Received: by 2002:ab2:710b:0:b0:1ef:a325:1205 with SMTP id z11csp843878lql; Mon, 11 Mar 2024 22:03:03 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXNvkkWSsjxVk56g7XxDYyfjNes0Cvo7cOpoSUXKW20u7H/UE80AhVHJsiiV2i28pHjmXyzpvYnzr2UOZR1zV4HaVfRRIaU0a7xAIlwYQ== X-Google-Smtp-Source: AGHT+IFxa4K1ihpHzHEepHNJRiJARjcp2idpz+uArbZJaqTzOoc4Aq5i/6KcmbM68UyUu0xlOPK2 X-Received: by 2002:a17:90a:fd01:b0:29b:a149:2fe4 with SMTP id cv1-20020a17090afd0100b0029ba1492fe4mr6843427pjb.34.1710219782702; Mon, 11 Mar 2024 22:03:02 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710219782; cv=pass; d=google.com; s=arc-20160816; b=bWlzWiVo+obf+RpE86ykFeuMd/iOzy7ZLXyLjI82c4hD9RAW7ceoS8mYdaJkO+vCr3 g1BNm387vo0taMpAzhlE59ObWH/DDv0jABWt+4CS58AZQey9Z139Qu+W4WeL2M5LFklv CyVfGOJLa4+ftdYmZrJYqBhbq8N09O2Xbq2oFDHMurK+3GNuJaHXgLtrCFhZOnBDG1uJ kW3Q4tzCHdyNj3xlgEmeqzJ4xU3H0gyWhVpXeIgOjYpUMMtdYSI7F7y6zAXnBvGjwZt+ nTVOT9v6divQhy3EZde40y2F2oLobU/841QL6vacAjq6UuUgRKmkmlEgtOi3Gq98snkE mnlw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature; bh=1M61NctXmWjeXEzth+3hnXZwwsh97QLxpTwKvqzRIyg=; fh=lSkdrWcu7Uq+74G4qbjkjoOIVw5oPGYrbxk8eAmfORs=; b=hhHxujv1QlltG4tpTR9D1kSPVxXM7pZg6CtiwTaGsYY1oswCvWhvOLuaHGactTO8T5 YHim0f14+WJQq0S0mQHXYl5kQUGM0gtt56edYVGJ9aZAKnYliykqUuMUrUSgMCh+bG+x XS7ARefB4hPNlRTduwuIXNUo5qT0qC5Ni5RHmJbk/EWcgJigIRkB3DVFk51XJUJk5O4V 0U3fgScqAHmnIznk1aep1O4uWsFJGmPiF6F4RGIMIz1X4D4mHe4M58LZm9l+XfDjyEQ5 RFwcfW4wmoABYzLu7gTdGaG8af5Su01qbfIfz9/vDDCelVamnCG1JJKCvE+qIStGrW0F KOhQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=PW35itaQ; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-99834-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-99834-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id lp7-20020a17090b4a8700b0029c2aa91cc3si1594940pjb.146.2024.03.11.22.03.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Mar 2024 22:03:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-99834-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=PW35itaQ; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-99834-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-99834-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 3415E282882 for ; Tue, 12 Mar 2024 05:03:02 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 419DE111AC; Tue, 12 Mar 2024 05:02:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="PW35itaQ" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7794AB66F; Tue, 12 Mar 2024 05:02:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.9 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710219772; cv=none; b=r0UL5YDm4llyFjD72I//lvBSbs/VYNTSeIqy1v2F/pCcxDE/ntImoiNXhA4wFe7j+o/+QjdBU60Vwj8L9C00QD306D/+5i5rEGAvdHW6KvHNz26mnbb4jHSW274NJ6Qu+KS6k/2LjpBbEbIYkwxZXt2JkagPH1y6ssj80EYht7s= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710219772; c=relaxed/simple; bh=2tsBJwRlZRWmiGzbwBsDlPhhzuZbS4QXjkPuYyC5m20=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=bmbmfXqt1LIyPLNX51ByKTdFl5xExPUY+q6pCEbwQGgvFxXEdko5ryt5PcvYaSSU4RGMfM91gkjRqGaf0cQiVCEHC+YQLTBiuUdoUOda0rnuSSdIkZ05VeyGFTlQBYm+PpRBA/HM2516fQGrlbXs0If4raQNTlnQxS6+7vi/Riw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=PW35itaQ; arc=none smtp.client-ip=192.198.163.9 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1710219770; x=1741755770; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=2tsBJwRlZRWmiGzbwBsDlPhhzuZbS4QXjkPuYyC5m20=; b=PW35itaQA2fRJHSFN7edhv1yNdBNmSwSs/sz4M8H9b1bwHd9OdttFVus XTsgJZQT4DrBdEmeFfBLrDWWxubiPgdNR9n1aN3t0Ll0QGmaOJbCtHcBL Uy3G/Lqj9np9JgD0LfK7EROUKhQ97cJS3QX3qGvlKCvQfS29f42DvVy+l VhmcguSacLLokMb8w9VD/JAdDyty5wTcadFJsqXR/cCP0l6Cr63g34OYG PLI6of4grblOrLE0K40+ouzk7wzzCk2wgRlj/mj4KZANq0M9NnS9rCtZ/ DhA5veamqtzEjNnzwdyLgOSj9F0YbuF1aZ0d7gg0MIHgmUuVtfS3T2StU g==; X-IronPort-AV: E=McAfee;i="6600,9927,11010"; a="15639605" X-IronPort-AV: E=Sophos;i="6.07,118,1708416000"; d="scan'208";a="15639605" Received: from orviesa006.jf.intel.com ([10.64.159.146]) by fmvoesa103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Mar 2024 22:02:49 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,118,1708416000"; d="scan'208";a="11834601" Received: from sbrowne-mobl.amr.corp.intel.com (HELO [10.209.68.239]) ([10.209.68.239]) by orviesa006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Mar 