On Mon, Oct 05, 2020 at 12:51:00AM +0300, Jarkko Sakkinen wrote:
> On Sat, Oct 03, 2020 at 08:54:40PM +0100, Matthew Wilcox wrote:
> > On Sat, Oct 03, 2020 at 07:50:46AM +0300, Jarkko Sakkinen wrote:
> > > + XA_STATE(xas, &encl->page_array, idx_start);
> > > +
> > > + /*
> > > +  * Disallow READ_IMPLIES_EXEC tasks as their VMA permissions might
> > > +  * conflict with the enclave page permissions.
> > > +  */
> > > + if (current->personality & READ_IMPLIES_EXEC)
> > > +         return -EACCES;
> > > +
> > > + xas_for_each(&xas, page, idx_end)
> > > +         if (!page || (~page->vm_max_prot_bits & vm_prot_bits))
> > > +                 return -EACCES;
> > 
> > You're iterating the array without holding any lock that the XArray knows
> > about.  If you're OK with another thread adding/removing pages behind your
> > back, or there's a higher level lock (the mmap_sem?) protecting the XArray
> > from being modified while you walk it, then hold the rcu_read_lock()
> > while walking the array.  Otherwise you can prevent modification by
> > calling xas_lock(&xas) and xas_unlock()..
> 
> I backtracked this. The locks have been there from v21-v35. This is a
> refactoring mistake in radix_tree to xarray migration happened in v36.
> It's by no means intentional.
> 
> What is shoukd take is encl->lock.
> 
> The loop was pre-v36 like:
> 
>       idx_start = PFN_DOWN(start);
>       idx_end = PFN_DOWN(end - 1);
> 
>       for (idx = idx_start; idx <= idx_end; ++idx) {
>               mutex_lock(&encl->lock);
>               page = radix_tree_lookup(&encl->page_tree, idx);
>               mutex_unlock(&encl->lock);
> 
>               if (!page || (~page->vm_max_prot_bits & vm_prot_bits))
>                       return -EACCES;
>       }
> 
> Looking at xarray.h and filemap.c, I'm thinking something along the
> lines of:
> 
>       for (idx = idx_start; idx <= idx_end; ++idx) {
>               mutex_lock(&encl->lock);
>               page = xas_find(&xas, idx + 1);
                                      ~~~~~~~
                                      idx

>               mutex_unlock(&encl->lock);
> 
>               if (!page || (~page->vm_max_prot_bits & vm_prot_bits))
>                       return -EACCES;
>       }
> 
> Does this look about right?

/Jarkko

Reply via email to