diff mbox series

KVM: Forbid /dev/kvm being opened by a compat task when CONFIG_KVM_COMPAT=n

Message ID 20191113160523.16130-1-maz@kernel.org (mailing list archive)
State New, archived
Headers show
Series KVM: Forbid /dev/kvm being opened by a compat task when CONFIG_KVM_COMPAT=n | expand

Commit Message

Marc Zyngier Nov. 13, 2019, 4:05 p.m. UTC
On a system without KVM_COMPAT, we prevent IOCTLs from being issued
by a compat task. Although this prevents most silly things from
happening, it can still confuse a 32bit userspace that is able
to open the kvm device (the qemu test suite seems to be pretty
mad with this behaviour).

Take a more radical approach and return a -ENODEV to the compat
task.

Reported-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Marc Zyngier <maz@kernel.org>
---
 virt/kvm/kvm_main.c | 8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

Comments

Paolo Bonzini Nov. 13, 2019, 4:12 p.m. UTC | #1
On 13/11/19 17:05, Marc Zyngier wrote:
> On a system without KVM_COMPAT, we prevent IOCTLs from being issued
> by a compat task. Although this prevents most silly things from
> happening, it can still confuse a 32bit userspace that is able
> to open the kvm device (the qemu test suite seems to be pretty
> mad with this behaviour).
> 
> Take a more radical approach and return a -ENODEV to the compat
> task.
> 
> Reported-by: Peter Maydell <peter.maydell@linaro.org>
> Signed-off-by: Marc Zyngier <maz@kernel.org>
> ---
>  virt/kvm/kvm_main.c | 8 +++++++-
>  1 file changed, 7 insertions(+), 1 deletion(-)
> 
> diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
> index 543024c7a87f..1243e48dc717 100644
> --- a/virt/kvm/kvm_main.c
> +++ b/virt/kvm/kvm_main.c
> @@ -122,7 +122,13 @@ static long kvm_vcpu_compat_ioctl(struct file *file, unsigned int ioctl,
>  #else
>  static long kvm_no_compat_ioctl(struct file *file, unsigned int ioctl,
>  				unsigned long arg) { return -EINVAL; }
> -#define KVM_COMPAT(c)	.compat_ioctl	= kvm_no_compat_ioctl
> +
> +static int kvm_no_compat_open(struct inode *inode, struct file *file)
> +{
> +	return is_compat_task() ? -ENODEV : 0;
> +}
> +#define KVM_COMPAT(c)	.compat_ioctl	= kvm_no_compat_ioctl,	\
> +			.open		= kvm_no_compat_open
>  #endif
>  static int hardware_enable_all(void);
>  static void hardware_disable_all(void);
> 

Queued, thanks.

Paolo
Christian Borntraeger Nov. 13, 2019, 6:43 p.m. UTC | #2
On 13.11.19 17:05, Marc Zyngier wrote:
> On a system without KVM_COMPAT, we prevent IOCTLs from being issued
> by a compat task. Although this prevents most silly things from
> happening, it can still confuse a 32bit userspace that is able
> to open the kvm device (the qemu test suite seems to be pretty
> mad with this behaviour).
> 
> Take a more radical approach and return a -ENODEV to the compat
> task.
> 
> Reported-by: Peter Maydell <peter.maydell@linaro.org>
> Signed-off-by: Marc Zyngier <maz@kernel.org>
> ---
>  virt/kvm/kvm_main.c | 8 +++++++-
>  1 file changed, 7 insertions(+), 1 deletion(-)
> 
> diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
> index 543024c7a87f..1243e48dc717 100644
> --- a/virt/kvm/kvm_main.c
> +++ b/virt/kvm/kvm_main.c
> @@ -122,7 +122,13 @@ static long kvm_vcpu_compat_ioctl(struct file *file, unsigned int ioctl,
>  #else
>  static long kvm_no_compat_ioctl(struct file *file, unsigned int ioctl,
>  				unsigned long arg) { return -EINVAL; }
> -#define KVM_COMPAT(c)	.compat_ioctl	= kvm_no_compat_ioctl
> +
> +static int kvm_no_compat_open(struct inode *inode, struct file *file)
> +{
> +	return is_compat_task() ? -ENODEV : 0;
> +}
> +#define KVM_COMPAT(c)	.compat_ioctl	= kvm_no_compat_ioctl,	\

Do we still need compat_ioctl if open never succeeds?


