Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1072407pxb; Sat, 15 Jan 2022 02:07:36 -0800 (PST) X-Google-Smtp-Source: ABdhPJwDa1eDJvUIZeuNWat97RJEFVryTm0I7ffLnvmkmOPMiUNK+D+wSWYdVTMRMhtPc5IVvolL X-Received: by 2002:a17:902:8f96:b0:149:a84:e63d with SMTP id z22-20020a1709028f9600b001490a84e63dmr12956766plo.83.1642241255960; Sat, 15 Jan 2022 02:07:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642241255; cv=none; d=google.com; s=arc-20160816; b=e3ZLPyRoOqrbKUi3mbm9nfk8MFmHm4XMlzQClW/mX4dBLDgkZuURo8hyVhUlUJ9WRE I13e8oL0rwqwLcvLO7qyPhkHUrHauExrB9gk7BvIofv490PGHfyKMTdfmHVBpt+r3DAr H78t2zdL0559bRugv2mB8Y5rHPwzb1ynakBML2JIJ4aCgX6WD/q5IBiRsSDd10Tz8OFW ATSqRY6JxI5KhDx47v7+aV9ClRhfmHVBEqRTU5laSiDaXegUlHCkc1qQ7zkj98ZRUhER opHdo0n4LMgaxj576j7gvEyfUpyeZao9WwYYZk5vEKekALgy2IG4veyLkm+P5azX70Uk Vggg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=0R1kos1nkIWpRDbI5icTDtPteRI72Kb+QoeegtsZOnM=; b=SMPSszWA5ZS/evWnDaSs9qpsL5FaZlTamh6LuBupHeAil9Ie3QQ1cNzwY2EIQADThP UFiCT4fEBtRnp3IFFD3VtyjgpuZRLhlq9KPgwgkOW2/UvDAtSuv6mecH0ohusAng/W1t FyrnYurQT3MvTxkjU7bnzBd7XIxUh1Ck7H6YjRWciy38XEVwXNS1Nx9gmF5rtQUWLdW3 XZekERc0+TaSaOK9HLdI6/aWQPKcOBwx8bNsvK/39rUcgrFq5XlUCgS74YPYEaVOPQpr lVU13y0ioIz3ghAYYGlLzH32yAE70fEWGlKJ8lsYdgsHoSUbYyNuPDd5i5MmnpI8M29m Xpug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pytUqLhC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 135si8246720pgb.658.2022.01.15.02.07.24; Sat, 15 Jan 2022 02:07:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pytUqLhC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231544AbiAOA1g (ORCPT + 99 others); Fri, 14 Jan 2022 19:27:36 -0500 Received: from dfw.source.kernel.org ([139.178.84.217]:49344 "EHLO dfw.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230474AbiAOA1f (ORCPT ); Fri, 14 Jan 2022 19:27:35 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 814F4620A6; Sat, 15 Jan 2022 00:27:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 68A30C36AE9; Sat, 15 Jan 2022 00:27:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1642206454; bh=hlK7A7JLCpy3UKbMBHbhsr7ctTmoSDrVLCFh2Sh/GyM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=pytUqLhCXWQsEp8FfU5STjvL+hX2lEn98MyYCGwuZbaKM3A6qtL+/xHSytHPRm197 j48DzhjGTM6fcmrVFK4EJHX+vu0VfBUbCqEU3TdbG+ug2vzbXzlJcp5Qo/2PQU1hVs A93NizF8LralQTbwYKSNreIZnPvCZGLP9Z2pDnNrtHVgUshX62/tRdJoRy0Vjpv0IC H3dwUrmMbiParYuCsgKUamZ5TsRfu1BZOdW8XwVsZyXykg3dl6pEdS4mD59j4+TbUd 92MQGNaPVxNZSGpTdEwcoqYAVB8zCOJzvyfsIY7ORyamt1dvJ3SpJwfgsoTOtn+C/T 0jhBr9lrGAedQ== Date: Sat, 15 Jan 2022 02:27:21 +0200 From: Jarkko Sakkinen To: Reinette Chatre Cc: Nathaniel McCallum , Haitao Huang , Andy Lutomirski , dave.hansen@linux.intel.com, tglx@linutronix.de, bp@alien8.de, mingo@redhat.com, linux-sgx@vger.kernel.org, x86@kernel.org, seanjc@google.com, kai.huang@intel.com, cathy.zhang@intel.com, cedric.xing@intel.com, haitao.huang@intel.com, mark.shanahan@intel.com, hpa@zytor.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits Message-ID: References: <4195402f-cbf9-bc75-719d-22cea8e36e60@intel.com> <168fb2c9-de3f-384a-bb17-ab84db2cf533@intel.com> <6e1cb295-b86e-ae09-2cf0-cfefd1a10e65@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6e1cb295-b86e-ae09-2cf0-cfefd1a10e65@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 14, 2022 at 04:01:33PM -0800, Reinette Chatre wrote: > Hi Jarkko, > > On 1/14/2022 3:15 PM, Jarkko Sakkinen wrote: > > On Fri, Jan 14, 2022 at 03:05:21PM -0800, Reinette Chatre wrote: > >> Hi Jarkko, > > > > How enclave can check a page range that EPCM has the expected permissions? > > Only way to change EPCM permissions from outside enclave is to run ENCLS[EMODPR] > that needs to be accepted from within the enclave via ENCLU[EACCEPT]. At that > time the enclave provides the expected permissions and that will fail > if there is a mismatch with the EPCM permissions (SGX_PAGE_ATTRIBUTES_MISMATCH). This is a very valid point but that does make the introspection possible only at the time of EACCEPT. It does not give tools for enclave to make sure that EMODPR-ETRACK dance was ever exercised. /Jarkko