* [PATCH v3 1/5] x86/sgx: Fix a resource leak in sgx_init() [not found] <20210303150323.433207-1-jarkko@kernel.org> @ 2021-03-03 15:03 ` Jarkko Sakkinen 2021-03-03 16:56 ` Dave Hansen 0 siblings, 1 reply; 5+ messages in thread From: Jarkko Sakkinen @ 2021-03-03 15:03 UTC (permalink / raw) To: linux-sgx Cc: Jarkko Sakkinen, stable, Dave Hansen, Thomas Gleixner, Ingo Molnar, Borislav Petkov, x86, H. Peter Anvin, Jethro Beekman, Sean Christopherson, Serge Ayoun, linux-kernel If sgx_page_cache_init() fails in the middle, a trivial return statement causes unused memory and virtual address space reserved for the EPC section, not freed. Fix this by using the same rollback, as when sgx_page_reclaimer_init() fails. Cc: stable@vger.kernel.org # 5.11 Fixes: e7e0545299d8 ("x86/sgx: Initialize metadata for Enclave Page Cache (EPC) sections") Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org> --- arch/x86/kernel/cpu/sgx/main.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/cpu/sgx/main.c b/arch/x86/kernel/cpu/sgx/main.c index 8df81a3ed945..52d070fb4c9a 100644 --- a/arch/x86/kernel/cpu/sgx/main.c +++ b/arch/x86/kernel/cpu/sgx/main.c @@ -708,8 +708,10 @@ static int __init sgx_init(void) if (!cpu_feature_enabled(X86_FEATURE_SGX)) return -ENODEV; - if (!sgx_page_cache_init()) - return -ENOMEM; + if (!sgx_page_cache_init()) { + ret = -ENOMEM; + goto err_page_cache; + } if (!sgx_page_reclaimer_init()) { ret = -ENOMEM; -- 2.30.1 ^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH v3 1/5] x86/sgx: Fix a resource leak in sgx_init() 2021-03-03 15:03 ` [PATCH v3 1/5] x86/sgx: Fix a resource leak in sgx_init() Jarkko Sakkinen @ 2021-03-03 16:56 ` Dave Hansen 2021-03-10 15:00 ` Jarkko Sakkinen 0 siblings, 1 reply; 5+ messages in thread From: Dave Hansen @ 2021-03-03 16:56 UTC (permalink / raw) To: Jarkko Sakkinen, linux-sgx Cc: stable, Dave Hansen, Thomas Gleixner, Ingo Molnar, Borislav Petkov, x86, H. Peter Anvin, Jethro Beekman, Sean Christopherson, Serge Ayoun, linux-kernel On 3/3/21 7:03 AM, Jarkko Sakkinen wrote: > If sgx_page_cache_init() fails in the middle, a trivial return > statement causes unused memory and virtual address space reserved for > the EPC section, not freed. Fix this by using the same rollback, as > when sgx_page_reclaimer_init() fails. ... > @@ -708,8 +708,10 @@ static int __init sgx_init(void) > if (!cpu_feature_enabled(X86_FEATURE_SGX)) > return -ENODEV; > > - if (!sgx_page_cache_init()) > - return -ENOMEM; > + if (!sgx_page_cache_init()) { > + ret = -ENOMEM; > + goto err_page_cache; > + } Currently, the only way sgx_page_cache_init() can fail is in the case that there are no sections: if (!sgx_nr_epc_sections) { pr_err("There are zero EPC sections.\n"); return false; } That only happened if all sgx_setup_epc_section() calls failed. sgx_setup_epc_section() never both allocates memory with vmalloc for section->pages *and* fails. If sgx_setup_epc_section() has a successful memremap() but a failed vmalloc(), it cleans up with memunmap(). In other words, I see how this _looks_ like a memory leak from sgx_init(), but I don't see an actual leak in practice. Am I missing something? ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v3 1/5] x86/sgx: Fix a resource leak in sgx_init() 2021-03-03 16:56 ` Dave Hansen @ 2021-03-10 15:00 ` Jarkko Sakkinen 2021-03-10 15:49 ` Sean Christopherson 0 siblings, 1 reply; 5+ messages in thread From: Jarkko Sakkinen @ 2021-03-10 15:00 UTC (permalink / raw) To: Dave Hansen Cc: linux-sgx, stable, Dave Hansen, Thomas Gleixner, Ingo Molnar, Borislav Petkov, x86, H. Peter Anvin, Jethro Beekman, Sean Christopherson, Serge Ayoun, linux-kernel On Wed, Mar 03, 2021 at 08:56:52AM -0800, Dave Hansen wrote: > On 3/3/21 7:03 