From nobody Tue Feb 10 14:33:37 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of _spf.google.com designates 209.85.221.44 as permitted sender) client-ip=209.85.221.44; envelope-from=philippe.mathieu.daude@gmail.com; helo=mail-wr1-f44.google.com; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of _spf.google.com designates 209.85.221.44 as permitted sender) smtp.mailfrom=philippe.mathieu.daude@gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1626037885; cv=none; d=zohomail.com; s=zohoarc; b=jJPo3LUvz8A3Axt1eI3TxJMCvlDY5wHwZQX+jP3L9vXvNtOWCm5eLGdgd9t+JHb2tuMackcpB7yer4N10hy+L1HMyi9z1+aOeDByq95awB6U1fujtk6wXf5A5wtFwjUBfhXIRsv1H89Jn8l5MqBqr67e1MLgRvvj+UGv4TMkrEg= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1626037885; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Sender:Subject:To; bh=eVIWfCIVMhcOo2kg3MCYw+w81wXdLPbXIbeUcYrRjBI=; b=E9cmo6eWCmEdKSrEE5/MLstQq0wFW4+KBWtW3Qd18gUtKJcoWdbfGtWE4CtdyaynPUJyNW1tr/KuMjmUF5LZyBGOYeMOzCLD5wzV4a9ntRj4Ccy4Ep05Jrfo/TZiAGHsZIVb5eqW6Q1Tq3aSKJ98yo8oPMVmJDnNHtLue4a5AOM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of _spf.google.com designates 209.85.221.44 as permitted sender) smtp.mailfrom=philippe.mathieu.daude@gmail.com Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) by mx.zohomail.com with SMTPS id 1626037885418774.2768918486618; Sun, 11 Jul 2021 14:11:25 -0700 (PDT) Received: by mail-wr1-f44.google.com with SMTP id l7so21180242wrv.7 for ; Sun, 11 Jul 2021 14:11:24 -0700 (PDT) Return-Path: Return-Path: Received: from localhost.localdomain (abayonne-654-1-142-116.w86-222.abo.wanadoo.fr. [86.222.93.116]) by smtp.gmail.com with ESMTPSA id x1sm19319556wmc.0.2021.07.11.14.11.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 11 Jul 2021 14:11:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=eVIWfCIVMhcOo2kg3MCYw+w81wXdLPbXIbeUcYrRjBI=; b=Y5FEBEx4LC/PaqkzZln8A6nTI0WC9RsJCt2Z8WnWHl24K2pH5ddckwIUDmtpaWQY+L LvIVisV9Hve7aL65+E8g6GNvRnhdi2ZbYZBaMde5gBzPG72mZ7/HTS7xao9eCL7aC7u7 ZwPvHAN5ivipGR10hWmvskKYwEYg/QtrzQY3VLTNcqZDiWilDCnm9IFcbxNSJgDg9KC9 iJzuPDOdq7x1Od6dxYduqHRf+xn2V3oo3wHsfsZQGqUGMJuJQfyqiWXquPnYrhLJyY8F MzTT+W23yhPvlxiNs4hc0xPDy4HeOeGki66OQob5HxwKi/ZEqjADNC81oP2LYhjaIhcv Cnqw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references:mime-version:content-transfer-encoding; bh=eVIWfCIVMhcOo2kg3MCYw+w81wXdLPbXIbeUcYrRjBI=; b=tFvEUTplY8TMLie31skvYi4i3VjHITzUqkyo33daBTQpu/egoAXQvC78y91M6uNiGH l+F/+0PnrlpKt9R/2N2X7pYjyL7eeGJDHTC329jbawA3JKO0NF3CZ/YBNx3oGU2Kk8w1 A6Wx6hvKaxN+jE9roRCbkBCsdvsvdXX0XZ07ao7BqxZjlqZSkIGZWinYA9uBXFK3EH4R EfEkCYvQL+zthxgRSorCWsHWp5QGtzzFEM/D2kh31ZWZMtKMLrrMg1hyUPWAuWGmMJyt uu60NPk2ldf9h0qUWWsTq5DoKWYJ8wKQF4fs9S/WQDF8BAsKahZv84T5lhwN51ySbPXP C7Og== X-Gm-Message-State: AOAM532fpjPUFr2v/05OObGO3hEvnc8ojOD5irPObAzjZCz5BraOfjYM wR5Gh2MI5a45cLrZSjRyKf9m3K3SevWmd145 X-Google-Smtp-Source: ABdhPJyDoe7hn4Zax/teBSPzhLF7mIju+2DW9zVfmCCB+HaSowPWqyktC+HNY/B/+ZRVsSPfFkTAeA== X-Received: by 2002:a5d:64ac:: with SMTP id m12mr14857980wrp.89.1626037883688; Sun, 11 Jul 2021 14:11:23 -0700 (PDT) Sender: =?UTF-8?Q?Philippe_Mathieu=2DDaud=C3=A9?= From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: Bin Meng , Alexander Bulekov , =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= , Bin Meng Subject: [PULL 3/4] hw/sd/sdcard: Check for valid address range in SEND_WRITE_PROT (CMD30) Date: Sun, 11 Jul 2021 23:10:56 +0200 Message-Id: <20210711211057.2714586-4-f4bug@amsat.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210711211057.2714586-1-f4bug@amsat.org> References: <20210711211057.2714586-1-f4bug@amsat.org> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1626037886617100001 OSS-Fuzz found sending illegal addresses when querying the write protection bits triggers an assertion: qemu-fuzz-i386: hw/sd/sd.c:824: uint32_t sd_wpbits(SDState *, uint64_t): = Assertion `wpnum < sd->wpgrps_size' failed. =3D=3D11578=3D=3D ERROR: libFuzzer: deadly signal #8 0x7ffff628e091 in __assert_fail #9 0x5555588f1a3c in sd_wpbits hw/sd/sd.c:824:9 #10 0x5555588dd271 in sd_normal_command hw/sd/sd.c:1383:38 #11 0x5555588d777c in sd_do_command hw/sd/sd.c #12 0x555558cb25a0 in sdbus_do_command hw/sd/core.c:100:16 #13 0x555558e02a9a in sdhci_send_command hw/sd/sdhci.c:337:12 #14 0x555558dffa46 in sdhci_write hw/sd/sdhci.c:1187:9 #15 0x5555598b9d76 in memory_region_write_accessor softmmu/memory.c:489:5 Similarly to commit 8573378e62d ("hw/sd: fix out-of-bounds check for multi block reads"), check the address range before sending the status of the write protection bits. Include the qtest reproducer provided by Alexander Bulekov: $ make check-qtest-i386 ... Running test qtest-i386/fuzz-sdcard-test qemu-system-i386: ../hw/sd/sd.c:824: sd_wpbits: Assertion `wpnum < sd->wp= grps_size' failed. Reported-by: OSS-Fuzz (Issue 29225) Resolves: https://gitlab.com/qemu-project/qemu/-/issues/450 Signed-off-by: Philippe Mathieu-Daud=C3=A9 Reviewed-by: Bin Meng Reviewed-by: Alexander Bulekov Message-Id: <20210702155900.148665-4-f4bug@amsat.org> --- hw/sd/sd.c | 5 +++ tests/qtest/fuzz-sdcard-test.c | 66 ++++++++++++++++++++++++++++++++++ MAINTAINERS | 3 +- tests/qtest/meson.build | 1 + 4 files changed, 74 insertions(+), 1 deletion(-) create mode 100644 tests/qtest/fuzz-sdcard-test.c diff --git a/hw/sd/sd.c b/hw/sd/sd.c index 9c8dd11bad1..c753ae24ba9 100644 --- a/hw/sd/sd.c +++ b/hw/sd/sd.c @@ -1379,6 +1379,11 @@ static sd_rsp_type_t sd_normal_command(SDState *sd, = SDRequest req) =20 switch (sd->state) { case sd_transfer_state: + if (!address_in_range(sd, "SEND_WRITE_PROT", + req.arg, sd->blk_len)) { + return sd_r1; + } + sd->state =3D sd_sendingdata_state; *(uint32_t *) sd->data =3D sd_wpbits(sd, req.arg); sd->data_start =3D addr; diff --git a/tests/qtest/fuzz-sdcard-test.c b/tests/qtest/fuzz-sdcard-test.c new file mode 100644 