8-2dd3-4e573a8d3f68@redhat.com \
    --to=philmd@redhat.com \
    --cc=armbru@redhat.com \
    --cc=basil@daynix.com \
    --cc=berrange@redhat.com \
    --cc=dgilbert@redhat.com \
    --cc=dietmar@proxmox.com \
    --cc=marcandre.lureau@redhat.com \
    --cc=mohdfakhrizulkifli@gmail.com \
    --cc=pbonzini@redhat.com \
    --cc=qemu-devel@nongnu.org \
    --cc=qemu-stable@nongnu.org \
    --cc=qemu-trivial@nongnu.org \
    --cc=sjubran@redhat.com \
    --cc=stefanha@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).