Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1133664imm; Wed, 26 Sep 2018 12:15:08 -0700 (PDT) X-Google-Smtp-Source: ACcGV60QNBBDfLMB7m4uh+QIPOyEOqGQ6+qomCzalg9MZTWPLqrpsCov3YCAiu7GlaXeLtz9j4iy X-Received: by 2002:a63:d749:: with SMTP id w9-v6mr6827483pgi.415.1537989308298; Wed, 26 Sep 2018 12:15:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537989308; cv=none; d=google.com; s=arc-20160816; b=uPfoGtKnS4vLLdzX1mLA2ItTPDyWW8gucPMl0MJ87OdZLuszmS483CJcXh9wqvMu8S kxdmd6bsnaZ2yASBEBctpvB0BuvdDeFXFif4WT/oCOvDIFeFOZ1Zcxm36fbXRwn8A/ei r23OYTS5QbpNTaG3iHFq/WXTo5OKE/3rQJZjlv2+xyDeSHfBb041KsI21rXpBG75tKEe +rIlqYwvCwwIS7/M4yM8Vms7UlQu/hGvmiZLtQoHpi8gcqSoWKFVcZWwir+X5z7qRq5M x8KL82E90O6dn01sWXgzAXYvy8xTG1pY5NVGyxrzAotzPHAk5dGfXUzkNX8bfMAUuyQy P7lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=xWnEinZXDhzQXReghK9hIpDa7YpGQIfBoZquAkb7J6M=; b=RrtGhEB2GDZE5LXDT7nJvm6+YXdGIPHIyG/0mUWAT0w41zCK0XCf3Q4TeEyDTCshry LYs2RN3zzmkb+dheKg+dOgllgv+FNkaqhgboNWZa/iwx0VndxYh5bP80KSOtPMRVcTsU xmdC7Ta3q8ee1SBJfGaSRk/WdoE5nAnyBxn0chdx6wVtBZwTHjnFizHc3prehZAw2sAK AseUM9o/viWvVp6x2XSB0fH0svXNjahio6HawiK8dZAhCkLZ6G7wbYamFAC9UFB5ZUO8 xc8UM3LZ8/9WlgpMdOoDetDJXipEtmaH/nGB95Kgn+t5pXkA78W9svtpffLFjxYIzKrq Az5Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e4-v6si2875643pfa.274.2018.09.26.12.14.53; Wed, 26 Sep 2018 12:15:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727493AbeI0B3L (ORCPT + 99 others); Wed, 26 Sep 2018 21:29:11 -0400 Received: from mga18.intel.com ([134.134.136.126]:52210 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726304AbeI0B3L (ORCPT ); Wed, 26 Sep 2018 21:29:11 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Sep 2018 12:14:46 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,307,1534834800"; d="scan'208";a="89619226" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.55]) by fmsmga002.fm.intel.com with ESMTP; 26 Sep 2018 12:14:32 -0700 Date: Wed, 26 Sep 2018 12:14:32 -0700 From: Sean Christopherson To: Jarkko Sakkinen Cc: x86@kernel.org, platform-driver-x86@vger.kernel.org, dave.hansen@intel.com, nhorman@redhat.com, npmccallum@redhat.com, serge.ayoun@intel.com, shay.katz-zamir@intel.com, linux-sgx@vger.kernel.org, andriy.shevchenko@linux.intel.com, Dave Hansen , Arnd Bergmann , "open list:GENERIC INCLUDE/ASM HEADER FILES" , open list Subject: Re: [PATCH v14 08/19] signal: x86/sgx: Add SIGSEGV siginfo code for SGX EPCM fault Message-ID: <20180926191432.GB11183@linux.intel.com> References: <20180925130845.9962-1-jarkko.sakkinen@linux.intel.com> <20180925130845.9962-9-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180925130845.9962-9-jarkko.sakkinen@linux.intel.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 25, 2018 at 04:06:45PM +0300, Jarkko Sakkinen wrote: > From: Sean Christopherson > > The SGX Enclave Page Cache Map (EPCM) is a hardware-managed table > that enforces accesses to an enclave's EPC page in addition to the > software-managed kernel page tables, i.e. the effective permissions > for an EPC page are a logical AND of the kernel's page tables and > the corresponding EPCM entry. The primary purpose of the EPCM is > to prevent a malcious or compromised kernel from attacking an enclave > by modifying the enclave's page tables. The EPCM entires for an > enclave are populated when the enclave is built and verified, using > metadata provided by the enclave that is included in the measurement > used to verify the enclave. > > In normal operation of a properly functioning, non-malicious kernel > (and enclave), the EPCM permissions will never trigger a fault, i.e. > the kernel may make the permissions for an EPC page more restrictive, > e.g. mark it not-present to swap out the EPC page, but the kernel will > never make its permissions less restrictive. > > But, there is a legitimate scenario in which the kernel's page tables > can become less restrictive than the EPCM: on current hardware all > enclaves are destroyed (by hardware) on a transition to S3 or lower > sleep states, i.e. all EPCM entries are invalid (not-present) after > the system resumes from its sleep state. > > Unfortunately, on CPUs that support only SGX1, EPCM violations result > in a #GP. The upside of the #GP is that no kernel changes are needed > to deal with the EPCM being blasted away by hardware, e.g. userspace > gets a SIGSEGV, assumes the EPCM was lost and restarts its enclave > and everyone is happy. The downside is that userspace has to assume > the SIGSEGV was because the EPC was lost (or possibly do some leg work > to rule out other causes). > > In SGX2, the oddity of delivering a #GP due to what are inherently > paging related violations is remedied. CPUs that support SGX2 deliver > EPCM violations as #PFs with a new SGX error code bit set. So, now > that hardware provides us with a way to unequivocally determine that > a fault was due to a EPCM violation, define a signfo code for SIGSEGV > so that the information can be passed onto userspace. > > Cc: Dave Hansen > Signed-off-by: Sean Christopherson > Signed-off-by: Jarkko Sakkinen > --- > include/uapi/asm-generic/siginfo.h | 4 ++++ > 1 file changed, 4 insertions(+) > > diff --git a/include/uapi/asm-generic/siginfo.h b/include/uapi/asm-generic/siginfo.h > index 80e2a7227205..fdd898e2325b 100644 > --- a/include/uapi/asm-generic/siginfo.h > +++ b/include/uapi/asm-generic/siginfo.h > @@ -225,7 +225,11 @@ typedef struct siginfo { > #else > # define SEGV_PKUERR 4 /* failed protection key checks */ > #endif > +#ifdef __x86_64__ Argh, this needs to be "#if defined(__i386__) || defined(__x86_64__)" otherwise 32-bit builds break on later patches that use SEGV_SGXERR, e.g. the errors flagged by the 0-DAY bot. > +#define SEGV_SGXERR 5 /* SGX Enclave Page Cache Map fault */ > +#else > #define SEGV_ACCADI 5 /* ADI not enabled for mapped object */ > +#endif > #define SEGV_ADIDERR 6 /* Disrupting MCD error */ > #define SEGV_ADIPERR 7 /* Precise MCD exception */ > #define NSIGSEGV 7 > -- > 2.17.1 >