Skip to content

Commit

Permalink
virt: tdx-guest: Just leak decrypted memory on unrecoverable errors
Browse files Browse the repository at this point in the history
In CoCo VMs it is possible for the untrusted host to cause
set_memory_decrypted() to fail such that an error is returned
and the resulting memory is shared. Callers need to take care
to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional
or security issues.

Leak the decrypted memory when set_memory_decrypted() fails,
and don't need to print an error since set_memory_decrypted()
will call WARN_ONCE().

Fixes: f4738f5 ("virt: tdx-guest: Add Quote generation support using TSM_REPORTS")
Signed-off-by: Li RongQing <lirongqing@baidu.com>
Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Reviewed-by: Rick Edgecombe <rick.p.edgecombe@intel.com>
Reviewed-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/all/20240619111801.25630-1-lirongqing%40baidu.com
  • Loading branch information
lrq-max authored and Ingo Molnar committed Dec 29, 2024
1 parent dc81e55 commit 2783497
Showing 1 changed file with 1 addition and 3 deletions.
4 changes: 1 addition & 3 deletions drivers/virt/coco/tdx-guest/tdx-guest.c
Original file line number Diff line number Diff line change
Expand Up @@ -124,10 +124,8 @@ static void *alloc_quote_buf(void)
if (!addr)
return NULL;

if (set_memory_decrypted((unsigned long)addr, count)) {
free_pages_exact(addr, len);
if (set_memory_decrypted((unsigned long)addr, count))
return NULL;
}

return addr;
}
Expand Down

0 comments on commit 2783497

Please sign in to comment.