Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp1737708rwb; Wed, 26 Jul 2023 18:17:16 -0700 (PDT) X-Google-Smtp-Source: APBJJlGZptdKbysXQZFpuQ4eGu20gRDJo0fUVZ10GvVxd3gS4nTb8xAi0wM1hj8fl7HfG06Dev19 X-Received: by 2002:a05:6808:220e:b0:3a4:232c:5d7e with SMTP id bd14-20020a056808220e00b003a4232c5d7emr1594197oib.5.1690420636019; Wed, 26 Jul 2023 18:17:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690420635; cv=none; d=google.com; s=arc-20160816; b=eE5FyUE3Dn7PAdlYtYCOTEc1O1DR7t4LObeBxOsmYaiHRnxQFBumfxPCmkcVJwRO+Z /2SwMu56yIGhHJQnvhExyvhX0aIhT+go3Z4zIusQnTfuXcCBw3o/BFetwd4EhHYVOiUK Cf0kGQrio+33d+gnO6B4W8liFxFz7qD2++fbAEJAuGiTsbIUwJ0xjWL0ZxeWTQHuic5W 8xQcnfuVB7xupIu4TtOcPKGRZfXWFN5qXzKHdwmHhvkAKRGDYZUz9xd2lyDoe9D98/uL 9RsBdE7PSknH3LfZ2nprJstp36iw13DqXFA309EkDH4feKxN/xxd8zthdlgBwovcQjtp Tx4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=UMjjR31/ogcRD0lliUQv3uIarsW3gYqmY5lK0jwflAU=; fh=8Tmoc1a4PSa0y0BVDAkIOD3HFQwMyhL58Y2czfMWHmY=; b=EjUJ43zsvR7GO7mWCKLu649p3mJ9dBmkDAlAOzKZ+1+JX2b1zcRqylMydWnPla3GS8 2Pn41FRPeDi0Sn5l9hGMX60bEkgx0zTupyDNzkl+Yj1eiRm+05cZnm3h3ukwRHzkzNKE cMunRc9vLfeR1DiY+8/YcOr5sWi9NMEIusmxup+e+YpQN0NjnKdxUH3q8FKfoMjM3QTh 83d3xvJTSCjXSKNHO5jWlXWLudlmvg47Ca5k2dHmQq69o+4Yqc4oUCB6bmCbMJmp3snq o7XbJxkohpJxgLClPMkDLu9OL07wE3avxvcxytheIh23qDSDK5SiEJ/W5m3AEkNW4yT9 EfJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ew67S8af; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o6-20020a637e46000000b0055c786fbccesi221438pgn.157.2023.07.26.18.17.02; Wed, 26 Jul 2023 18:17:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ew67S8af; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231266AbjG0BCQ (ORCPT + 99 others); Wed, 26 Jul 2023 21:02:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47568 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229552AbjG0BCO (ORCPT ); Wed, 26 Jul 2023 21:02:14 -0400 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3B0E126B8; Wed, 26 Jul 2023 18:02:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1690419733; x=1721955733; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=r08GviQmSzSPANfI7vEvO5/gRDeF3yRPCIsvhIrYKOQ=; b=ew67S8afsV0RwANr/DU+l1Uoer1IFI0FmSQLGbcCHWZEtwqUncAMWP81 pqBIszQ7iPAUjGH3B2MHUz5G2RIWpKjbHgQSBHoGaGV6VF8MpLCNw4Vec w33kQBC46tPDzFtZpaAcPgPWXUuQFWKl43iMVVFta3pNe4bGOKxTNp9ED rnk7Z6xLxG/MPGHG9lIKHV/f3C8sV7tEi7TiIPp18ZODm+oGhfcvKm/zd i0jyeUNjH1U7/XzQgA+iIYZ34EDdgMRu26nSq8ftt5fEoxNuHojrtzqMP eNixpHptZEKeG6uX4j5q/Ew7xrLcAqWH2qgiiIbDy6q58sBwoUecgk0d5 g==; X-IronPort-AV: E=McAfee;i="6600,9927,10783"; a="371782764" X-IronPort-AV: E=Sophos;i="6.01,233,1684825200"; d="scan'208";a="371782764" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Jul 2023 18:02:12 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10783"; a="726736494" X-IronPort-AV: E=Sophos;i="6.01,233,1684825200"; d="scan'208";a="726736494" Received: from b4969161e530.jf.intel.com ([10.165.56.46]) by orsmga002.jf.intel.com with ESMTP; 26 Jul 2023 18:02:12 -0700 From: Haitao Huang To: dave.hansen@linux.intel.com, kai.huang@intel.com, reinette.chatre@intel.com, jarkko@kernel.org, linux-kernel@vger.kernel.org, linux-sgx@vger.kernel.org, Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" Cc: dave.hansen@intel.com, kristen@linux.intel.com, seanjc@google.com, stable@vger.kernel.org, sohil.mehta@intel.com Subject: [PATCH v5] x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race Date: Wed, 26 Jul 2023 18:02:12 -0700 Message-Id: <20230727010212.26406-1-haitao.huang@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: 130e505e-a0d3-548d-61bc-5b7e14cc6117@intel.com References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Under heavy load, the SGX EPC reclaimer (ksgxd) may reclaim the SECS EPC page for an enclave and set