Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp1611691pxb; Fri, 27 Aug 2021 12:58:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz7V9MwYy1CQQvYWNYBLMtxhpAl1zGAZhnk0kaYXusiES1aPf+/FC/kmpIUP3kXY4PgS5l5 X-Received: by 2002:a05:6402:14d3:: with SMTP id f19mr10818462edx.114.1630094308075; Fri, 27 Aug 2021 12:58:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630094308; cv=none; d=google.com; s=arc-20160816; b=VDmvnfbgDKlmnOWINuEnL0EBKWtGZ2Dh1Hlcx6Ais1a30qxgF+gDXf/1DvhNGNYvO1 i8j2O2IYB2Dnu8DZRJU5HFM1TndJJEEsLUglJwl+o1+H9r9/0BvwAWEuPaMGrCKpfULx HGQlDRVBxOSdgY6xhUvk+jaWAuFwtO8TEU861ym7cJBFDcfk41zs+JWuLsE9MDwbUs8s LeZXz02WPPRhOcXLuhMtbMWWsWwgHvwIEco3fO6FWkuOLTb1/ME00dwli9MNjdkkJeCJ TUaEOs0NacXERCN7nlQD/3jFC2bKWhiWkM6M3BOSG0W6g0GBu/XE5RxpngtujDmKaZ/n FvtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=KK+L9580J3dXE4rMhpE1nfR0cL9VT+4OkW3gVJ12w24=; b=Pzec0wuVBTMgqZlcH57YcEX6Xxv7qD5DaplIWqR7WaPUqVzmZT84Wp/yrJByuxyQ4f v5sFvyrhOUoURfSMp26mS0oQm+EmSRqQRiAe3LYj10qIEOGBWJLNk1+XTEMIr4q7Wppg J+S0Wt4jE1rNm4WFxbqkfrVni1RCnOH0fCb6zdIBWVFKmkANtFGk5yeIiWMD0cBpQK1z AuNoXI6TgPWurGI9oaZsbBTXT97ZG8YyMN++oJ2BuaXhibH1qQhF2BUds4FE74lA2O5w U2lNe44zdXxc3q6YXiJ9ak8pZLzf7gl1QHj4amFGfnePeGMNqxzasKThzUUMBDugFXQl We9Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k5si6621650edi.147.2021.08.27.12.58.04; Fri, 27 Aug 2021 12:58:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231460AbhH0T4x (ORCPT + 99 others); Fri, 27 Aug 2021 15:56:53 -0400 Received: from mga09.intel.com ([134.134.136.24]:26658 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231319AbhH0T4q (ORCPT ); Fri, 27 Aug 2021 15:56:46 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10089"; a="218024432" X-IronPort-AV: E=Sophos;i="5.84,357,1620716400"; d="scan'208";a="218024432" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Aug 2021 12:55:56 -0700 X-IronPort-AV: E=Sophos;i="5.84,357,1620716400"; d="scan'208";a="528422084" Received: from agluck-desk2.sc.intel.com ([10.3.52.146]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Aug 2021 12:55:56 -0700 From: Tony Luck To: Sean Christopherson , Jarkko Sakkinen , Dave Hansen Cc: Cathy Zhang , x86@kernel.org, linux-kernel@vger.kernel.org, Tony Luck Subject: [PATCH v4 5/6] x86/sgx: Hook sgx_memory_failure() into mainline code Date: Fri, 27 Aug 2021 12:55:42 -0700 Message-Id: <20210827195543.1667168-6-tony.luck@intel.com> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20210827195543.1667168-1-tony.luck@intel.com> References: <20210728204653.1509010-1-tony.luck@intel.com> <20210827195543.1667168-1-tony.luck@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add a call inside memory_failure() to check if the address is an SGX EPC page and handle it. Note the SGX EPC pages do not have a "struct page" entry, so the hook goes in at the same point as the device mapping hook. Pull the call to acquire the mutex earlier so the SGX errors are also protected. Make set_mce_nospec() skip SGX pages when trying to adjust the 1:1 map. Signed-off-by: Tony Luck --- arch/x86/include/asm/set_memory.h | 4 ++++ include/linux/mm.h | 15 +++++++++++++++ mm/memory-failure.c | 19 +++++++++++++------ 3 files changed, 32 insertions(+), 6 deletions(-) diff --git a/arch/x86/include/asm/set_memory.h b/arch/x86/include/asm/set_memory.h index 43fa081a1adb..801af8f30c83 100644 --- a/arch/x86/include/asm/set_memory.h +++ b/arch/x86/include/asm/set_memory.h @@ -2,6 +2,7 @@ #ifndef _ASM_X86_SET_MEMORY_H #define _ASM_X86_SET_MEMORY_H +#include #include #include @@ -98,6 +99,9 @@ static inline int set_mce_nospec(unsigned long pfn, bool unmap) unsigned long decoy_addr; int rc; + /* SGX pages are not in the 1:1 map */ + if (sgx_is_epc_page(pfn << PAGE_SHIFT)) + return 0; /* * We would like to just call: * set_memory_XX((unsigned long)pfn_to_kaddr(pfn), 1); diff --git a/include/linux/mm.h b/include/linux/mm.h index 7ca22e6e694a..2ff599bcf8c2 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -3283,5 +3283,20 @@ static inline int seal_check_future_write(int seals, struct vm_area_struct *vma) return 0; } +#ifdef CONFIG_X86_SGX +int sgx_memory_failure(unsigned long pfn, int flags); +bool sgx_is_epc_page(u64 paddr); +#else +static inline int sgx_memory_failure(unsigned long pfn, int flags) +{ + return -ENXIO; +} + +static inline bool sgx_is_epc_page(u64 paddr) +{ + return false; +} +#endif + #endif /* __KERNEL__ */ #endif /* _LINUX_MM_H */ diff --git a/mm/memory-failure.c b/mm/memory-failure.c index 470400cc7513..ce04debd18f6 100644 --- a/mm/memory-failure.c +++ b/mm/memory-failure.c @@ -1632,21 +1632,28 @@ int memory_failure(unsigned long pfn, int flags) if (!sysctl_memory_failure_recovery) panic("Memory failure on page %lx", pfn); + mutex_lock(&mf_mutex); + p = pfn_to_online_page(pfn); if (!p) { + res = sgx_memory_failure(pfn, flags); + if (res == 0) + goto unlock_mutex; + if (pfn_valid(pfn)) { pgmap = get_dev_pagemap(pfn, NULL); - if (pgmap) - return memory_failure_dev_pagemap(pfn, flags, - pgmap); + if (pgmap) { + res = memory_failure_dev_pagemap(pfn, flags, + pgmap); + goto unlock_mutex; + } } pr_err("Memory failure: %#lx: memory outside kernel control\n", pfn); - return -ENXIO; + res = -ENXIO; + goto unlock_mutex; } - mutex_lock(&mf_mutex); - try_again: if (PageHuge(p)) { res = memory_failure_hugetlb(pfn, flags); -- 2.29.2