Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3845881imu; Tue, 18 Dec 2018 05:14:58 -0800 (PST) X-Google-Smtp-Source: AFSGD/UlsjMvoU8l3eV00CDGX391vlB/CAVkxWQGW6tZHrLBAnBKDqZYWryTDKUB/vw+hWRLeGgE X-Received: by 2002:a65:4946:: with SMTP id q6mr15318681pgs.201.1545138898369; Tue, 18 Dec 2018 05:14:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545138898; cv=none; d=google.com; s=arc-20160816; b=Bb39b+aKGbzSkPx2vCzFG7bUV6Z5tA11t8UlmixuUvzNgLlyB0QNu0dIKKCCPPmJw3 Xwm1IUvbBbuJujNh1i9KUPwJmIeLumj2HXmph52Gz2P2Wxy9TRTJ7ILSLlyw33fsljq2 B+73NhCpOmif/kHFnEU1bpvM0mPm1gy5jSZ572SkH2Sn6b2G4KhZQDiLOAOCa0r3w5HU ghUuggDrpQQyGUCTwhAlCQhdZdKi0mGC/BDKnpv2mM1a/T+SHVXdiI6nsaxc56+JtROI m+bs0N5Qof6n0NU+HSJYkc0zD9DGu8w3kECU97ADFSkYaF239fvlgiMj51PSqaOYPEaE 37aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=5kB0sNIzKTAO02N7jLv38LKTuJPU+o5vEHuPyW+w8/w=; b=JYgq5bAIOqC7Hv0bJOedo/4RrIyR0bawTnxauSuNhLqzm3s5OB6aSuHbjgI1Maanqq OgzsPk77HJ+sAmmIwS318vOBtGfNWBCOsjgcObcNOvDRNsdIdQWcRkbrAHWJJhTQFlgE rzc36cpBxiLu9WXzNyLYSmNbIRKXD8sehmq60LNXUzJCDz1eSRXAJf1xczN3HFzKUYjO XtB2c/E4APHsXbyARr3zuuXiPTM37AXMUp+CdtMSsOr429/X+WFMy1J759M0kOByJIv7 JyQvUrg8k7kg2sjk/yDt2rbEdpzCVW6iSDdaGF6mYt5J18T628o5u/H1vTslTB0vkAFl BgrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r14si13184314pgh.39.2018.12.18.05.14.42; Tue, 18 Dec 2018 05:14:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726698AbeLRNNX (ORCPT + 99 others); Tue, 18 Dec 2018 08:13:23 -0500 Received: from mga09.intel.com ([134.134.136.24]:15830 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726419AbeLRNNX (ORCPT ); Tue, 18 Dec 2018 08:13:23 -0500 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Dec 2018 05:13:22 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,368,1539673200"; d="scan'208";a="126984139" Received: from quwen-mobl.ccr.corp.intel.com (HELO localhost) ([10.249.254.215]) by fmsmga002.fm.intel.com with ESMTP; 18 Dec 2018 05:13:13 -0800 Date: Tue, 18 Dec 2018 15:13:11 +0200 From: Jarkko Sakkinen To: Sean Christopherson Cc: Dave Hansen , x86@kernel.org, platform-driver-x86@vger.kernel.org, linux-sgx@vger.kernel.org, nhorman@redhat.com, npmccallum@redhat.com, serge.ayoun@intel.com, shay.katz-zamir@intel.com, haitao.huang@linux.intel.com, andriy.shevchenko@linux.intel.com, tglx@linutronix.de, kai.svahn@intel.com, mark.shanahan@intel.com, luto@amacapital.net, Suresh Siddha , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Darren Hart , Andy Shevchenko , "open list:X86 ARCHITECTURE (32-BIT AND 64-BIT)" Subject: Re: [PATCH v17 18/23] platform/x86: Intel SGX driver Message-ID: <20181218131311.GB25667@linux.intel.com> References: <20181116010412.23967-1-jarkko.sakkinen@linux.intel.com> <20181116010412.23967-19-jarkko.sakkinen@linux.intel.com> <7d5cde02-4649-546b-0f03-2d6414bb80b5@intel.com> <20181217180102.GA12560@linux.intel.com> <20181217183613.GD12491@linux.intel.com> <20181217184333.GA26920@linux.intel.com> <20181217184858.GF12491@linux.intel.com> <20181217193322.GA29785@linux.intel.com> <20181217202149.GA19053@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181217202149.GA19053@linux.intel.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 17, 2018 at 10:21:49PM +0200, Jarkko Sakkinen wrote: > On Mon, Dec 17, 2018 at 09:33:22PM +0200, Jarkko Sakkinen wrote: > > On Mon, Dec 17, 2018 at 10:48:58AM -0800, Sean Christopherson wrote: > > > On Mon, Dec 17, 2018 at 08:43:33PM +0200, Jarkko Sakkinen wrote: > > > > On Mon, Dec 17, 2018 at 10:36:13AM -0800, Sean Christopherson wrote: > > > > > I'm pretty sure doing mmget() would result in circular dependencies and > > > > > a zombie enclave. In the do_exit() case where a task is abruptly killed: > > > > > > > > > > - __mmput() is never called because the enclave holds a ref > > > > > - sgx_encl_release() is never be called because its VMAs hold refs > > > > > - sgx_vma_close() is never called because __mmput()->exit_mmap() is > > > > > blocked and the process itself is dead, i.e. won't unmap anything. > > > > > > > > Right, it does, you are absolutely right. Tried it and removed the > > > > commit already. > > > > > > > > Well, what we came up from your suggestion i.e. setting mm to NULL > > > > and checking that is very subtle change and does not have any such > > > > circular dependencies. We'll go with that. > > > > > > We can't set mm to NULL as we need it to unregister the notifier, and > > > I'm fairly certain attempting to unregister in the release callback > > > will deadlock. > > > > Noticed that too. mmu_notifier_unregister() requires a valid mm. > > Both branches updated... I'm not still seeing why you would want to call sgx_free_page() from sgx_invalidate(). Kind of resistant to adding extra logging just for checking for programming errors. What I would do if I had to debug there a leak would be simply put kretprobe on __sgx_free_page(). /Jarkko