encl->secs.epc_page to NULL. But the SECS EPC page is used for EAUG in the SGX page fault handler without checking for NULL and reloading. Fix this by checking if SECS is loaded before EAUG and loading it if it was reclaimed. The SECS page holds global enclave metadata. It can only be reclaimed when there are no other enclave pages remaining. At that point, virtually nothing can be done with the enclave until the SECS page is paged back in. An enclave can not run nor generate page faults without a resident SECS page. But it is still possible for a #PF for a non-SECS page to race with paging out the SECS page: when the last resident non-SECS page A triggers a #PF in a non-resident page B, and then page A and the SECS both are paged out before the #PF on B is handled. Hitting this bug requires that race triggered with a #PF for EAUG. Following is a trace when it happens. BUG: kernel NULL pointer dereference, address: 0000000000000000 RIP: 0010:sgx_encl_eaug_page+0xc7/0x210 Call Trace: ? __kmem_cache_alloc_node+0x16a/0x440 ? xa_load+0x6e/0xa0 sgx_vma_fault+0x119/0x230 __do_fault+0x36/0x140 do_fault+0x12f/0x400 __handle_mm_fault+0x728/0x1110 handle_mm_fault+0x105/0x310 do_user_addr_fault+0x1ee/0x750 ? __this_cpu_preempt_check+0x13/0x20 exc_page_fault+0x76/0x180 asm_exc_page_fault+0x27/0x30 Fixes: 5a90d2c3f5ef ("x86/sgx: Support adding of pages to an initialized enclave") Cc: stable@vger.kernel.org # v6.0+ Signed-off-by: Haitao Huang Reviewed-by: Jarkko Sakkinen Acked-by: Reinette Chatre --- v5: - Trimmed trace and added Acked-by (Reinette) v4: - Refined the title (Kai, Dave) - Added a trace to commit meesage (Kai) - Added a few details for the race. v3: - Added comments on sgx_encl_load_secs(). (Dave) - Added theory of the race condition to hit the bug. (Dave) - Added Reviewed-by, and applicable stable release. (Jarkko) v2: - Fixes for style, commit message (Jarkko, Kai) - Removed unneeded WARN_ON (Kai) --- arch/x86/kernel/cpu/sgx/encl.c | 30 +++++++++++++++++++++++++----- 1 file changed, 25 insertions(+), 5 deletions(-) diff --git a/arch/x86/kernel/cpu/sgx/encl.c b/arch/x86/kernel/cpu/sgx/encl.c index 91fa70e51004..279148e72459 100644 --- a/arch/x86/kernel/cpu/sgx/encl.c +++ b/arch/x86/kernel/cpu/sgx/encl.c @@ -235,6 +235,21 @@ static struct sgx_epc_page *sgx_encl_eldu(struct sgx_encl_page *encl_page, return epc_page; } +/* + * Ensure the SECS page is not swapped out. Must be called with encl->lock + * to protect the enclave states including SECS and ensure the SECS page is + * not swapped out again while being used. + */ +static struct sgx_epc_page *sgx_encl_load_secs(struct sgx_encl *encl) +{ + struct sgx_epc_page *epc_page = encl->secs.epc_page; + + if (!epc_page) + epc_page = sgx_encl_eldu(&encl->secs, NULL); + + return epc_page; +} + static struct sgx_encl_page *__sgx_encl_load_page(struct sgx_encl *encl, struct sgx_encl_page *entry) { @@ -248,11 +263,9 @@ static struct sgx_encl_page *__sgx_encl_load_page(struct sgx_encl *encl, return entry; } - if (!(encl->secs.epc_page)) { - epc_page = sgx_encl_eldu(&encl->secs, NULL); - if (IS_ERR(epc_page)) - return ERR_CAST(epc_page); - } + epc_page = sgx_encl_load_secs(encl); + if (IS_ERR(epc_page)) + return ERR_CAST(epc_page); epc_page = sgx_encl_eldu(entry, encl->secs.epc_page); if (IS_ERR(epc_page)) @@ -339,6 +352,13 @@ static vm_fault_t sgx_encl_eaug_page(struct vm_area_struct *vma, mutex_lock(&encl->lock); + epc_page = sgx_encl_load_secs(encl); + if (IS_ERR(epc_page)) { + if (PTR_ERR(epc_page) == -EBUSY) + vmret = VM_FAULT_NOPAGE; + goto err_out_unlock; + } + epc_page = sgx_alloc_epc_page(encl_page, false); if (IS_ERR(epc_page)) { if (PTR_ERR(epc_page) == -EBUSY) base-commit: 6eaae198076080886b9e7d57f4ae06fa782f90ef -- 2.25.1