Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp589346pxk; Thu, 24 Sep 2020 13:06:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxyryB2jwhXuhL6wGRQzBrYotIHln1Qwgx6rm2f43lRlCMr/l484cDjprpZVLZtBYFWBxXI X-Received: by 2002:a17:906:b28d:: with SMTP id q13mr326415ejz.378.1600978011784; Thu, 24 Sep 2020 13:06:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600978011; cv=none; d=google.com; s=arc-20160816; b=Y5S160Acx150PDkUORB18umCKzRKUJBCwWz9ZnnEIpihny7l1+PPm93AtnsSsQcIh0 kI/NiSZsCfUl0Wut4bJCDIIXQ9NOPdahRtp6lmkLz/rE9qROu27njTyDFV/PjUAf5owk Uulboz7jiyoKGBV+eqGxM9TfJpJVPw9yKpj68v0UeiOUo4XOUxTQMaVE/wP2Fpj1mfdf XvCZ9u3bUQj+H0ySA68ZjFl6hGQOqEeqqc3RM5HiJ7GeH+FIhEuQTbpaOGWM7J3CdFTW DS31tZ99YZ1+qGX2l0KSZAucb/cSwFMbxTfosmC2UsSsVP5kQVUyMe/JsX54gpFnQvV/ ABLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :ironport-sdr:ironport-sdr; bh=GTvM93Buk9BmEpEkWD0b6l+OYyiEf68wZfYyTNY8ybY=; b=IvDNqZfkD8UKDWklkHH2BwWdYC/HSesfG5MgLj6u6sHajL6+5QxiFlvF4z99dhg3ls 77jL02Bjw1oYamLDJgfz5lEzEG6wON3NG9VmGQM0bWYc57sui8GKu9J5mgZcjcvTRsC3 4WdN6OZLAYxbv75WhPbWpmPyasyg/VesOwPj3X0ZC8crAXTvWR4dOBaPAzKOzgxxofFk Mb/55ucmZtV/Fta7kCLD9mkyaphf0z2SYYoKLzOEwJDDzuO1AP20rzcNbBLoNQkShgim O7F5BLC7JL8IbdfUNtR1Dluc35O9hFRR+kjiUPNUFiMfIKxGp0oJu2scez3uhcdza7r3 ouqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n15si433099eje.173.2020.09.24.13.06.28; Thu, 24 Sep 2020 13:06:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726397AbgIXUCF (ORCPT + 99 others); Thu, 24 Sep 2020 16:02:05 -0400 Received: from mga05.intel.com ([192.55.52.43]:51296 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726037AbgIXUCF (ORCPT ); Thu, 24 Sep 2020 16:02:05 -0400 IronPort-SDR: RhDNDJDch2FiKGu5OrZuuZkZ8LZMR/SX9Xqww9ivDvvvwN0LxFweTgCh00CFAVlHtm323bG/Nt 38pttPG7oAqg== X-IronPort-AV: E=McAfee;i="6000,8403,9754"; a="246136004" X-IronPort-AV: E=Sophos;i="5.77,299,1596524400"; d="scan'208";a="246136004" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Sep 2020 13:01:58 -0700 IronPort-SDR: xPsthE/BSH1LRuZED06CxuzJbuNC+7hL54fu/LRloHKfq0y4iE/8EwOu9ok9QwRfaer0dI4PlI LDTge9KmZvIQ== X-IronPort-AV: E=Sophos;i="5.77,299,1596524400"; d="scan'208";a="511757770" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.160]) by fmsmga006-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Sep 2020 13:01:57 -0700 Date: Thu, 24 Sep 2020 13:01:56 -0700 From: Sean Christopherson To: Dave Hansen Cc: Haitao Huang , Jarkko Sakkinen , Andy Lutomirski , X86 ML , linux-sgx@vger.kernel.org, LKML , Linux-MM , Andrew Morton , Matthew Wilcox , Jethro Beekman , Darren Kenny , Andy Shevchenko , asapek@google.com, Borislav Petkov , "Xing, Cedric" , chenalexchen@google.com, Conrad Parker , cyhanish@google.com, "Huang, Haitao" , Josh Triplett , "Huang, Kai" , "Svahn, Kai" , Keith Moyer , Christian Ludloff , Neil Horman , Nathaniel McCallum , Patrick Uiterwijk , David Rientjes , Thomas Gleixner , yaozhangx@google.com Subject: Re: [PATCH v38 10/24] mm: Add vm_ops->mprotect() Message-ID: <20200924200156.GA19127@linux.intel.com> References: <20200921165758.GA24156@linux.intel.com> <20200921210736.GB58176@linux.intel.com> <20200921211849.GA25403@linux.intel.com> <20200922052957.GA97272@linux.intel.com> <20200922053515.GA97687@linux.intel.com> <20200922164301.GB30874@linux.intel.com> <20200923135056.GD5160@linux.intel.com> <20200924192853.GA18826@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 24, 2020 at 12:39:24PM -0700, Dave Hansen wrote: > On 9/24/20 12:28 PM, Sean Christopherson wrote: > > On Thu, Sep 24, 2020 at 02:11:37PM -0500, Haitao Huang wrote: > >> On Wed, 23 Sep 2020 08:50:56 -0500, Jarkko Sakkinen > >> wrote: > >>> I'll categorically deny noexec in the next patch set version. > >>> > >>> /Jarkko > >> There are use cases supported currently in which enclave binary is received > >> via IPC/RPC and held in buffers before EADD. Denying noexec altogether would > >> break those, right? > > No. noexec only applies to file-backed VMAs, what you're describing is loading > > an enclave from an anon VMA, which will still have VM_MAYEXEC. > > Maybe I'm just stupid, but I still don't get the scenario that's being > thwarted or why it is valuable. The SDM is worthless on what EMODPE > does or what its restrictions are. > > In pseudo-C, it's something logically like this for the "nice" case: > > ptr = mmap("/some/executable", PROT_EXEC); > ioctl(sgx_fd, ADD_ENCLAVE_PAGE, SGX_PROT_EXEC, ptr, size); > mmap(sgx_fd); > EENTER; > > And we're trying to thwart: > > ptr = mmap("/mnt/noexec/file", PROT_READ); > ioctl(sgx_fd, ADD_ENCLAVE_PAGE, SGX_PROT_EXEC, ptr, size); > mmap(sgx_fd); > EENTER; > > because that loads data into the enclave which is executable but which > was not executable normally. But, we're allowing this from anonymous > memory, so this would seem to work: > > ptr = mmap("/mnt/noexec/file", PROT_READ); > buffer = malloc(PAGE_SIZE); > memcpy(buffer, ptr, PAGE_SIZE); > // need mprotect(buf, PROT_EXEC)??? > ioctl(sgx_fd, ADD_ENCLAVE_PAGE, SGX_PROT_EXEC, buffer, size); > mmap(sgx_fd); > EENTER; > > and give the same result. What am I missing? The last example, where the enclave is copied to a buffer, is out of scope for noexec. But, it is in scope for LSMs, e.g. for this last example, we could add an LSM upcall so that SELinux could require PROCESS_EXECMEM (or an SGX specific equivalent). The ->mprotect() hook gives us direct line of sight to such LSM upcalls, e.g. I have fully working code that implements the LSM integration. LSM support isn't in this series because the only thing everyone could agree on in terms of an LSM implementation is that it wasn't needed for initial upstreaming :-)