Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3047926imu; Mon, 17 Dec 2018 12:18:23 -0800 (PST) X-Google-Smtp-Source: AFSGD/VzIsgpIG/aUgPVm6yktmI7k3sScIHZBMQ61uD9vagHLpsKAxf5jXlGi4/Gmfdide62XpAf X-Received: by 2002:a17:902:850c:: with SMTP id bj12mr13595897plb.46.1545077903868; Mon, 17 Dec 2018 12:18:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545077903; cv=none; d=google.com; s=arc-20160816; b=tsuptLYKR0IozVsNlNDh2EiwwUuMgXZ9qOYlQx8bi04tmrNsnfF8aD5W7rkRkTQxoO L0aO90juRV6PWl2Q3bJivnlBvVaCBCxdQdzuW56Rov99XxctwjCVOohxJq8OtZNQMwgN FN6b4uEJALJWDRP9SYjBqOjhcUiKI0Ikp5/Od5S6NVx30ZwtJTux2TZJx8OucvA2kFc9 uKO2g1WZH+G0GoiYlNSYJN9Qv3IZRyjpGtNoADinZJw3ROtg3fyC77NmAid7SScWhs8J dPFttEMJmO2mkJ8tLCVz1dm0GC4lf9EDcoiRJooeWNv210pzHXVTF5QMzf/kPMegI3SF +tvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=OzEKCrTyE8EY5tpgte71/wbA6lOmid1+6u/6O+OVufQ=; b=A9KdmEOJpDUwNbKtxYRPH4Ig5Zdbw/VrCz3DIW7ztB/JXq4cYhCboN1k/Pkm2v8Wcv Q6iKUpl5T6Nq5bJMieLmc6L5xKNpl5rbEUcyyMrw5npjBZZRLGA64+HPkq3CKmlcda0t Cx37ui9JoAvBeoGPLnufFwtmT2jr5anOEz1rUUDzw13o6meSa/bDPD7AocqdM6H1whbo ggxV7aXcJwqkKy9OHn4Dza1lALd2E1Su+zNwrUTHtHkRQzurhxsERLCS7vIwDmqW4geP kuDNZPJJlsMkGMc+7IWkTXiC8HG9O9Kz7aC/dP+YxbqS96RNRxHJHqWhsOJShqO4MC27 cLUw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n7si11100177plp.147.2018.12.17.12.18.08; Mon, 17 Dec 2018 12:18:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389077AbeLQSgO (ORCPT + 99 others); Mon, 17 Dec 2018 13:36:14 -0500 Received: from mga06.intel.com ([134.134.136.31]:1438 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387614AbeLQSgO (ORCPT ); Mon, 17 Dec 2018 13:36:14 -0500 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Dec 2018 10:36:13 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,366,1539673200"; d="scan'208";a="119043409" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.154]) by orsmga002.jf.intel.com with ESMTP; 17 Dec 2018 10:36:13 -0800 Date: Mon, 17 Dec 2018 10:36:13 -0800 From: Sean Christopherson To: Jarkko Sakkinen Cc: Dave Hansen , x86@kernel.org, platform-driver-x86@vger.kernel.org, linux-sgx@vger.kernel.org, nhorman@redhat.com, npmccallum@redhat.com, serge.ayoun@intel.com, shay.katz-zamir@intel.com, haitao.huang@linux.intel.com, andriy.shevchenko@linux.intel.com, tglx@linutronix.de, kai.svahn@intel.com, mark.shanahan@intel.com, luto@amacapital.net, Suresh Siddha , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Darren Hart , Andy Shevchenko , "open list:X86 ARCHITECTURE (32-BIT AND 64-BIT)" Subject: Re: [PATCH v17 18/23] platform/x86: Intel SGX driver Message-ID: <20181217183613.GD12491@linux.intel.com> References: <20181116010412.23967-1-jarkko.sakkinen@linux.intel.com> <20181116010412.23967-19-jarkko.sakkinen@linux.intel.com> <7d5cde02-4649-546b-0f03-2d6414bb80b5@intel.com> <20181217180102.GA12560@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181217180102.GA12560@linux.intel.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 17, 2018 at 08:01:02PM +0200, Jarkko Sakkinen wrote: > On Mon, Dec 17, 2018 at 09:45:40AM -0800, Dave Hansen wrote: > > > +struct sgx_encl *sgx_encl_alloc(struct sgx_secs *secs) > > > +{ > > ... > > > + kref_init(&encl->refcount); > > > + INIT_LIST_HEAD(&encl->add_page_reqs); > > > + INIT_RADIX_TREE(&encl->page_tree, GFP_KERNEL); > > > + mutex_init(&encl->lock); > > > + INIT_WORK(&encl->add_page_work, sgx_add_page_worker); > > > + > > > + encl->mm = current->mm; <---------------------------------> + encl->base = secs->base; > > > + encl->size = secs->size; > > > + encl->ssaframesize = secs->ssa_frame_size; > > > + encl->backing = backing; > > > + > > > + return encl; > > > +} > > > > How is this OK without taking a reference on the mm? It's subtle and the ordering is all kinds of weird, but technically we are taking a reference on mm when the mmu_notifier is registered in sgx_encl_create(). sgx_encl_alloc() and sgx_encl_create() are always called in tandem and with mm->mm_users > 0, so we'll never use encl->mm without holding a reference to mm. We need to comment the weirdness or maybe register the notifier before > > I have a feeling a bunch of your bugs with the mmu notifiers and so > > forth are because the refcounting is wrong here. Eh, not really. Maybe the mmu_notifier is more subtle, e.g. calling do_unmap() after mmput() would be quite obvious, but there's no fundamental bug, we just haven't needed to touch VMAs during release prior to moving away from shmem. > > Sean's SGX_ENCL_MM_RELEASED would, I think be unnecessary if you just > > take a refcount here and release it when the enclave is destroyed. > > Right, atomic_inc(encl->mm->count) here and once when releasing. > > The we would not even need the whole mmu notifier in the first place. I'm pretty sure doing mmget() would result in circular dependencies and a zombie enclave. In the do_exit() case where a task is abruptly killed: - __mmput() is never called because the enclave holds a ref - sgx_encl_release() is never be called because its VMAs hold refs - sgx_vma_close() is never called because __mmput()->exit_mmap() is blocked and the process itself is dead, i.e. won't unmap anything.