Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 68742C433F5 for ; Fri, 7 Jan 2022 11:43:03 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347187AbiAGLnC (ORCPT ); Fri, 7 Jan 2022 06:43:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34830 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237668AbiAGLnB (ORCPT ); Fri, 7 Jan 2022 06:43:01 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 255A9C061245; Fri, 7 Jan 2022 03:43:01 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E1179B825E5; Fri, 7 Jan 2022 11:42:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 48E70C36AE0; Fri, 7 Jan 2022 11:42:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1641555778; bh=gwX1wUVYeNEw/0pE+CCT1kIe3J4A7iSduIbxxDzZtdg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=govdLCzbMCFUyMaBAshxtMCsjQGHpUayH2Zyrdg06qgGS4ayj90tVw2WWbmfLi0GY E4jtmO/ExrqldNMRaqpaYB4K02IxPg5StiFXYYc/Apso6nZgc2wJgsjL459Vj0JpLA IhucE310IuTJOzvU8Y1rbFqKc+zzIGjba3eW2WCJ7TLUcsI13HGGWe/jgCH2kA0PB+ i+1IiQmT4BnMqIzoSRjQDMu+7bFBmhtohpFdnlIK6EpKuubtljck4mfl0hqiBIgtvU 4dGbXe5Bc1HsNf+QCR9b0pMi7earlt4+Q4560Zei9XX4pZ9fjqNBwN2hgKnbFsCJzE 1vE9Vsmla9UpQ== Date: Fri, 7 Jan 2022 13:42:53 +0200 From: Jarkko Sakkinen To: Dave Hansen Cc: Nathan Chancellor , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Greg Kroah-Hartman , "Rafael J. Wysocki" , reinette.chatre@intel.com, linux-kernel@vger.kernel.org, linux-sgx@vger.kernel.org Subject: Re: [PATCH v13 2/2] x86/sgx: Add an attribute for the amount of SGX memory in a NUMA node Message-ID: References: <20211116162116.93081-1-jarkko@kernel.org> <20211116162116.93081-2-jarkko@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 06, 2022 at 09:18:35PM +0200, Jarkko Sakkinen wrote: > On Sat, Jan 01, 2022 at 08:54:51PM -0800, Dave Hansen wrote: > > On 12/28/21 3:45 PM, Jarkko Sakkinen wrote: > > >> If I can provide any further information or testing, let me know! > > > Dave, when is the fix going to be applied [*]? > > > > > >> Cheers, > > >> Nathan > > > [*] https://lore.kernel.org/linux-sgx/YcGTePmWDMOQU1pn@iki.fi/T/#m831a01bdde347f9e0af2c973986fae0499718201 > > > > Greg preferred hiding the file as opposed to faking a number in there. > > Any testing of the attached would be appreciated. > > > > > From: Dave Hansen > > > > Nathan Chancellor reported an oops when aceessing the > > 'sgx_total_bytes' sysfs file: > > > > https://lore.kernel.org/all/YbzhBrimHGGpddDM@archlinux-ax161/ > > > > The sysfs output code accesses the sgx_numa_nodes[] array > > unconditionally. However, this array is allocated during SGX > > initialization, which only occurs on systems where SGX is > > supported. > > > > If the sysfs file is accessed on systems without SGX support, > > sgx_numa_nodes[] is NULL and an oops occurs. > > > > To fix this, hide the entire nodeX/x86/ attribute group on > > systems without SGX support using the ->is_visible attribute > > group callback. > > > > Fixes: 50468e431335 ("x86/sgx: Add an attribute for the amount of SGX memory in a NUMA node") > > Reported-by: Nathan Chancellor > > CC: Greg Kroah-Hartman > > Cc: Jarkko Sakkinen > > Cc: linux-sgx@vger.kernel.org > > Cc: x86@kernel.org > > Signed-off-by: Dave Hansen > > --- > > > > b/arch/x86/kernel/cpu/sgx/main.c | 11 +++++++++++ > > 1 file changed, 11 insertions(+) > > > > diff -puN arch/x86/kernel/cpu/sgx/main.c~sgx-null-ptr arch/x86/kernel/cpu/sgx/main.c > > --- a/arch/x86/kernel/cpu/sgx/main.c~sgx-null-ptr 2021-12-20 07:56:38.309584807 -0800 > > +++ b/arch/x86/kernel/cpu/sgx/main.c 2021-12-20 08:17:28.997705149 -0800 > > @@ -910,6 +910,16 @@ static ssize_t sgx_total_bytes_show(stru > > } > > static DEVICE_ATTR_RO(sgx_total_bytes); > > > > +static umode_t arch_node_attr_is_visible(struct kobject * kobj, > > + struct attribute * attr, int idx) > > +{ > > + /* Make all x86/ attributes invisible when SGX is not initialized: */ > > + if (nodes_empty(sgx_numa_mask)) > > + return 0; > > + > > + return attr->mode; > > +} > > + > > static struct attribute *arch_node_dev_attrs[] = { > > &dev_attr_sgx_total_bytes.attr, > > NULL, > > @@ -918,6 +928,7 @@ static struct attribute *arch_node_dev_a > > const struct attribute_group arch_node_dev_group = { > > .name = "x86", > > .attrs = arch_node_dev_attrs, > > + .is_visible = arch_node_attr_is_visible, > > }; > > #endif /* CONFIG_NUMA */ > > > > _ > > I'm compiling now kernel with this applied, reporting soon but the fix > looks good to me. Tested-by: Jarkko Sakkinen Did two tests in a virtual machine: 1. Without the patch reproduced the crash. 2. With the patch verified that the crash does not occur. /Jarkko