Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1303937ybt; Thu, 25 Jun 2020 02:51:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxdT4aSqN8OPHhIc07S1R8CLDZtf4g6v/2cW2V0XTOqu4EA+9G1oH7tq20wA/5ZfJHJ0YAE X-Received: by 2002:a17:906:a2d7:: with SMTP id by23mr18458469ejb.226.1593078682533; Thu, 25 Jun 2020 02:51:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593078682; cv=none; d=google.com; s=arc-20160816; b=0+ubPvRFqXvHb5uv0PUBcyxpTGegdfHrj3tuvFKCMMeHCbJ1szzfauIJGP8LxNZgET IC/AHhIe/KHOD/WFG40mHJWYGqnF+WqtIuoF62MAdTQ++/1ULx0C0FgkLEaXnnWp1tmO 3dZPcukhrnr7qTZqtsFBTqRh1bWeSVjzykUp9wTjjItXf2OI6JPDXrqu2M9mg/YOMzWy 3HftAg75un2iNcGGr81vt+md44PogNK4j5WP+wbMfrgfiWlZkMA0PxSoqwEY4CIOqYSW wg2YzQ6PPUF9vg9qHV211ECqJKrylLkZgYDMNLpzg6uwt6Xnz5J1DQ7FfVI0+qmnyaor N5tg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=rObu+L/lbl0DmC4rLxAJmp4yw0uI7VSyZYWkbmQZLlc=; b=HSzwPtFLkQEFoFwMe7yNho5YhGKXYey2wc/oNvltMYuwiV3SqhEXpX4mW5LRZ4VIHl ODyacCehD0SrP+VCLv0nXh1x14iVdKkKV2LgAV7xyAKG3iWh06T+FJ8+wqd+p+RIt1p8 8fHlopuLilgqvPq7v/I1hQq8M1VOi2nmcI1d6P1o7rV4vGcXWID/tJcJpJ1IhJbRCgHx B9Ccyt2u0NLx5VCP7vzhJpH+vGyBIEWR2qP4voFA7Gu4/VI4AlzrQRnvTwISFDbthxPb vDkJ2I7YC0a1tXOFvkSbpnTOOToDPM4sLIf1LglpGFIDW65P6czfkgEwHmj7a2Rznu41 H8gA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=VC01qKk3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cx26si9982014edb.241.2020.06.25.02.50.59; Thu, 25 Jun 2020 02:51:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=VC01qKk3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389695AbgFYI7k (ORCPT + 99 others); Thu, 25 Jun 2020 04:59:40 -0400 Received: from mail.skyhub.de ([5.9.137.197]:59440 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389430AbgFYI7k (ORCPT ); Thu, 25 Jun 2020 04:59:40 -0400 Received: from zn.tnic (p200300ec2f0ed10059a0945b2d1dc694.dip0.t-ipconnect.de [IPv6:2003:ec:2f0e:d100:59a0:945b:2d1d:c694]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 697551EC0220; Thu, 25 Jun 2020 10:59:38 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1593075578; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=rObu+L/lbl0DmC4rLxAJmp4yw0uI7VSyZYWkbmQZLlc=; b=VC01qKk3xbxxEtMBmhvvd3+fZchSJ8r+9RhuLzxkipm0dHSCR6jAeTlRc8SNiPyQfhmU7p InaYXnEYc3ajYiyVS2854IXmr9hMoRB3601Zp6AJ3x9TbCDHhqj8jcGNuqaWyMeaL4U4FN 2Yxq3MCvxUMoVA+IFfoQ2EKG1oaBhD0= Date: Thu, 25 Jun 2020 10:59:31 +0200 From: Borislav Petkov To: Jarkko Sakkinen Cc: x86@kernel.org, linux-sgx@vger.kernel.org, linux-kernel@vger.kernel.org, Sean Christopherson , Jethro Beekman , akpm@linux-foundation.org, andriy.shevchenko@linux.intel.com, asapek@google.com, cedric.xing@intel.com, chenalexchen@google.com, conradparker@google.com, cyhanish@google.com, dave.hansen@intel.com, haitao.huang@intel.com, josh@joshtriplett.org, kai.huang@intel.com, kai.svahn@intel.com, kmoy@google.com, ludloff@google.com, luto@kernel.org, nhorman@redhat.com, npmccallum@redhat.com, puiterwijk@redhat.com, rientjes@google.com, tglx@linutronix.de, yaozhangx@google.com Subject: Re: [PATCH v33 03/21] x86/mm: x86/sgx: Signal SIGSEGV with PF_SGX Message-ID: <20200625085931.GB20319@zn.tnic> References: <20200617220844.57423-1-jarkko.sakkinen@linux.intel.com> <20200617220844.57423-4-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200617220844.57423-4-jarkko.sakkinen@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 