index 00000000000..96602eac7e5 --- /dev/null +++ b/tests/qtest/fuzz-sdcard-test.c @@ -0,0 +1,66 @@ +/* + * QTest fuzzer-generated testcase for sdcard device + * + * Copyright (c) 2021 Philippe Mathieu-Daud=C3=A9 + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +#include "qemu/osdep.h" +#include "libqos/libqtest.h" + +/* + * https://gitlab.com/qemu-project/qemu/-/issues/450 + * Used to trigger: + * Assertion `wpnum < sd->wpgrps_size' failed. + */ +static void oss_fuzz_29225(void) +{ + QTestState *s; + + s =3D qtest_init(" -display none -m 512m -nodefaults -nographic" + " -device sdhci-pci,sd-spec-version=3D3" + " -device sd-card,drive=3Dd0" + " -drive if=3Dnone,index=3D0,file=3Dnull-co://,format= =3Draw,id=3Dd0"); + + qtest_outl(s, 0xcf8, 0x80001010); + qtest_outl(s, 0xcfc, 0xd0690); + qtest_outl(s, 0xcf8, 0x80001003); + qtest_outl(s, 0xcf8, 0x80001013); + qtest_outl(s, 0xcfc, 0xffffffff); + qtest_outl(s, 0xcf8, 0x80001003); + qtest_outl(s, 0xcfc, 0x3effe00); + + qtest_bufwrite(s, 0xff0d062c, "\xff", 0x1); + qtest_bufwrite(s, 0xff0d060f, "\xb7", 0x1); + qtest_bufwrite(s, 0xff0d060a, "\xc9", 0x1); + qtest_bufwrite(s, 0xff0d060f, "\x29", 0x1); + qtest_bufwrite(s, 0xff0d060f, "\xc2", 0x1); + qtest_bufwrite(s, 0xff0d0628, "\xf7", 0x1); + qtest_bufwrite(s, 0x0, "\xe3", 0x1); + qtest_bufwrite(s, 0x7, "\x13", 0x1); + qtest_bufwrite(s, 0x8, "\xe3", 0x1); + qtest_bufwrite(s, 0xf, "\xe3", 0x1); + qtest_bufwrite(s, 0xff0d060f, "\x03", 0x1); + qtest_bufwrite(s, 0xff0d0605, "\x01", 0x1); + qtest_bufwrite(s, 0xff0d060b, "\xff", 0x1); + qtest_bufwrite(s, 0xff0d060c, "\xff", 0x1); + qtest_bufwrite(s, 0xff0d060e, "\xff", 0x1); + qtest_bufwrite(s, 0xff0d060f, "\x06", 0x1); + qtest_bufwrite(s, 0xff0d060f, "\x9e", 0x1); + + qtest_quit(s); +} + +int main(int argc, char **argv) +{ + const char *arch =3D qtest_get_arch(); + + g_test_init(&argc, &argv, NULL); + + if (strcmp(arch, "i386") =3D=3D 0) { + qtest_add_func("fuzz/sdcard/oss_fuzz_29225", oss_fuzz_29225); + } + + return g_test_run(); +} diff --git a/MAINTAINERS b/MAINTAINERS index 40d095dbbde..0e4e3761ebc 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -1824,7 +1824,8 @@ F: include/hw/sd/sd* F: hw/sd/core.c F: hw/sd/sd* F: hw/sd/ssi-sd.c -F: tests/qtest/sd* +F: tests/qtest/fuzz-sdcard-test.c +F: tests/qtest/sdhci-test.c =20 USB M: Gerd Hoffmann diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build index ee7347b7275..e22a0792c58 100644 --- a/tests/qtest/meson.build +++ b/tests/qtest/meson.build @@ -21,6 +21,7 @@ (config_all_devices.has_key('CONFIG_MEGASAS_SCSI_PCI') ? ['fuzz-megasas-= test'] : []) + \ (config_all_devices.has_key('CONFIG_VIRTIO_SCSI') ? ['fuzz-virtio-scsi-t= est'] : []) + \ (config_all_devices.has_key('CONFIG_SB16') ? ['fuzz-sb16-test'] : []) + \ + (config_all_devices.has_key('CONFIG_SDHCI_PCI') ? ['fuzz-sdcard-test'] := []) + \ [ 'cdrom-test', 'device-introspect-test', --=20 2.31.1