AM, Jarkko Sakkinen wrote: > > If sgx_page_cache_init() fails in the middle, a trivial return > > statement causes unused memory and virtual address space reserved for > > the EPC section, not freed. Fix this by using the same rollback, as > > when sgx_page_reclaimer_init() fails. > ... > > @@ -708,8 +708,10 @@ static int __init sgx_init(void) > > if (!cpu_feature_enabled(X86_FEATURE_SGX)) > > return -ENODEV; > > > > - if (!sgx_page_cache_init()) > > - return -ENOMEM; > > + if (!sgx_page_cache_init()) { > > + ret = -ENOMEM; > > + goto err_page_cache; > > + } > > > Currently, the only way sgx_page_cache_init() can fail is in the case > that there are no sections: > > if (!sgx_nr_epc_sections) { > pr_err("There are zero EPC sections.\n"); > return false; > } > > That only happened if all sgx_setup_epc_section() calls failed. > sgx_setup_epc_section() never both allocates memory with vmalloc for > section->pages *and* fails. If sgx_setup_epc_section() has a successful > memremap() but a failed vmalloc(), it cleans up with memunmap(). > > In other words, I see how this _looks_ like a memory leak from > sgx_init(), but I don't see an actual leak in practice. > > Am I missing something? In sgx_setup_epc_section(): section->pages = vmalloc(nr_pages * sizeof(struct sgx_epc_page)); if (!section->pages) { memunmap(section->virt_addr); return false; } I.e. this rollback does not happen without this fix applied: for (i = 0; i < sgx_nr_epc_sections; i++) { vfree(sgx_epc_sections[i].pages); memunmap(sgx_epc_sections[i].virt_addr); } /Jarkko ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v3 1/5] x86/sgx: Fix a resource leak in sgx_init() 2021-03-10 15:00 ` Jarkko Sakkinen @ 2021-03-10 15:49 ` Sean Christopherson 2021-03-10 21:52 ` Jarkko Sakkinen 0 siblings, 1 reply; 5+ messages in thread From: Sean Christopherson @ 2021-03-10 15:49 UTC (permalink / raw) To: Jarkko Sakkinen Cc: Dave Hansen, linux-sgx, stable, Dave Hansen, Thomas Gleixner, Ingo Molnar, Borislav Petkov, x86, H. Peter Anvin, Jethro Beekman, Serge Ayoun, linux-kernel On Wed, Mar 10, 2021, Jarkko Sakkinen wrote: > On Wed, Mar 03, 2021 at 08:56:52AM -0800, Dave Hansen wrote: > > On 3/3/21 7:03 AM, Jarkko Sakkinen wrote: > > > If sgx_page_cache_init() fails in the middle, a trivial return > > > statement causes unused memory and virtual address space reserved for > > > the EPC section, not freed. Fix this by using the same rollback, as > > > when sgx_page_reclaimer_init() fails. > > ... > > > @@ -708,8 +708,10 @@ static int __init sgx_init(void) > > > if (!cpu_feature_enabled(X86_FEATURE_SGX)) > > > return -ENODEV; > > > > > > - if (!sgx_page_cache_init()) > > > - return -ENOMEM; > > > + if (!sgx_page_cache_init()) { > > > + ret = -ENOMEM; > > > + goto err_page_cache; > > > + } > > > > > > Currently, the only way sgx_page_cache_init() can fail is in the case > > that there are no sections: > > > > if (!sgx_nr_epc_sections) { > > pr_err("There are zero EPC sections.\n"); > > return false; > > } > > > > That only happened if all sgx_setup_epc_section() calls failed. > > sgx_setup_epc_section() never both allocates memory with vmalloc for > > section->pages *and* fails. If sgx_setup_epc_section() has a successful > > memremap() but a failed vmalloc(), it cleans up with memunmap(). > > > > In other words, I see how this _looks_ like a memory leak from > > sgx_init(), but I don't see an actual leak in practice. > > > > Am I missing something? > > In sgx_setup_epc_section(): > > > section->pages = vmalloc(nr_pages * sizeof(struct sgx_epc_page)); > if (!section->pages) { > memunmap(section->virt_addr); > return false; > } > > I.e. this rollback does not happen without this fix applied: > > for (i = 0; i < sgx_nr_epc_sections; i++) { > vfree(sgx_epc_sections[i].pages); > memunmap(sgx_epc_sections[i].virt_addr); > } Dave is pointing out that sgx_page_cache_init() fails if and only if _all_ sections fail sgx_setup_epc_section(), and if all sections fail then sgx_nr_epc_sections is '0' and the above is a nop. That behavior is by design, as we didn't want to kill SGX if a single section failed to initialize for whatever reason. ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v3 1/5] x86/sgx: Fix a resource leak in sgx_init() 2021-03-10 15:49 ` Sean Christopherson @ 2021-03-10 21:52 ` Jarkko Sakkinen 0 siblings, 0 replies; 5+ messages in thread From: Jarkko Sakkinen @ 2021-03-10 21:52 UTC (permalink / raw) To: Sean Christopherson Cc: Dave Hansen, linux-sgx, stable, Dave Hansen, Thomas Gleixner, Ingo Molnar, Borislav Petkov, x86, H. Peter Anvin, Jethro Beekman, Serge Ayoun, linux-kernel On Wed, Mar 10, 2021 at 07:49:29AM -0800, Sean Christopherson wrote: > On Wed, Mar 10, 2021, Jarkko Sakkinen wrote: > > On Wed, Mar 03, 2021 at 08:56:52AM -0800, Dave Hansen wrote: > > > On 3/3/21 7:03 AM, Jarkko Sakkinen wrote: > > > > If sgx_page_cache_init() fails in the middle, a trivial return > > > > statement causes unused memory and virtual address space reserved for > > > > the EPC section, not freed. Fix this by using the same rollback, as > > > > when sgx_page_reclaimer_init() fails. > > > ... > > > > @@ -708,8 +708,10 @@ static int __init sgx_init(void) > > > > if (!cpu_feature_enabled(X86_FEATURE_SGX)) > > > > return -ENODEV; > > > > > > > > - if (!sgx_page_cache_init()) > > > > - return -ENOMEM; > > > > + if (!sgx_page_cache_init()) { > > > > + ret = -ENOMEM; > > > > + goto err_page_cache; > > > > + } > > > > > > > > > Currently, the only way sgx_page_cache_init() can fail is in the case > > > that there are no sections: > > > > > > if (!sgx_nr_epc_sections) { > > > pr_err("There are zero EPC sections.\n"); > > > return false; > > > } > > > > > > That only happened if all sgx_setup_epc_section() calls failed. > > > sgx_setup_epc_section() never both allocates memory with vmalloc for > > > section->pages *and* fails. If sgx_setup_epc_section() has a successful > > > memremap() but a failed vmalloc(), it cleans up with memunmap(). > > > > > > In other words, I see how this _looks_ like a memory leak from > > > sgx_init(), but I don't see an actual leak in practice. > > > > > > Am I missing something? > > > > In sgx_setup_epc_section(): > > > > > > section->pages = vmalloc(nr_pages * sizeof(struct sgx_epc_page)); > > if (!section->pages) { > > memunmap(section->virt_addr); > > return false; > > } > > > > I.e. this rollback does not happen without this fix applied: > > > > for (i = 0; i < sgx_nr_epc_sections; i++) { > > vfree(sgx_epc_sections[i].pages); > > memunmap(sgx_epc_sections[i].virt_addr); > > } > > Dave is pointing out that sgx_page_cache_init() fails if and only if _all_ > sections fail sgx_setup_epc_section(), and if all sections fail then > sgx_nr_epc_sections is '0' and the above is a nop. > > That behavior is by design, as we didn't want to kill SGX if a single section > failed to initialize for whatever reason. My bad. You're correct. I got mixed up by the rollback :-) Thanks! I'll just drop the whole patch. /Jarkko ^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2021-03-10 21:54 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20210303150323.433207-1-jarkko@kernel.org>
2021-03-03 15:03 ` [PATCH v3 1/5] x86/sgx: Fix a resource leak in sgx_init() Jarkko Sakkinen
2021-03-03 16:56 ` Dave Hansen
2021-03-10 15:00 ` Jarkko Sakkinen
2021-03-10 15:49 ` Sean Christopherson
2021-03-10 21:52 ` Jarkko Sakkinen
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox