Skip to content

Commit 3e385c0

Browse files
aikbp3tk0v
authored andcommitted
virt: sev-guest: Move SNP Guest Request data pages handling under snp_cmd_mutex
Compared to the SNP Guest Request, the "Extended" version adds data pages for receiving certificates. If not enough pages provided, the HV can report to the VM how much is needed so the VM can reallocate and repeat. Commit ae59661 ("virt: sev-guest: Reduce the scope of SNP command mutex") moved handling of the allocated/desired pages number out of scope of said mutex and create a possibility for a race (multiple instances trying to trigger Extended request in a VM) as there is just one instance of snp_msg_desc per /dev/sev-guest and no locking other than snp_cmd_mutex. Fix the issue by moving the data blob/size and the GHCB input struct (snp_req_data) into snp_guest_req which is allocated on stack now and accessed by the GHCB caller under that mutex. Stop allocating SEV_FW_BLOB_MAX_SIZE in snp_msg_alloc() as only one of four callers needs it. Free the received blob in get_ext_report() right after it is copied to the userspace. Possible future users of snp_send_guest_request() are likely to have different ideas about the buffer size anyways. Fixes: ae59661 ("virt: sev-guest: Reduce the scope of SNP command mutex") Signed-off-by: Alexey Kardashevskiy <aik@amd.com> Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de> Reviewed-by: Nikunj A Dadhania <nikunj@amd.com> Cc: stable@vger.kernel.org Link: https://lore.kernel.org/r/20250307013700.437505-3-aik@amd.com
1 parent ac7c06a commit 3e385c0

File tree

3 files changed

+39
-24
lines changed

3 files changed

+39
-24
lines changed

arch/x86/coco/sev/core.c

Lines changed: 8 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2853,19 +2853,8 @@ struct snp_msg_desc *snp_msg_alloc(void)
28532853
if (!mdesc->response)
28542854
goto e_free_request;
28552855

2856-
mdesc->certs_data = alloc_shared_pages(SEV_FW_BLOB_MAX_SIZE);
2857-
if (!mdesc->certs_data)
2858-
goto e_free_response;
2859-
2860-
/* initial the input address for guest request */
2861-
mdesc->input.req_gpa = __pa(mdesc->request);
2862-
mdesc->input.resp_gpa = __pa(mdesc->response);
2863-
mdesc->input.data_gpa = __pa(mdesc->certs_data);
2864-
28652856
return mdesc;
28662857

2867-
e_free_response:
2868-
free_shared_pages(mdesc->response, sizeof(struct snp_guest_msg));
28692858
e_free_request:
28702859
free_shared_pages(mdesc->request, sizeof(struct snp_guest_msg));
28712860
e_unmap:
@@ -2885,7 +2874,6 @@ void snp_msg_free(struct snp_msg_desc *mdesc)
28852874
kfree(mdesc->ctx);
28862875
free_shared_pages(mdesc->response, sizeof(struct snp_guest_msg));
28872876
free_shared_pages(mdesc->request, sizeof(struct snp_guest_msg));
2888-
free_shared_pages(mdesc->certs_data, SEV_FW_BLOB_MAX_SIZE);
28892877
iounmap((__force void __iomem *)mdesc->secrets);
28902878

28912879
memset(mdesc, 0, sizeof(*mdesc));
@@ -3054,7 +3042,7 @@ static int __handle_guest_request(struct snp_msg_desc *mdesc, struct snp_guest_r
30543042
* sequence number must be incremented or the VMPCK must be deleted to
30553043
* prevent reuse of the IV.
30563044
*/
3057-
rc = snp_issue_guest_request(req, &mdesc->input, rio);
3045+
rc = snp_issue_guest_request(req, &req->input, rio);
30583046
switch (rc) {
30593047
case -ENOSPC:
30603048
/*
@@ -3064,7 +3052,7 @@ static int __handle_guest_request(struct snp_msg_desc *mdesc, struct snp_guest_r
30643052
* order to increment the sequence number and thus avoid
30653053
* IV reuse.
30663054
*/
3067-
override_npages = mdesc->input.data_npages;
3055+
override_npages = req->input.data_npages;
30683056
req->exit_code = SVM_VMGEXIT_GUEST_REQUEST;
30693057

30703058
/*
@@ -3120,7 +3108,7 @@ static int __handle_guest_request(struct snp_msg_desc *mdesc, struct snp_guest_r
31203108
}
31213109

31223110
if (override_npages)
3123-
mdesc->input.data_npages = override_npages;
3111+
req->input.data_npages = override_npages;
31243112