18, 2020 at 01:08:25AM +0300, Jarkko Sakkinen wrote: > From: Sean Christopherson > > Include SGX bit to the PF error codes and throw SIGSEGV with PF_SGX when > a #PF with SGX set happens. > > CPU throws a #PF with the SGX bit in the event of Enclave Page Cache Map ^ set > (EPCM) conflict. The EPCM is a CPU-internal table, which describes the > properties for a enclave page. Enclaves are measured and signed software > entities, which SGX hosts. [1] > > Although the primary purpose of the EPCM conflict checks is to prevent > malicious accesses to an enclave, an illegit access can happen also for > legit reasons. > > All SGX reserved memory, including EPCM is encrypted with a transient > key that does not survive from the power transition. Throwing a SIGSEGV > allows user space software react when this happens (e.g. rec-create the ^ to recreate > enclave, which was invalidated). > > [1] Intel SDM: 36.5.1 Enclave Page Cache Map (EPCM) > > Acked-by: Jethro Beekman > Signed-off-by: Sean Christopherson > Signed-off-by: Jarkko Sakkinen > --- > arch/x86/include/asm/traps.h | 1 + > arch/x86/mm/fault.c | 13 +++++++++++++ > 2 files changed, 14 insertions(+) > > diff --git a/arch/x86/include/asm/traps.h b/arch/x86/include/asm/traps.h > index 714b1a30e7b0..ee3617b67bf4 100644 > --- a/arch/x86/include/asm/traps.h > +++ b/arch/x86/include/asm/traps.h > @@ -58,5 +58,6 @@ enum x86_pf_error_code { > X86_PF_RSVD = 1 << 3, > X86_PF_INSTR = 1 << 4, > X86_PF_PK = 1 << 5, > + X86_PF_SGX = 1 << 15, Needs to be added to the doc above it. > #endif /* _ASM_X86_TRAPS_H */ > diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c > index 66be9bd60307..25d48aae36c1 100644 > --- a/arch/x86/mm/fault.c > +++ b/arch/x86/mm/fault.c > @@ -1055,6 +1055,19 @@ access_error(unsigned long error_code, struct vm_area_struct *vma) > if (error_code & X86_PF_PK) > return 1; > > + /* > + * Access is blocked by the Enclave Page Cache Map (EPCM), i.e. the > + * access is allowed by the PTE but not the EPCM. This usually happens > + * when the EPCM is yanked out from under us, e.g. by hardware after a > + * suspend/resume cycle. In any case, software, i.e. the kernel, can't > + * fix the source of the fault as the EPCM can't be directly modified by > + * software. Handle the fault as an access error in order to signal > + * userspace so that userspace can rebuild their enclave(s), even though > + * userspace may not have actually violated access permissions. > + */ Lemme check whether I understand this correctly: userspace must check whether the SIGSEGV is generated on an access to an enclave page? Also, do I see it correctly that when this happens, dmesg will have printk("%s%s[%d]: segfault at %lx ip %px sp %px error %lx", due to: if (likely(show_unhandled_signals)) show_signal_msg(regs, error_code, address, tsk); which does: if (!unhandled_signal(tsk, SIGSEGV)) return; or is the task expected to register a SIGSEGV handler so that the segfault doesn't land in dmesg? If so, are we documenting this? If not, then we should not issue any "segfault" messages to dmesg because that would be wrong. Or maybe I'm not seeing it right but I don't have the hardware to test this out... Thx. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette