Merge pull request #128 from arutk/secure_alloc

Use env_secure_(alloc/free) macro for metadata allocations
This commit is contained in:
Michał Wysoczański 2019-04-18 15:56:57 +02:00 committed by GitHub
commit 0b098ddb80
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 64 additions and 15 deletions

63
env/posix/ocf_env.h vendored
View File

@ -31,6 +31,7 @@
#include <inttypes.h>
#include <sys/time.h>
#include <sys/param.h>
#include <sys/mman.h>
#include <zlib.h>
#include "ocf_env_list.h"
@ -59,6 +60,15 @@ typedef uint64_t sector_t;
#define PAGE_SIZE 4096
/* *** DEBUGING *** */
#define ENV_WARN(cond, fmt...) printf(fmt)
#define ENV_WARN_ON(cond) ;
#define ENV_WARN_ONCE(cond, fmt...) ENV_WARN(cond, fmt)
#define ENV_BUG() assert(0)
#define ENV_BUG_ON(cond) do { if (cond) ENV_BUG(); } while (0)
/* *** MEMORY MANAGEMENT *** */
#define ENV_MEM_NORMAL 0
#define ENV_MEM_NOIO 0
@ -99,6 +109,49 @@ static inline void env_vfree(const void *ptr)
free((void *)ptr);
}
/* *** SECURE MEMORY MANAGEMENT *** */
/*
* OCF adapter can opt to take additional steps to securely allocate and free
* memory used by OCF to store cache metadata. This is to prevent other
* entities in the system from acquiring parts of OCF cache metadata via
* memory allocations. If this is not a concern in given product, secure
* alloc/free should default to vmalloc/vfree.
*
* Memory returned from secure alloc is not expected to be physically continous
* nor zeroed.
*/
/* default to standard memory allocations for secure allocations */
#define SECURE_MEMORY_HANDLING 0
static inline void *env_secure_alloc(size_t size)
{
void *ptr = malloc(size);
#if SECURE_MEMORY_HANDLING
if (ptr && mlock(ptr, size)) {
free(ptr);
ptr = NULL;
}
#endif
return ptr;
}
static inline void env_secure_free(const void *ptr, size_t size)
{
if (ptr) {
#if SECURE_MEMORY_HANDLING
memset(ptr, size, 0);
/* TODO: flush CPU caches ? */
ENV_BUG_ON(munlock(ptr));
#endif
free((void*)ptr);
}
}
static inline uint64_t env_get_free_memory(void)
{
return sysconf(_SC_PAGESIZE) * sysconf(_SC_AVPHYS_PAGES);
@ -613,21 +666,15 @@ static inline void env_sort(void *base, size_t num, size_t size,
strncpy(dest, src, min(dmax, slen)); \
0; \
})
/* *** DEBUGING *** */
#define ENV_WARN(cond, fmt...) printf(fmt)
#define ENV_WARN_ON(cond) ;
#define ENV_WARN_ONCE(cond, fmt...) ENV_WARN(cond, fmt)
#define ENV_BUG() assert(0)
#define ENV_BUG_ON(cond) assert(!(cond))
/* *** MISC UTILITIES *** */
#define container_of(ptr, type, member) ({ \
const typeof(((type *)0)->member)*__mptr = (ptr); \
(type *)((char *)__mptr - offsetof(type, member)); })
#define ARRAY_SIZE(x) (sizeof(x) / sizeof(*(x)))
/* *** TIME *** */
static inline void env_msleep(uint64_t n)
{
usleep(n * 1000);

View File

@ -680,7 +680,7 @@ exit:
ctx_data_free(ctx, context->data.core_config.data);
ctx_data_free(ctx, context->data.superblock.data);
env_vfree(context);
env_secure_free(context, sizeof(*context));
}
static void ocf_metadata_query_cores_end_io(struct ocf_io *io, int error)
@ -800,11 +800,12 @@ void ocf_metadata_hash_query_cores(ocf_ctx_t owner, ocf_volume_t volume,
}
/* intialize query context */
context = env_vzalloc(sizeof(*context));
context = env_secure_alloc(sizeof(*context));
if (!context) {
cmpl(priv, -ENOMEM, 0);
return;
}
ENV_BUG_ON(env_memset(context, sizeof(*context), 0));
context->ctx = owner;
context->params.cmpl = cmpl;
context->params.priv = priv;

View File

@ -78,7 +78,7 @@ static int _raw_ram_deinit(ocf_cache_t cache,
OCF_DEBUG_TRACE(cache);
if (raw->mem_pool) {
env_vfree(raw->mem_pool);
env_secure_free(raw->mem_pool, raw->mem_pool_limit);
raw->mem_pool = NULL;
}
@ -99,9 +99,10 @@ static int _raw_ram_init(ocf_cache_t cache,
mem_pool_size = raw->ssd_pages;
mem_pool_size *= PAGE_SIZE;
raw->mem_pool_limit = mem_pool_size;
raw->mem_pool = env_vzalloc(mem_pool_size);
raw->mem_pool = env_secure_alloc(mem_pool_size);
if (!raw->mem_pool)
return -ENOMEM;
ENV_BUG_ON(env_memset(raw->mem_pool, mem_pool_size, 0));
return 0;
}

View File

@ -125,7 +125,7 @@ int raw_dynamic_deinit(ocf_cache_t cache,
OCF_DEBUG_TRACE(cache);
for (i = 0; i < raw->ssd_pages; i++)
env_free(ctrl->pages[i]);
env_secure_free(ctrl->pages[i], PAGE_SIZE);
env_vfree(ctrl);
raw->priv = NULL;
@ -296,7 +296,7 @@ static void raw_dynamic_load_all_complete(
context->cmpl(context->priv, error);
ocf_req_put(context->req);
env_free(context->page);
env_secure_free(context->page, PAGE_SIZE);
env_free(context->zpage);
ctx_data_free(context->cache->owner, context->data);
env_vfree(context);
@ -383,7 +383,7 @@ static int raw_dynamic_load_all_update(struct ocf_request *req)
for (i_page = 0; i_page < count; i_page++, context->i++) {
if (!context->page) {
context->page = env_malloc(PAGE_SIZE, ENV_MEM_NORMAL);
context->page = env_secure_alloc(PAGE_SIZE);
if (!context->page) {
/* Allocation error */
result = -OCF_ERR_NO_MEM;