Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp712181ybh; Wed, 22 Jul 2020 11:11:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzdNtM0voc7OIxEtTbbmg+sei6OdvJWh2BqcaQMRDOQjBWnxeARulQ5OtgOGMZ0+uT91fg6 X-Received: by 2002:a05:6402:203a:: with SMTP id ay26mr662155edb.276.1595441491766; Wed, 22 Jul 2020 11:11:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595441491; cv=none; d=google.com; s=arc-20160816; b=d+SKdiZ7mZ+dYshgOWfMyMBmqLSZ/zaUMJEHlxy8PS2Kg9a17sFW1Oe03IKBcMniPj tEf1yuBtgQfnpmYmQ2SyEVrENMntJVf4zNxB7AIOVVISiuoJgV1kxHO+uDX0psf8DS6c mv9LxMM6QEiFl1u8u4F9zOn8X82KAHG8LLQvvGJ5WOKdaZguMtH44/LSg1M37TLfBM06 al4lIR19PNWuU6RAqUOZQzFBCIID8JwzrhgqMjnEA4POjfhGFO0oBXkmEj9efsyg28cF OwQGNJbQLQC2+XJW26XAeTmxcvKDe8OGbTqyhJ6T+16gGdSPFxDYXuridE8gEWunC/y9 9kNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:reply-to :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JHxYjOLYJ6VSH7Ya3ukuXCFl3Rf2F4+eAD581ySfMRs=; b=AIW/NoYsuysUeHqx4OXmUY10wfhmkXIye2PomxUNYWzcj+ty1EC6G/4Y6NYF7e/uMc TZkXYH4PO3NVov7bwu/G0u2BnQEaM3EAV4MU3pVIxFTD0fQF/+OtfYBZWwMssdAJDeje We5nqLZaYWd7h7Sksvxt5LpW1A1JHpXnCRLFhppWmBbR0lOTqNci2h0nsR09LwMJ++9R Fap8nY8g8pUBpfP80Ic22qtMUA6QhDdmxaP6OGNRKRA3CEKLtE25bdS8fNuCFWgjTm2y FrrJeRVCpxjbpij9viW0JicIJL3cvUMDhdG5T22pF0eLxO1DrRtyckffUn3f4fMZFNpC UtSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KmXno6n4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dt18si609474ejc.258.2020.07.22.11.11.07; Wed, 22 Jul 2020 11:11:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KmXno6n4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731944AbgGVSK4 (ORCPT + 99 others); Wed, 22 Jul 2020 14:10:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58192 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726736AbgGVSKz (ORCPT ); Wed, 22 Jul 2020 14:10:55 -0400 Received: from mail-pj1-x1042.google.com (mail-pj1-x1042.google.com [IPv6:2607:f8b0:4864:20::1042]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5DB5EC0619DC; Wed, 22 Jul 2020 11:10:55 -0700 (PDT) Received: by mail-pj1-x1042.google.com with SMTP id a9so1928390pjd.3; Wed, 22 Jul 2020 11:10:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:reply-to:content-transfer-encoding; bh=JHxYjOLYJ6VSH7Ya3ukuXCFl3Rf2F4+eAD581ySfMRs=; b=KmXno6n4+Am9o/BxH7inr3tYVzcwc/+y54JvNfHN6hdCb9e9ffZrIwAA6j07UYjSa5 Nxo1ENV26Hskt642IwOmfIHbkHvdl+dN2VVPJds8isz+QjjJ90Nsew2Mu/J3BqTQAwcD b5bQDuD56ofLaE/yULjunVnv1WOttEYSuu/YQrTMhVthMVjfhxJetXBhuJqleKmLvpIr qIUpkvA18BvYnd+Yz1y9PU6QAH25BJnZiIi0+fW/QIJuKU5FCsp6aKQJEZBszrohDHxd QrHz+c+7UvIfcl45/WPnsGscK8hC6cBCrLodxG8W6h4hdKx1NSQfZrTnOYvXl1uHOVPd 0qeA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:reply-to:content-transfer-encoding; bh=JHxYjOLYJ6VSH7Ya3ukuXCFl3Rf2F4+eAD581ySfMRs=; b=Bx3nKIABoQbmrDZVOvASKUG8V0+Lzm9C/P9MNLu9FJTdUDNLWLTha8DEGBfruHQ/rk +6u+04rXbDnEXAf2XXNFl2LfcYkbRJXO0Tt+94OYbAehK1JZuEvfLdYNrUQv1DQmZ7A5 MsBEH1vgJwWOps5Sp0Nixs2ld2FUIYRshnDGY/coNk1JxEBA81U6TyfvdadV528IRJuU x+4BV+PrYw4aahVThtDQyPp5pxvGg3X1/Gyz4Z3CD7GHWed4R5sk6dsaocehKlL67YUO RxbHZUOHHyb4pZUBc/JBL4wTxViQnpuSyqWOos58sPQmILA7R2TG1UtP6Ozjg6y2Tsrm ukXg== X-Gm-Message-State: AOAM533DlHaDvihIJGLIzvLiRglQzzS8dPl5TYhmX1yNK0pk6C4/GYgM 9JhMJls1I3LZem/sWByQNeXEzPt5 X-Received: by 2002:a17:902:7d90:: with SMTP id a16mr578294plm.226.1595441454861; Wed, 22 Jul 2020 11:10:54 -0700 (PDT) Received: from localhost.localdomain ([131.107.159.194]) by smtp.gmail.com with ESMTPSA id y80sm259958pfb.165.2020.07.22.11.10.