public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
* [PATCH][v2] virt: tdx-guest: Don't free decrypted memory
@ 2024-06-14  5:14 Li RongQing
  2024-06-14 16:13 ` Edgecombe, Rick P
  0 siblings, 1 reply; 3+ messages in thread
From: Li RongQing @ 2024-06-14  5:14 UTC (permalink / raw)
  To: kirill.shutemov, dave.hansen, x86, linux-coco, linux-kernel,
	rick.p.edgecombe
  Cc: Li RongQing

In CoCo VMs it is possible for the untrusted host to cause
set_memory_decrypted() to fail such that an error is returned
and the resulting memory is shared. Callers need to take care
to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional
or security issues.

So when set_memory_decrypted fails, leak decrypted memory, and
print an error message

Signed-off-by: Li RongQing <lirongqing@baidu.com>
---
diff with v1: leak the page, and print error

 drivers/virt/coco/tdx-guest/tdx-guest.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/virt/coco/tdx-guest/tdx-guest.c b/drivers/virt/coco/tdx-guest/tdx-guest.c
index 1253bf7..3a6e76c8 100644
--- a/drivers/virt/coco/tdx-guest/tdx-guest.c
+++ b/drivers/virt/coco/tdx-guest/tdx-guest.c
@@ -125,7 +125,7 @@ static void *alloc_quote_buf(void)
 		return NULL;
 
 	if (set_memory_decrypted((unsigned long)addr, count)) {
-		free_pages_exact(addr, len);
+		pr_err("Failed to set Quote buffer decrypted, leak the buffer\n");
 		return NULL;
 	}
 
-- 
2.9.4


^ permalink raw reply related	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2024-06-17 10:03 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-06-14  5:14 [PATCH][v2] virt: tdx-guest: Don't free decrypted memory Li RongQing
2024-06-14 16:13 ` Edgecombe, Rick P
2024-06-17 10:03   ` kirill.shutemov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox