Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3473886imu; Mon, 7 Jan 2019 04:09:24 -0800 (PST) X-Google-Smtp-Source: ALg8bN6b7F0dhxFDeiumGYd+MlpixCf+lbvhcb5HeQFP1scBrcQRqnK//+3iUPiBdWajzhGe25kq X-Received: by 2002:a62:d206:: with SMTP id c6mr1207178pfg.245.1546862964730; Mon, 07 Jan 2019 04:09:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546862964; cv=none; d=google.com; s=arc-20160816; b=mRkxt02sQ13ru9zvQnsvFm5YPPiw6RzzmaTdz5ZVNUSHKxwZz8ii+x8nmZ0Nx5o/Nj 3AFgJytt7gwLd+ryVpmscYJhFDnju0KoNKZ5vqTS3UtRaAxqhW4ePaSMwYfD8vCDTqUu v/ilBDNjK+W0yBUBdJsh/LVp4xCNoao1HzENMgRDHTXYtl7wUV4zaIhRRSt1wo2qcYsR nyNRI5Ma1M+dBkPweLb29V+I0y+3yMG0otldwa/I0REwREODb3pLj2SIYi9hCzumgNIT 7LO1eZoaxgdjqbMfcEiKd4yRY35QGsjgxTFT8wAowGrKLAsJuSN07a7A/6dCHd19+Sm8 /3Jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=yH5Y+ECoziwnHEIATLnF5VI4YofzTbBu4glWV4VsFMI=; b=Io/6NZQWDOGz2idui1BApWoYF637ffhLzR1xQeAmZ1cy9xQpUDQzdA/4z64g6chOV/ Ld2sEU1GdCIjgmatH1Y7aFRx9F6qCiZcKRDBNNDsY3758jGTcXvGwilIo9vf8ehr6pV3 Yur9lsjU9Y+g6D4wWQKdMQIQvXEkotRs9QqCjW+OiJGx0Dddlf62dDOuyal9r8gfLfX2 mJFECq8iqVvvK/84OVHncgGeogXGCfE2mNdvn711IsubD+asmvY7IJKF6V0vNfcyyZkT ADmwCRkPC0SPHmIgq7I+OxChJkitIkMWn7YHxxQfBWMIJLc8MUw0vYLRXLRNF8zAPwom o9VQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w61si61036619plb.309.2019.01.07.04.09.08; Mon, 07 Jan 2019 04:09:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726742AbfAGMHr (ORCPT + 99 others); Mon, 7 Jan 2019 07:07:47 -0500 Received: from smtp.eu.citrix.com ([185.25.65.24]:64211 "EHLO SMTP.EU.CITRIX.COM" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726589AbfAGMHr (ORCPT ); Mon, 7 Jan 2019 07:07:47 -0500 X-IronPort-AV: E=Sophos;i="5.56,450,1539648000"; d="scan'208";a="84222505" Date: Mon, 7 Jan 2019 13:01:07 +0100 From: Roger Pau =?utf-8?B?TW9ubsOp?= To: Dongli Zhang CC: , , , , , Subject: Re: [PATCH v4 2/2] xen/blkback: rework connect_ring() to avoid inconsistent xenstore 'ring-page-order' set by malicious blkfront Message-ID: <20190107120107.euf7mrq7gk6bmibz@mac> References: <1546839359-5478-1-git-send-email-dongli.zhang@oracle.com> <1546839359-5478-2-git-send-email-dongli.zhang@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <1546839359-5478-2-git-send-email-dongli.zhang@oracle.com> User-Agent: NeoMutt/20180716 X-ClientProxiedBy: AMSPEX02CAS01.citrite.net (10.69.22.112) To AMSPEX02CL02.citrite.net (10.69.22.126) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 07, 2019 at 01:35:59PM +0800, Dongli Zhang wrote: > The xenstore 'ring-page-order' is used globally for each blkback queue and > therefore should be read from xenstore only once. However, it is obtained > in read_per_ring_refs() which might be called multiple times during the > initialization of each blkback queue. > > If the blkfront is malicious and the 'ring-page-order' is set in different > value by blkfront every time before blkback reads it, this may end up at > the "WARN_ON(i != (XEN_BLKIF_REQS_PER_PAGE * blkif->nr_ring_pages));" in > xen_blkif_disconnect() when frontend is destroyed. > > This patch reworks connect_ring() to read xenstore 'ring-page-order' only > once. > > Signed-off-by: Dongli Zhang > --- > Changed since v1: > * change the order of xenstore read in read_per_ring_refs > * use xenbus_read_unsigned() in