Re: [RFC][Patch V7 7/7] KVM: Disabling page poisoning to avoid memory corruption errors

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Jun 11, 2018 at 11:19:02AM -0400, nilal@xxxxxxxxxx wrote:
> From: Nitesh Narayan Lal <nilal@xxxxxxxxxx>
> 
> This patch disables page poisoning if guest page hinting is enabled.
> It is required to avoid possible guest memory corruption errors.
> Page Poisoning is a feature in which the page is filled with a specific
> pattern of (0x00 or 0xaa) after arch_free_page and the same is verified
> before arch_alloc_page to prevent following issues:
>     *information leak from the freed data
>     *use after free bugs
>     *memory corruption
> Selection of the pattern depends on the CONFIG_PAGE_POISONING_ZERO
> Once the guest pages which are supposed to be freed are sent to the
> hypervisor it frees them. After freeing the pages in the global list
> following things may happen:
>     *Hypervisor reallocates the freed memory back to the guest
>     *Hypervisor frees the memory and maps a different physical memory
> In order to prevent any information leak hypervisor before allocating
> memory to the guest fills it with zeroes.
> The issue arises when the pattern used for Page Poisoning is 0xaa while
> the newly allocated page received from the hypervisor by the guest is
> filled with the pattern 0x00. This will result in memory corruption errors.

Looks like it's a bugfix for your previous patches.
If true pls put it 1st in series, we don't want to
break things then unbreak them back.

> Signed-off-by: Nitesh Narayan Lal <nilal@xxxxxxxxxx>

I'd rather tell hypervisor what the poison value is.
See
	virtio-balloon: VIRTIO_BALLOON_F_PAGE_POISON

if that's not advertised, I think you should disable free page hinting,
not poisoning.


> ---
>  include/linux/page_hinting.h | 9 +++++++++
>  mm/page_poison.c             | 2 +-
>  virt/kvm/page_hinting.c      | 1 +
>  3 files changed, 11 insertions(+), 1 deletion(-)
> 
> diff --git a/include/linux/page_hinting.h b/include/linux/page_hinting.h
> index dd30644..b639078 100644
> --- a/include/linux/page_hinting.h
> +++ b/include/linux/page_hinting.h
> @@ -1,3 +1,4 @@
> +#include <linux/poison.h>
>  #define MAX_FGPT_ENTRIES	1000
>  /*
>   * hypervisor_pages - It is a dummy structure passed with the hypercall.
> @@ -14,6 +15,7 @@ struct hypervisor_pages {
>  extern struct hypervisor_pages hypervisor_pagelist[MAX_FGPT_ENTRIES];
>  extern void (*request_hypercall)(void *, int);
>  extern void *balloon_ptr;
> +extern bool want_page_poisoning;
>  
>  extern struct static_key_false guest_page_hinting_key;
>  int guest_page_hinting_sysctl(struct ctl_table *table, int write,
> @@ -21,3 +23,10 @@ int guest_page_hinting_sysctl(struct ctl_table *table, int write,
>  extern int guest_page_hinting_flag;
>  void guest_alloc_page(struct page *page, int order);
>  void guest_free_page(struct page *page, int order);
> +
> +static inline void disable_page_poisoning(void)
> +{
> +#ifdef CONFIG_PAGE_POISONING
> +	want_page_poisoning = 0;
> +#endif
> +}

What if value is read at the same time? Seems racy... 

> diff --git a/mm/page_poison.c b/mm/page_poison.c
> index aa2b3d3..91ce8ad 100644
> --- a/mm/page_poison.c
> +++ b/mm/page_poison.c
> @@ -7,7 +7,7 @@
>  #include <linux/poison.h>
>  #include <linux/ratelimit.h>
>  
> -static bool want_page_poisoning __read_mostly;
> +bool want_page_poisoning __read_mostly;
>  
>  static int __init early_page_poison_param(char *buf)
>  {
> diff --git a/virt/kvm/page_hinting.c b/virt/kvm/page_hinting.c
> index 078a3be..57eddd0 100644
> --- a/virt/kvm/page_hinting.c
> +++ b/virt/kvm/page_hinting.c
> @@ -302,6 +302,7 @@ void guest_free_page(struct page *page, int order)
>  	 * process context causing unwanted overwrites. This will be replaced
>  	 * with a better solution to prevent such race conditions.
>  	 */
> +	disable_page_poisoning();
>  	local_irq_save(flags);
>  	free_page_obj = &get_cpu_var(kvm_pt)[0];
>  	trace_guest_free_page(page, order);

I think we would want to revert everything e.g. if balloon
is removed.

> -- 
> 2.9.5



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux