Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp3911782ybf; Tue, 3 Mar 2020 15:38:34 -0800 (PST) X-Google-Smtp-Source: ADFU+vt3JIDTn/PJx2uGKFBPJ2h4HEjf+dgOOxDTERqBX7r6h+za6WG97CaKzqWFK8azSqht98Hj X-Received: by 2002:a9d:2c6a:: with SMTP id f97mr250663otb.254.1583278714070; Tue, 03 Mar 2020 15:38:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583278714; cv=none; d=google.com; s=arc-20160816; b=S2PjN6GBGf0Yz+27MfWbcdyarOrTDEAZ2Utmq8zyDjaCkuHzkeuqghQN/APkOQnwWU VBqCv3xUiq7YgnZ3rYzZTmGyB+2pR2rK7d7UaLkUN8vp2CzR++bD9WaEdzbBqQqDbBKu CwVZ9JoxV1kBswxB+GdAW1biIgaL1WjhTHhHvHSaQckuSP9yiwKCWQ6A0iMKRFZcprvG enRG6ArQ2pOg1cLfFBm9fArRvoLuscOnHmitNkE9z3pMYJ3JnKHDkjRfBKom1mMO6XJH 2+Pg3uj4LINDs2ZX7YEZpEgmU8HS/N86uiSFgEPH6xzYlcm7O8H/eEls9qUH9hXpSVOo ryXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=m3hv46+RXk9PfoOrMksRPHor0RwiJnD8PguYcQYsxCM=; b=uQ1tddVS1g4a4lUGhgbcuPcNqL/UT+9J4XHQy06C222zLJ7xJnvHaQUoryDBsaQYpv f8LFUaojpuD5tRiOJ2mxODENncNbNT0mrUqMBU8sb+LNlMk3jw9RKkYf/h1ssrbJ7P/o VAPWQQ4mSrdeyD5lm277An99L1+GCnQGMLAghbGbfUD0tIg6jEIwqVyScWUQ99qoBoKm eGP68W+FUqBGEIEMN2hu2esDuVXnoSnK6JD7PxDs76kXSiw05tPkka1BKhxp/gNuU9xu WTVzoiAYf7bO5/9MSQdlPwrX4juVFvWbGDxrTdg/ZhxKrBsuPX/GzclNyd7zuSCraokF 1HVw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v5si82337ota.39.2020.03.03.15.38.22; Tue, 03 Mar 2020 15:38:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728630AbgCCXhK (ORCPT + 99 others); Tue, 3 Mar 2020 18:37:10 -0500 Received: from mga18.intel.com ([134.134.136.126]:46706 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728388AbgCCXhJ (ORCPT ); Tue, 3 Mar 2020 18:37:09 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Mar 2020 15:37:08 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,511,1574150400"; d="scan'208";a="229117109" Received: from kwasilew-mobl.ger.corp.intel.com (HELO localhost) ([10.251.88.57]) by orsmga007.jf.intel.com with ESMTP; 03 Mar 2020 15:37:00 -0800 From: Jarkko Sakkinen To: linux-kernel@vger.kernel.org, x86@kernel.org, linux-sgx@vger.kernel.org Cc: akpm@linux-foundation.org, dave.hansen@intel.com, sean.j.christopherson@intel.com, nhorman@redhat.com, npmccallum@redhat.com, haitao.huang@intel.com, andriy.shevchenko@linux.intel.com, tglx@linutronix.de, kai.svahn@intel.com, bp@alien8.de, josh@joshtriplett.org, luto@kernel.org, kai.huang@intel.com, rientjes@google.com, cedric.xing@intel.com, puiterwijk@redhat.com, Jarkko Sakkinen Subject: [PATCH v28 04/22] x86/mm: x86/sgx: Signal SIGSEGV with PF_SGX Date: Wed, 4 Mar 2020 01:35:51 +0200 Message-Id: <20200303233609.713348-5-jarkko.sakkinen@linux.intel.com> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200303233609.713348-1-jarkko.sakkinen@linux.intel.com> References: <20200303233609.713348-1-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson Include SGX bit to the PF error codes and throw SIGSEGV with PF_SGX when a #PF with SGX set happens. CPU throws a #PF with the SGX bit in the event of Enclave Page Cache Map (EPCM) conflict. The EPCM is a CPU-internal table, which describes the properties for a enclave page. Enclaves are measured and signed software entities, which SGX hosts. [1] Although the primary purpose of the EPCM conflict checks is to prevent malicious accesses to an enclave, an illegit access can happen also for legit reasons. All SGX reserved memory, including EPCM is encrypted with a transient key that does not survive from the power transition. Throwing a SIGSEGV allows user space software react when this happens (e.g. rec-create the enclave, which was invalidated). [1] Intel SDM: 36.5.1 Enclave Page Cache Map (EPCM) Signed-off-by: Sean Christopherson Signed-off-by: Jarkko Sakkinen --- arch/x86/include/asm/traps.h | 1 + arch/x86/mm/fault.c | 13 +++++++++++++ 2 files changed, 14 insertions(+) diff --git a/arch/x86/include/asm/traps.h b/arch/x86/include/asm/traps.h index ffa0dc8a535e..bb8d5ae74dbc 100644 --- a/arch/x86/include/asm/traps.h +++ b/arch/x86/include/asm/traps.h @@ -174,5 +174,6 @@ enum x86_pf_error_code { X86_PF_RSVD = 1 << 3, X86_PF_INSTR = 1 << 4, X86_PF_PK = 1 << 5, + X86_PF_SGX = 1 << 15, }; #endif /* _ASM_X86_TRAPS_H */ diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c index fa4ea09593ab..dee9504cde79 100644 --- a/arch/x86/mm/fault.c +++ b/arch/x86/mm/fault.c @@ -1179,6 +1179,19 @@ access_error(unsigned long error_code, struct vm_area_struct *vma) if (error_code & X86_PF_PK) return 1; + /* + * Access is blocked by the Enclave Page Cache Map (EPCM), i.e. the + * access is allowed by the PTE but not the EPCM. This usually happens + * when the EPCM is yanked out from under us, e.g. by hardware after a + * suspend/resume cycle. In any case, software, i.e. the kernel, can't + * fix the source of the fault as the EPCM can't be directly modified by + * software. Handle the fault as an access error in order to signal + * userspace so that userspace can rebuild their enclave(s), even though + * userspace may not have actually violated access permissions. + */ + if (unlikely(error_code & X86_PF_SGX)) + return 1; + /* * Make sure to check the VMA so that we do not perform * faults just to hit a X86_PF_PK as soon as we fill in a -- 2.25.0