2024 22:02:48 -0700 Message-ID: <13581af9-e5f0-41ca-939f-33948b2133e7@linux.intel.com> Date: Mon, 11 Mar 2024 22:02:48 -0700 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2 2/5] Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl Content-Language: en-US To: mhklinux@outlook.com, rick.p.edgecombe@intel.com, kys@microsoft.com, haiyangz@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, gregkh@linuxfoundation.org, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, kirill.shutemov@linux.intel.com, dave.hansen@linux.intel.com, linux-kernel@vger.kernel.org, linux-hyperv@vger.kernel.org, netdev@vger.kernel.org, linux-coco@lists.linux.dev Cc: elena.reshetova@intel.com References: <20240311161558.1310-1-mhklinux@outlook.com> <20240311161558.1310-3-mhklinux@outlook.com> From: Kuppuswamy Sathyanarayanan In-Reply-To: <20240311161558.1310-3-mhklinux@outlook.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit On 3/11/24 9:15 AM, mhkelley58@gmail.com wrote: > From: Rick Edgecombe > > In CoCo VMs it is possible for the untrusted host to cause > set_memory_encrypted() or set_memory_decrypted() to fail such that an > error is returned and the resulting memory is shared. Callers need to > take care to handle these errors to avoid returning decrypted (shared) > memory to the page allocator, which could lead to functional or security > issues. > > In order to make sure callers of vmbus_establish_gpadl() and > vmbus_teardown_gpadl() don't return decrypted/shared pages to > allocators, add a field in struct vmbus_gpadl to keep track of the > decryption status of the buffers. This will allow the callers to > know if they should free or leak the pages. > > Signed-off-by: Rick Edgecombe > Signed-off-by: Michael Kelley > --- > drivers/hv/channel.c | 25 +++++++++++++++++++++---- > include/linux/hyperv.h | 1 + > 2 files changed, 22 insertions(+), 4 deletions(-) > > diff --git a/drivers/hv/channel.c b/drivers/hv/channel.c > index 56f7e06c673e..bb5abdcda18f 100644 > --- a/drivers/hv/channel.c > +++ b/drivers/hv/channel.c > @@ -472,9 +472,18 @@ static int __vmbus_establish_gpadl(struct vmbus_channel *channel, > (atomic_inc_return(&vmbus_connection.next_gpadl_handle) - 1); > > ret = create_gpadl_header(type, kbuffer, size, send_offset, &msginfo); > - if (ret) > + if (ret) { > + gpadl->decrypted = false; Why not set it by default at the beginning of the function? > return ret; > + } > > + /* > + * Set the "decrypted" flag to true for the set_memory_decrypted() > + * success case. In the failure case, the encryption state of the > + * memory is unknown. Leave "decrypted" as true to ensure the > + * memory will be leaked instead of going back on the free list. > + */ > + gpadl->decrypted = true; > ret = set_memory_decrypted((unsigned long)kbuffer, > PFN_UP(size)); > if (ret) { > @@ -563,9 +572,15 @@ static int __vmbus_establish_gpadl(struct vmbus_channel *channel, > > kfree(msginfo); > > - if (ret) > - set_memory_encrypted((unsigned long)kbuffer, > - PFN_UP(size)); > + if (ret) { > + /* > + * If set_memory_encrypted() fails, the decrypted flag is > + * left as true so the memory is leaked instead of being > + * put back on the free list. > + */ > + if (!set_memory_encrypted((unsigned long)kbuffer, PFN_UP(size))) > + gpadl->decrypted = false; > + } > > return ret; > } > @@ -886,6 +901,8 @@ int vmbus_teardown_gpadl(struct vmbus_channel *channel, struct vmbus_gpadl *gpad > if (ret) > pr_warn("Fail to set mem host visibility in GPADL teardown %d.\n", ret); Will this be called only if vmbus_establish_gpad() is successful? If not, you might want to skip set_memory_encrypted() call for decrypted = false case. > > + gpadl->decrypted = ret; > + IMO, you can set it to false by default. Any way with non zero return, user know about the decryption failure. > return ret; > } > EXPORT_SYMBOL_GPL(vmbus_teardown_gpadl); > diff --git a/include/linux/hyperv.h b/include/linux/hyperv.h > index 2b00faf98017..5bac136c268c 100644 > --- a/include/linux/hyperv.h > +++ b/include/linux/hyperv.h > @@ -812,6 +812,7 @@ struct vmbus_gpadl { > u32 gpadl_handle; > u32 size; > void *buffer; > + bool decrypted; > }; > > struct vmbus_channel { -- Sathyanarayanan Kuppuswamy Linux Kernel Developer