Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4015063imu; Tue, 18 Dec 2018 07:48:07 -0800 (PST) X-Google-Smtp-Source: AFSGD/XevmwN2bR0IoH4b+YaA04w9G7RsyEViFEecVMC04fDbRdrzpJEpesctJcbUSBL8FMHqWgc X-Received: by 2002:a63:2849:: with SMTP id o70mr15883064pgo.155.1545148086992; Tue, 18 Dec 2018 07:48:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545148086; cv=none; d=google.com; s=arc-20160816; b=yXbyXAVZIrmT73qfnBj4T6ahE7SEmGPC+WPismjmISqLxO9HpEN/1+LorMlM4dAfO6 TWHs+E+RXPFw1tdzxF1aT/0uv3w0/sATis7Gygwa3tWXIpmSvYmfdHnSLbaIfQwDicF3 u5qFcqtIOvXm8U6YIvHlEEGbFvnLnOPpYhzUjoGlHc5eJsEmT+l/Q74DbdvqVreNmdO+ VD3not0ApaSy5gUlnmJ81Sc1Vk4F02UdhEA2At+zW9z/Xah2fk2M7eQwRnpn+bpi6n1Q dqYnklpBkcQqh9MVmO9tYhJRlScqWcp9gS5zMHgQEovlP22DzjN/aoOmml19XjQpRjqT S0Dg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=hDlXnmySA4RCQeKxK/4EtgBbSeBcnNFriaJgWwYZy00=; b=CrZRXRwMk2MnlBhn9zEfW6SeNwStGI0Ee3eiEPe0hF1FFLfg9Iuc5KaaEqPoelwero Cc4VgsXeFokPOKeb5fS5DH1MyqOaJKVSTf/nfk45XjUgU1LOZ/vPMTevo4B0KFMqIFlF iKjiwcdy4OxHzDK9L/zLgg4BXShZ8/D3SNGpIWCkCWxZI8O8x4uEM5d2x5G2ArcDiKnW oSaU0s5D++78Pv5eWRbk0r3RAYRyj9FDloxCQzbSIN+kFMIhZ2nOjnK7TMjT5JEJ1U64 B902KvUffBsrQ8qSOxQglevVcKJDV7FrHyTsGdnoxkjHgNiLPeAgkRDfWd4OntjTfqrW KkFA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d34si13423981pgb.43.2018.12.18.07.47.51; Tue, 18 Dec 2018 07:48:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727097AbeLRPqe (ORCPT + 99 others); Tue, 18 Dec 2018 10:46:34 -0500 Received: from mga04.intel.com ([192.55.52.120]:1274 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726422AbeLRPqc (ORCPT ); Tue, 18 Dec 2018 10:46:32 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Dec 2018 07:46:32 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,368,1539673200"; d="scan'208";a="119413497" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.154]) by FMSMGA003.fm.intel.com with ESMTP; 18 Dec 2018 07:46:31 -0800 Date: Tue, 18 Dec 2018 07:46:31 -0800 From: Sean Christopherson To: Jarkko Sakkinen Cc: Dave Hansen , x86@kernel.org, platform-driver-x86@vger.kernel.org, linux-sgx@vger.kernel.org, nhorman@redhat.com, npmccallum@redhat.com, serge.ayoun@intel.com, shay.katz-zamir@intel.com, haitao.huang@linux.intel.com, andriy.shevchenko@linux.intel.com, tglx@linutronix.de, kai.svahn@intel.com, mark.shanahan@intel.com, luto@amacapital.net, Suresh Siddha , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Darren Hart , Andy Shevchenko , "open list:X86 ARCHITECTURE (32-BIT AND 64-BIT)" Subject: Re: [PATCH v17 18/23] platform/x86: Intel SGX driver Message-ID: <20181218154631.GD28326@linux.intel.com> References: <20181116010412.23967-1-jarkko.sakkinen@linux.intel.com> <20181116010412.23967-19-jarkko.sakkinen@linux.intel.com> <7d5cde02-4649-546b-0f03-2d6414bb80b5@intel.com> <20181217180102.GA12560@linux.intel.com> <20181217183613.GD12491@linux.intel.com> <20181217184333.GA26920@linux.intel.com> <20181217184858.GF12491@linux.intel.com> <20181217193322.GA29785@linux.intel.com> <20181217202149.GA19053@linux.intel.com> <20181218131311.GB25667@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181218131311.GB25667@linux.intel.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Dec 18, 2018 at 03:13:11PM +0200, Jarkko Sakkinen wrote: > On Mon, Dec 17, 2018 at 10:21:49PM +0200, Jarkko Sakkinen wrote: > > On Mon, Dec 17, 2018 at 09:33:22PM +0200, Jarkko Sakkinen wrote: > > > On Mon, Dec 17, 2018 at 10:48:58AM -0800, Sean Christopherson wrote: > > > > On Mon, Dec 17, 2018 at 08:43:33PM +0200, Jarkko Sakkinen wrote: > > > > > On Mon, Dec 17, 2018 at 10:36:13AM -0800, Sean Christopherson wrote: > > > > > > I'm pretty sure doing mmget() would result in circular dependencies and > > > > > > a zombie enclave. In the do_exit() case where a task is abruptly killed: > > > > > > > > > > > > - __mmput() is never called because the enclave holds a ref > > > > > > - sgx_encl_release() is never be called because its VMAs hold refs > > > > > > - sgx_vma_close() is never called because __mmput()->exit_mmap() is > > > > > > blocked and the process itself is dead, i.e. won't unmap anything. > > > > > > > > > > Right, it does, you are absolutely right. Tried it and removed the > > > > > commit already. > > > > > > > > > > Well, what we came up from your suggestion i.e. setting mm to NULL > > > > > and checking that is very subtle change and does not have any such > > > > > circular dependencies. We'll go with that. > > > > > > > > We can't set mm to NULL as we need it to unregister the notifier, and > > > > I'm fairly certain attempting to unregister in the release callback > > > > will deadlock. > > > > > > Noticed that too. mmu_notifier_unregister() requires a valid mm. > > > > Both branches updated... > > I'm not still seeing why you would want to call sgx_free_page() from > sgx_invalidate(). Kind of resistant to adding extra logging just for > checking for programming errors. What I would do if I had to debug > there a leak would be simply put kretprobe on __sgx_free_page(). The WARN is needed to detect the leak in the first place. And leaking pages because EREMOVE fails usually means there's a serious bug.