> +			.open		= kvm_no_compat_open
>  #endif
>  static int hardware_enable_all(void);
>  static void hardware_disable_all(void);
>
Peter Maydell Nov. 13, 2019, 9:23 p.m. UTC | #3
On Wed, 13 Nov 2019 at 18:44, Christian Borntraeger
<borntraeger@de.ibm.com> wrote:
> On 13.11.19 17:05, Marc Zyngier wrote:
> > On a system without KVM_COMPAT, we prevent IOCTLs from being issued
> > by a compat task. Although this prevents most silly things from
> > happening, it can still confuse a 32bit userspace that is able
> > to open the kvm device (the qemu test suite seems to be pretty
> > mad with this behaviour).
> >
> > Take a more radical approach and return a -ENODEV to the compat
> > task.

> Do we still need compat_ioctl if open never succeeds?

I wondered about that, but presumably you could use
fd-passing, or just inheriting open fds across exec(),
to open the fd in a 64-bit process and then hand it off
to a 32-bit process to call the ioctl with. (That's
probably only something you'd do if you were
deliberately playing silly games, of course, but
preventing silly games is useful as it makes it
easier to reason about kernel behaviour.)

thanks
-- PMM
Marc Zyngier Nov. 14, 2019, 8:15 a.m. UTC | #4
On Wed, 13 Nov 2019 21:23:07 +0000
Peter Maydell <peter.maydell@linaro.org> wrote:

> On Wed, 13 Nov 2019 at 18:44, Christian Borntraeger
> <borntraeger@de.ibm.com> wrote:
> > On 13.11.19 17:05, Marc Zyngier wrote:  
> > > On a system without KVM_COMPAT, we prevent IOCTLs from being issued
> > > by a compat task. Although this prevents most silly things from
> > > happening, it can still confuse a 32bit userspace that is able
> > > to open the kvm device (the qemu test suite seems to be pretty
> > > mad with this behaviour).
> > >
> > > Take a more radical approach and return a -ENODEV to the compat
> > > task.  
> 
> > Do we still need compat_ioctl if open never succeeds?  
> 
> I wondered about that, but presumably you could use
> fd-passing, or just inheriting open fds across exec(),
> to open the fd in a 64-bit process and then hand it off
> to a 32-bit process to call the ioctl with. (That's
> probably only something you'd do if you were
> deliberately playing silly games, of course, but
> preventing silly games is useful as it makes it
> easier to reason about kernel behaviour.)

This was exactly my train of thoughts, which I should have made clear
in the commit log. Thanks Peter for reading my mind! ;-)

	M.
Christian Borntraeger Nov. 14, 2019, 8:20 a.m. UTC | #5
On 14.11.19 09:15, Marc Zyngier wrote:
> On Wed, 13 Nov 2019 21:23:07 +0000
> Peter Maydell <peter.maydell@linaro.org> wrote:
> 
>> On Wed, 13 Nov 2019 at 18:44, Christian Borntraeger
>> <borntraeger@de.ibm.com> wrote:
>>> On 13.11.19 17:05, Marc Zyngier wrote:  
>>>> On a system without KVM_COMPAT, we prevent IOCTLs from being issued
>>>> by a compat task. Although this prevents most silly things from
>>>> happening, it can still confuse a 32bit userspace that is able
>>>> to open the kvm device (the qemu test suite seems to be pretty
>>>> mad with this behaviour).
>>>>
>>>> Take a more radical approach and return a -ENODEV to the compat
>>>> task.  
>>
>>> Do we still need compat_ioctl if open never succeeds?  
>>
>> I wondered about that, but presumably you could use
>> fd-passing, or just inheriting open fds across exec(),
>> to open the fd in a 64-bit process and then hand it off
>> to a 32-bit process to call the ioctl with. (That's
>> probably only something you'd do if you were
>> deliberately playing silly games, of course, but
>> preventing silly games is useful as it makes it
>> easier to reason about kernel behaviour.)
> 
> This was exactly my train of thoughts, which I should have made clear
> in the commit log. Thanks Peter for reading my mind! ;-)

Makes sense. Looks like this is already in kvm/master so we cannot improve
the commit message easily any more. Hopefully we will not forget :-)
Paolo Bonzini Nov. 14, 2019, 12:12 p.m. UTC | #6
On 14/11/19 09:20, Christian Borntraeger wrote:
> 
> 
> On 14.11.19 09:15, Marc Zyngier wrote:
>> On Wed, 13 Nov 2019 21:23:07 +0000
>> Peter Maydell <peter.maydell@linaro.org> wrote:
>>
>>> On Wed, 13 Nov 2019 at 18:44, Christian Borntraeger
>>> <borntraeger@de.ibm.com> wrote:
>>>> On 13.11.19 17:05, Marc Zyngier wrote:  
>>>>> On a system without KVM_COMPAT, we prevent IOCTLs from being issued
>>>>> by a compat task. Although this prevents most silly things from
>>>>> happening, it can still confuse a 32bit userspace that is able
>>>>> to open the kvm device (the qemu test suite seems to be pretty
>>>>> mad with this behaviour).
>>>>>
>>>>> Take a more radical approach and return a -ENODEV to the compat
>>>>> task.  
>>>
>>>> Do we still need compat_ioctl if open never succeeds?  
>>>
>>> I wondered about that, but presumably you could use
>>> fd-passing, or just inheriting open fds across exec(),
>>> to open the fd in a 64-bit process and then hand it off
>>> to a 32-bit process to call the ioctl with. (That's
>>> probably only something you'd do if you were
>>> deliberately playing silly games, of course, but
>>> preventing silly games is useful as it makes it
>>> easier to reason about kernel behaviour.)
>>
>> This was exactly my train of thoughts, which I should have made clear
>> in the commit log. Thanks Peter for reading my mind! ;-)
> 
> Makes sense. Looks like this is already in kvm/master so we cannot improve
> the commit message easily any more. Hopefully we will not forget :-)

A comment in the code would probably be better than the commit message,
to not forget stuff like this.  (Hint! :))

Paolo
Marc Zyngier Nov. 14, 2019, 1:22 p.m. UTC | #7
On 2019-11-14 12:12, Paolo Bonzini wrote:
> On 14/11/19 09:20, Christian Borntraeger wrote:
>>
>>
>> On 14.11.19 09:15, Marc Zyngier wrote:
>>> On Wed, 13 Nov 2019 21:23:07 +0000
>>> Peter Maydell <peter.maydell@linaro.org> wrote:
>>>
>>>> On Wed, 13 Nov 2019 at 18:44, Christian Borntraeger
>>>> <borntraeger@de.ibm.com> wrote:
>>>>> On 13.11.19 17:05, Marc Zyngier wrote:
>>>>>> On a system without KVM_COMPAT, we prevent IOCTLs from being 
>>>>>> issued
>>>>>> by a compat task. Although this prevents most silly things from
>>>>>> happening, it can still confuse a 32bit userspace that is able
>>>>>> to open the kvm device (the qemu test suite seems to be pretty
>>>>>> mad with this behaviour).
>>>>>>
>>>>>> Take a more radical approach and return a -ENODEV to the compat
>>>>>> task.
>>>>
>>>>> Do we still need compat_ioctl if open never succeeds?
>>>>
>>>> I wondered about that, but presumably you could use
>>>> fd-passing, or just inheriting open fds across exec(),
>>>> to open the fd in a 64-bit process and then hand it off
>>>> to a 32-bit process to call the ioctl with. (That's
>>>> probably only something you'd do if you were
>>>> deliberately playing silly games, of course, but
>>>> preventing silly games is useful as it makes it
>>>> easier to reason about kernel behaviour.)
>>>
>>> This was exactly my train of thoughts, which I should have made 
>>> clear
>>> in the commit log. Thanks Peter for reading my mind! ;-)
>>
>> Makes sense. Looks like this is already in kvm/master so we cannot 
>> improve
>> the commit message easily any more. Hopefully we will not forget :-)
>
> A comment in the code would probably be better than the commit 
> message,
> to not forget stuff like this.  (Hint! :))

Hint received. How about this?

         M.

 From 34bfc68752253c3da3e59072b137d1a4a85bc005 Mon Sep 17 00:00:00 2001
 From: Marc Zyngier <maz@kernel.org>
Date: Thu, 14 Nov 2019 13:17:39 +0000
Subject: [PATCH] KVM: Add a comment describing the /dev/kvm no_compat 
handling

Add a comment explaining the rational behind having both
no_compat open and ioctl callbacks to fend off compat tasks.

Signed-off-by: Marc Zyngier <maz@kernel.org>
---
  virt/kvm/kvm_main.c | 7 +++++++
  1 file changed, 7 insertions(+)

diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 1243e48dc717..722f2b1d4672 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -120,6 +120,13 @@ static long kvm_vcpu_compat_ioctl(struct file 
*file, unsigned int ioctl,
  				  unsigned long arg);
  #define KVM_COMPAT(c)	.compat_ioctl	= (c)
  #else
+/*
+ * For architectures that don't implement a compat infrastructure,
+ * adopt a double line of defense:
+ * - Prevent a compat task from opening /dev/kvm
+ * - If the open has been done by a 64bit task, and the KVM fd
+ *   passed to a compat task, let the ioctls fail.
+ */
  static long kvm_no_compat_ioctl(struct file *file, unsigned int ioctl,
  				unsigned long arg) { return -EINVAL; }
Peter Maydell Nov. 14, 2019, 1:28 p.m. UTC | #8
On Thu, 14 Nov 2019 at 13:22, Marc Zyngier <maz@kernel.org> wrote:
>  From 34bfc68752253c3da3e59072b137d1a4a85bc005 Mon Sep 17 00:00:00 2001
>  From: Marc Zyngier <maz@kernel.org>
> Date: Thu, 14 Nov 2019 13:17:39 +0000
> Subject: [PATCH] KVM: Add a comment describing the /dev/kvm no_compat
> handling
>
> Add a comment explaining the rational behind having both

"rationale". (Isn't English spelling wonderful?)

> no_compat open and ioctl callbacks to fend off compat tasks.
>
> Signed-off-by: Marc Zyngier <maz@kernel.org>

thanks
-- PMM
Paolo Bonzini Nov. 15, 2019, 9:14 a.m. UTC | #9
On 14/11/19 14:22, Marc Zyngier wrote:
> 
> From 34bfc68752253c3da3e59072b137d1a4a85bc005 Mon Sep 17 00:00:00 2001
> From: Marc Zyngier <maz@kernel.org>
> Date: Thu, 14 Nov 2019 13:17:39 +0000
> Subject: [PATCH] KVM: Add a comment describing the /dev/kvm no_compat
> handling
> 
> Add a comment explaining the rational behind having both
> no_compat open and ioctl callbacks to fend off compat tasks.
> 
> Signed-off-by: Marc Zyngier <maz@kernel.org>
> ---
>  virt/kvm/kvm_main.c | 7 +++++++
>  1 file changed, 7 insertions(+)
> 
> diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
> index 1243e48dc717..722f2b1d4672 100644
> --- a/virt/kvm/kvm_main.c
> +++ b/virt/kvm/kvm_main.c
> @@ -120,6 +120,13 @@ static long kvm_vcpu_compat_ioctl(struct file
> *file, unsigned int ioctl,
>                    unsigned long arg);
>  #define KVM_COMPAT(c)    .compat_ioctl    = (c)
>  #else
> +/*
> + * For architectures that don't implement a compat infrastructure,
> + * adopt a double line of defense:
> + * - Prevent a compat task from opening /dev/kvm
> + * - If the open has been done by a 64bit task, and the KVM fd
> + *   passed to a compat task, let the ioctls fail.
> + */
>  static long kvm_no_compat_ioctl(struct file *file, unsigned int ioctl,
>                  unsigned long arg) { return -EINVAL; }
> 
> -- 
> 2.20.1

Queued, thanks!

Paolo
Paolo Bonzini Nov. 15, 2019, 9:53 a.m. UTC | #10
On 14/11/19 14:28, Peter Maydell wrote:
> On Thu, 14 Nov 2019 at 13:22, Marc Zyngier <maz@kernel.org> wrote:
>>  From 34bfc68752253c3da3e59072b137d1a4a85bc005 Mon Sep 17 00:00:00 2001
>>  From: Marc Zyngier <maz@kernel.org>
>> Date: Thu, 14 Nov 2019 13:17:39 +0000
>> Subject: [PATCH] KVM: Add a comment describing the /dev/kvm no_compat
>> handling
>>
>> Add a comment explaining the rational behind having both
> 
> "rationale". (Isn't English spelling wonderful?)

Oops, noted this only after sending the pull request.

Thanks,

Paolo

>> no_compat open and ioctl callbacks to fend off compat tasks.
>>
>> Signed-off-by: Marc Zyngier <maz@kernel.org>
> 
> thanks
> -- PMM
>
diff mbox series

Patch

diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 543024c7a87f..1243e48dc717 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -122,7 +122,13 @@  static long kvm_vcpu_compat_ioctl(struct file *file, unsigned int ioctl,
 #else
 static long kvm_no_compat_ioctl(struct file *file, unsigned int ioctl,
 				unsigned long arg) { return -EINVAL; }
-#define KVM_COMPAT(c)	.compat_ioctl	= kvm_no_compat_ioctl
+
+static int kvm_no_compat_open(struct inode *inode, struct file *file)
+{
+	return is_compat_task() ? -ENODEV : 0;
+}
+#define KVM_COMPAT(c)	.compat_ioctl	= kvm_no_compat_ioctl,	\
+			.open		= kvm_no_compat_open
 #endif
 static int hardware_enable_all(void);
 static void hardware_disable_all(void);