31253113
return rc;
31263114
}
@@ -3158,6 +3146,11 @@ int snp_send_guest_request(struct snp_msg_desc *mdesc, struct snp_guest_req *req
31583146
*/
31593147
memcpy(mdesc->request, &mdesc->secret_request, sizeof(mdesc->secret_request));
31603148

3149+
/* Initialize the input address for guest request */
3150+
req->input.req_gpa = __pa(mdesc->request);
3151+
req->input.resp_gpa = __pa(mdesc->response);
3152+
req->input.data_gpa = req->certs_data ? __pa(req->certs_data) : 0;
3153+
31613154
rc = __handle_guest_request(mdesc, req, rio);
31623155
if (rc) {
31633156
if (rc == -EIO &&

arch/x86/include/asm/sev.h

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -203,6 +203,9 @@ struct snp_guest_req {
203203
unsigned int vmpck_id;
204204
u8 msg_version;
205205
u8 msg_type;
206+
207+
struct snp_req_data input;
208+
void *certs_data;
206209
};
207210

208211
/*
@@ -263,9 +266,6 @@ struct snp_msg_desc {
263266
struct snp_guest_msg secret_request, secret_response;
264267

265268
struct snp_secrets_page *secrets;
266-
struct snp_req_data input;
267-
268-
void *certs_data;
269269

270270
struct aesgcm_ctx *ctx;
271271

drivers/virt/coco/sev-guest/sev-guest.c

Lines changed: 28 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -176,6 +176,7 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
176176
struct snp_guest_req req = {};
177177
int ret, npages = 0, resp_len;
178178
sockptr_t certs_address;
179+
struct page *page;
179180

180181
if (sockptr_is_null(io->req_data) || sockptr_is_null(io->resp_data))
181182
return -EINVAL;
@@ -209,8 +210,20 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
209210
* the host. If host does not supply any certs in it, then copy
210211
* zeros to indicate that certificate data was not provided.
211212
*/
212-
memset(mdesc->certs_data, 0, report_req->certs_len);
213213
npages = report_req->certs_len >> PAGE_SHIFT;
214+
page = alloc_pages(GFP_KERNEL_ACCOUNT | __GFP_ZERO,
215+
get_order(report_req->certs_len));
216+
if (!page)
217+
return -ENOMEM;
218+
219+
req.certs_data = page_address(page);
220+
ret = set_memory_decrypted((unsigned long)req.certs_data, npages);
221+
if (ret) {
222+
pr_err("failed to mark page shared, ret=%d\n", ret);
223+
__free_pages(page, get_order(report_req->certs_len));
224+
return -EFAULT;
225+
}
226+
214227
cmd:
215228
/*
216229
* The intermediate response buffer is used while decrypting the
@@ -219,10 +232,12 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
219232
*/
220233
resp_len = sizeof(report_resp->data) + mdesc->ctx->authsize;
221234
report_resp = kzalloc(resp_len, GFP_KERNEL_ACCOUNT);
222-
if (!report_resp)
223-
return -ENOMEM;
235+
if (!report_resp) {
236+
ret = -ENOMEM;
237+
goto e_free_data;
238+
}
224239

225-
mdesc->input.data_npages = npages;
240+
req.input.data_npages = npages;
226241

227242
req.msg_version = arg->msg_version;
228243
req.msg_type = SNP_MSG_REPORT_REQ;
@@ -237,7 +252,7 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
237252

238253
/* If certs length is invalid then copy the returned length */
239254
if (arg->vmm_error == SNP_GUEST_VMM_ERR_INVALID_LEN) {
240-
report_req->certs_len = mdesc->input.data_npages << PAGE_SHIFT;
255+
report_req->certs_len = req.input.data_npages << PAGE_SHIFT;
241256

242257
if (copy_to_sockptr(io->req_data, report_req, sizeof(*report_req)))
243258
ret = -EFAULT;
@@ -246,7 +261,7 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
246261
if (ret)
247262
goto e_free;
248263

249-
if (npages && copy_to_sockptr(certs_address, mdesc->certs_data, report_req->certs_len)) {
264+
if (npages && copy_to_sockptr(certs_address, req.certs_data, report_req->certs_len)) {
250265
ret = -EFAULT;
251266
goto e_free;
252267
}
@@ -256,6 +271,13 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
256271

257272
e_free:
258273
kfree(report_resp);
274+
e_free_data:
275+
if (npages) {
276+
if (set_memory_encrypted((unsigned long)req.certs_data, npages))
277+
WARN_ONCE(ret, "failed to restore encryption mask (leak it)\n");
278+
else
279+
__free_pages(page, get_order(report_req->certs_len));
280+
}
259281
return ret;
260282
}
261283

0 commit comments

Comments
 (0)