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Jul 2020 11:10:54 -0700 (PDT) From: Andres Beltran To: kys@microsoft.com, haiyangz@microsoft.com, sthemmin@microsoft.com, wei.liu@kernel.org Cc: linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, mikelley@microsoft.com, parri.andrea@gmail.com, Andres Beltran Subject: [PATCH v5 1/3] Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening Date: Wed, 22 Jul 2020 14:10:49 -0400 Message-Id: <20200722181051.2688-2-lkmlabelt@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200722181051.2688-1-lkmlabelt@gmail.com> References: <20200722181051.2688-1-lkmlabelt@gmail.com> MIME-Version: 1.0 Reply-To: t-mabelt@microsoft.com Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently, VMbus drivers use pointers into guest memory as request IDs for interactions with Hyper-V. To be more robust in the face of errors or malicious behavior from a compromised Hyper-V, avoid exposing guest memory addresses to Hyper-V. Also avoid Hyper-V giving back a bad request ID that is then treated as the address of a guest data structure with no validation. Instead, encapsulate these memory addresses and provide small integers as request IDs. Signed-off-by: Andres Beltran --- Changes in v5: - Add support for unsolicited messages sent by the host with a request ID of 0. Changes in v4: - Use channel->rqstor_size to check if rqstor has been initialized. Changes in v3: - Check that requestor has been initialized in vmbus_next_request_id() and vmbus_request_addr(). Changes in v2: - Get rid of "rqstor" variable in __vmbus_open(). drivers/hv/channel.c | 175 +++++++++++++++++++++++++++++++++++++++++ include/linux/hyperv.h | 21 +++++ 2 files changed, 196 insertions(+) diff --git a/drivers/hv/channel.c b/drivers/hv/channel.c index 3ebda7707e46..b0a607ec4a37 100644 --- a/drivers/hv/channel.c +++ b/drivers/hv/channel.c @@ -112,6 +112,71 @@ int vmbus_alloc_ring(struct vmbus_channel *newchannel, } EXPORT_SYMBOL_GPL(vmbus_alloc_ring); +/** + * request_arr_init - Allocates memory for the requestor array. Each slot + * keeps track of the next available slot in the array. Initially, each + * slot points to the next one (as in a Linked List). The last slot + * does not point to anything, so its value is U64_MAX by default. + * @size The size of the array + */ +static u64 *request_arr_init(u32 size) +{ + int i; + u64 *req_arr; + + req_arr = kcalloc(size, sizeof(u64), GFP_KERNEL); + if (!req_arr) + return NULL; + + for (i = 0; i < size - 1; i++) + req_arr[i] = i + 2; + + /* Last slot (no more available slots) */ + req_arr[i] = U64_MAX; + + return req_arr; +} + +/* + * vmbus_alloc_requestor - Initializes @rqstor's fields. + * Start the ID count at 1 because Hyper-V can send an unsolicited message + * with request ID of 0. + * @size: Size of the requestor array + */ +static int vmbus_alloc_requestor(struct vmbus_requestor *rqstor, u32 size) +{ + u64 *rqst_arr; + unsigned long *bitmap; + + rqst_arr = request_arr_init(size); + if (!rqst_arr) + return -ENOMEM; + + bitmap = bitmap_zalloc(size, GFP_KERNEL); + if (!bitmap) { + kfree(rqst_arr); + return -ENOMEM; + } + + rqstor->req_arr = rqst_arr; + rqstor->req_bitmap = bitmap; + rqstor->size = size; + rqstor->next_request_id = 1; + spin_lock_init(&rqstor->req_lock); + + return 0; +} + +/* + * vmbus_free_requestor - Frees memory allocated for @rqstor + * @rqstor: Pointer to the requestor struct + */ +static void vmbus_free_requestor(struct vmbus_requestor *rqstor) +{ + kfree(rqstor->req_arr); + bitmap_free(rqstor->req_bitmap); +} + static int __vmbus_open(struct vmbus_channel *newchannel, void *userdata, u32 userdatalen, void (*onchannelcallback)(void *context), void *context) @@ -132,6 +197,12 @@ static int __vmbus_open(struct vmbus_channel *newchannel, if (newchannel->state != CHANNEL_OPEN_STATE) return -EINVAL; + /* Create and init requestor */ + if (newchannel->rqstor_size) { + if (vmbus_alloc_requestor(&newchannel->requestor, newchannel->rqstor_size)) + return -ENOMEM; + } + newchannel->state = CHANNEL_OPENING_STATE; newchannel->onchannel_callback = onchannelcallback; newchannel->channel_callback_context = context; @@ -228,6 +299,7 @@ static int __vmbus_open(struct vmbus_channel *newchannel, error_clean_ring: hv_ringbuffer_cleanup(&newchannel->outbound); hv_ringbuffer_cleanup(&newchannel->inbound); + vmbus_free_requestor(&newchannel->requestor); newchannel->state = CHANNEL_OPEN_STATE; return err; } @@ -703,6 +775,9 @@ static int vmbus_close_internal(struct vmbus_channel *channel) channel->ringbuffer_gpadlhandle = 0; } + if (!ret) + vmbus_free_requestor(&channel->requestor); + return ret; } @@ -937,3 +1012,103 @@ int vmbus_recvpacket_raw(struct vmbus_channel *channel, void *buffer, buffer_actual_len, requestid, true); } EXPORT_SYMBOL_GPL(vmbus_recvpacket_raw); + +/* + * vmbus_requestor_hash_idx - Returns the index in the requestor array + * that rqst_id maps to. + */ +static inline u64 vmbus_requestor_hash_idx(const u64 rqst_id) +{ + return rqst_id - 1; +} + +/* + * vmbus_next_request_id - Returns a new request id. It is also + * the index at which the guest memory address is stored. + * Uses a spin lock to avoid race conditions. + * @rqstor: Pointer to the requestor struct + * @rqst_add: Guest memory address to be stored in the array + */ +u64 vmbus_next_request_id(struct vmbus_requestor *rqstor, u64 rqst_addr) +{ + unsigned long flags; + u64 current_id, idx; + const struct vmbus_channel *channel = + container_of(rqstor, const struct vmbus_channel, requestor); + + /* Check rqstor has been initialized */ + if (!channel->rqstor_size) + return VMBUS_RQST_ERROR; + + spin_lock_irqsave(&rqstor->req_lock, flags); + current_id = rqstor->next_request_id; + idx = vmbus_requestor_hash_idx(current_id); + + /* Requestor array is full */ + if (current_id > rqstor->size) { + current_id = VMBUS_RQST_ERROR; + goto exit; + } + + rqstor->next_request_id = rqstor->req_arr[idx]; + rqstor->req_arr[idx] = rqst_addr; + + /* The already held spin lock provides atomicity */ + bitmap_set(rqstor->req_bitmap, idx, 1); + +exit: + spin_unlock_irqrestore(&rqstor->req_lock, flags); + return current_id; +} +EXPORT_SYMBOL_GPL(vmbus_next_request_id); + +/* + * vmbus_request_addr - Returns the memory address stored at @trans_id + * in @rqstor. Uses a spin lock to avoid race conditions. + * @rqstor: Pointer to the requestor struct + * @trans_id: Request id sent back from Hyper-V. Becomes the requestor's + * next request id. + */ +u64 vmbus_request_addr(struct vmbus_requestor *rqstor, u64 trans_id) +{ + unsigned long flags; + u64 req_addr, idx; + const struct vmbus_channel *channel = + container_of(rqstor, const struct vmbus_channel, requestor); + + /* Check rqstor has been initialized */ + if (!channel->rqstor_size) + return VMBUS_RQST_ERROR; + + /* Hyper-V can send an unsolicited message with tid of 0 */ + if (!trans_id) + return trans_id; + + spin_lock_irqsave(&rqstor->req_lock, flags); + + /* Invalid trans_id */ + if (trans_id > rqstor->size) { + req_addr = VMBUS_RQST_ERROR; + goto exit; + } + + idx = vmbus_requestor_hash_idx(trans_id); + + /* Invalid trans_id: empty slot */ + if (!test_bit(idx, rqstor->req_bitmap)) { + req_addr = VMBUS_RQST_ERROR; + goto exit; + } + + req_addr = rqstor->req_arr[idx]; + rqstor->req_arr[idx] = rqstor->next_request_id; + rqstor->next_request_id = trans_id; + + /* The already held spin lock provides atomicity */ + bitmap_clear(rqstor->req_bitmap, idx, 1); + +exit: + spin_unlock_irqrestore(&rqstor->req_lock, flags); + return req_addr; +} +EXPORT_SYMBOL_GPL(vmbus_request_addr); diff --git a/include/linux/hyperv.h b/include/linux/hyperv.h index 38100e80360a..c509d20ab7db 100644 --- a/include/linux/hyperv.h +++ b/include/linux/hyperv.h @@ -716,6 +716,21 @@ enum vmbus_device_type { HV_UNKNOWN, }; +/* + * Provides request ids for VMBus. Encapsulates guest memory + * addresses and stores the next available slot in req_arr + * to generate new ids in constant time. + */ +struct vmbus_requestor { + u64 *req_arr; + unsigned long *req_bitmap; /* is a given slot available? */ + u32 size; + u64 next_request_id; + spinlock_t req_lock; /* provides atomicity */ +}; + +#define VMBUS_RQST_ERROR U64_MAX + struct vmbus_device { u16 dev_type; guid_t guid; @@ -940,8 +955,14 @@ struct vmbus_channel { u32 fuzz_testing_interrupt_delay; u32 fuzz_testing_message_delay; + /* request/transaction ids for VMBus */ + struct vmbus_requestor requestor; + u32 rqstor_size; }; +u64 vmbus_next_request_id(struct vmbus_requestor *rqstor, u64 rqst_addr); +u64 vmbus_request_addr(struct vmbus_requestor *rqstor, u64 trans_id); + static inline bool is_hvsock_channel(const struct vmbus_channel *c) { return !!(c->offermsg.offer.chn_flags & -- 2.25.1