connect_ring() > > Changed since v2: > * simplify the condition check as "(err != 1 && nr_grefs > 1)" > * avoid setting err as -EINVAL to remove extra one line of code > > Changed since v3: > * exit at the beginning if !nr_grefs > * change the if statements to avoid test (err != 1) twice > * initialize a 'blkif' stack variable (refer to PATCH 1/2) > > drivers/block/xen-blkback/xenbus.c | 76 +++++++++++++++++++++----------------- > 1 file changed, 43 insertions(+), 33 deletions(-) > > diff --git a/drivers/block/xen-blkback/xenbus.c b/drivers/block/xen-blkback/xenbus.c > index a4aadac..a2acbc9 100644 > --- a/drivers/block/xen-blkback/xenbus.c > +++ b/drivers/block/xen-blkback/xenbus.c > @@ -926,7 +926,7 @@ static int read_per_ring_refs(struct xen_blkif_ring *ring, const char *dir) > int err, i, j; > struct xen_blkif *blkif = ring->blkif; > struct xenbus_device *dev = blkif->be->dev; > - unsigned int ring_page_order, nr_grefs, evtchn; > + unsigned int nr_grefs, evtchn; > > err = xenbus_scanf(XBT_NIL, dir, "event-channel", "%u", > &evtchn); > @@ -936,43 +936,38 @@ static int read_per_ring_refs(struct xen_blkif_ring *ring, const char *dir) > return err; > } > > - err = xenbus_scanf(XBT_NIL, dev->otherend, "ring-page-order", "%u", > - &ring_page_order); > - if (err != 1) { > - err = xenbus_scanf(XBT_NIL, dir, "ring-ref", "%u", &ring_ref[0]); > + nr_grefs = blkif->nr_ring_pages; > + > + if (unlikely(!nr_grefs)) > + return -EINVAL; Is this even possible? AFAICT read_per_ring_refs will always be called with blkif->nr_ring_pages != 0? If so, I would consider turning this into a BUG_ON/WARN_ON. > + > + for (i = 0; i < nr_grefs; i++) { > + char ring_ref_name[RINGREF_NAME_LEN]; > + > + snprintf(ring_ref_name, RINGREF_NAME_LEN, "ring-ref%u", i); > + err = xenbus_scanf(XBT_NIL, dir, ring_ref_name, > + "%u", &ring_ref[i]); > + > if (err != 1) { > - err = -EINVAL; > - xenbus_dev_fatal(dev, err, "reading %s/ring-ref", dir); > - return err; > - } > - nr_grefs = 1; > - } else { > - unsigned int i; > - > - if (ring_page_order > xen_blkif_max_ring_order) { > - err = -EINVAL; > - xenbus_dev_fatal(dev, err, "%s/request %d ring page order exceed max:%d", > - dir, ring_page_order, > - xen_blkif_max_ring_order); > - return err; > + if (nr_grefs == 1) > + break; > + You need to either set err to EINVAL before calling xenbus_dev_fatal, or call xenbus_dev_fatal with EINVAL as the second parameter. > + xenbus_dev_fatal(dev, err, "reading %s/%s", > + dir, ring_ref_name); > + return -EINVAL; > } > + } > > - nr_grefs = 1 << ring_page_order; > - for (i = 0; i < nr_grefs; i++) { > - char ring_ref_name[RINGREF_NAME_LEN]; > - > - snprintf(ring_ref_name, RINGREF_NAME_LEN, "ring-ref%u", i); > - err = xenbus_scanf(XBT_NIL, dir, ring_ref_name, > - "%u", &ring_ref[i]); > - if (err != 1) { > - err = -EINVAL; > - xenbus_dev_fatal(dev, err, "reading %s/%s", > - dir, ring_ref_name); > - return err; > - } > + if (err != 1) { > + WARN_ON(nr_grefs != 1); > + > + err = xenbus_scanf(XBT_NIL, dir, "ring-ref", "%u", > + &ring_ref[0]); > + if (err != 1) { > + xenbus_dev_fatal(dev, err, "reading %s/ring-ref", dir); Second parameter should be EINVAL, or err should be set to EINVAL before calling xenbus_dev_fatal. Thanks, Roger.