Skip to content

Commit 5a90d2c

Browse files
rchatrehansendc
authored andcommitted
x86/sgx: Support adding of pages to an initialized enclave
With SGX1 an enclave needs to be created with its maximum memory demands allocated. Pages cannot be added to an enclave after it is initialized. SGX2 introduces a new function, ENCLS[EAUG], that can be used to add pages to an initialized enclave. With SGX2 the enclave still needs to set aside address space for its maximum memory demands during enclave creation, but all pages need not be added before enclave initialization. Pages can be added during enclave runtime. Add support for dynamically adding pages to an initialized enclave, architecturally limited to RW permission at creation but allowed to obtain RWX permissions after trusted enclave runs EMODPE. Add pages via the page fault handler at the time an enclave address without a backing enclave page is accessed, potentially directly reclaiming pages if no free pages are available. The enclave is still required to run ENCLU[EACCEPT] on the page before it can be used. A useful flow is for the enclave to run ENCLU[EACCEPT] on an uninitialized address. This will trigger the page fault handler that will add the enclave page and return execution to the enclave to repeat the ENCLU[EACCEPT] instruction, this time successful. If the enclave accesses an uninitialized address in another way, for example by expanding the enclave stack to a page that has not yet been added, then the page fault handler would add the page on the first write but upon returning to the enclave the instruction that triggered the page fault would be repeated and since ENCLU[EACCEPT] was not run yet it would trigger a second page fault, this time with the SGX flag set in the page fault error code. This can only be recovered by entering the enclave again and directly running the ENCLU[EACCEPT] instruction on the now initialized address. Accessing an uninitialized address from outside the enclave also triggers this flow but the page will remain inaccessible (access will result in #PF) until accepted from within the enclave via ENCLU[EACCEPT]. Signed-off-by: Reinette Chatre <[email protected]> Signed-off-by: Dave Hansen <[email protected]> Reviewed-by: Jarkko Sakkinen <[email protected]> Tested-by: Jarkko Sakkinen <[email protected]> Tested-by: Haitao Huang <[email protected]> Tested-by: Vijay Dhanraj <[email protected]> Link: https://lkml.kernel.org/r/a254a58eabea053803277449b24b6e4963a3883b.1652137848.git.reinette.chatre@intel.com
1 parent ff08530 commit 5a90d2c

File tree

1 file changed

+117
-0
lines changed

1 file changed

+117
-0
lines changed

arch/x86/kernel/cpu/sgx/encl.c

Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -295,6 +295,112 @@ struct sgx_encl_page *sgx_encl_load_page(struct sgx_encl *encl,
295295
return __sgx_encl_load_page(encl, entry);
296296
}
297297

298+
/**
299+
* sgx_encl_eaug_page() - Dynamically add page to initialized enclave
300+
* @vma: VMA obtained from fault info from where page is accessed
301+
* @encl: enclave accessing the page
302+
* @addr: address that triggered the page fault
303+
*
304+
* When an initialized enclave accesses a page with no backing EPC page
305+
* on a SGX2 system then the EPC can be added dynamically via the SGX2
306+
* ENCLS[EAUG] instruction.
307+
*
308+
* Returns: Appropriate vm_fault_t: VM_FAULT_NOPAGE when PTE was installed
309+
* successfully, VM_FAULT_SIGBUS or VM_FAULT_OOM as error otherwise.
310+
*/
311+
static vm_fault_t sgx_encl_eaug_page(struct vm_area_struct *vma,
312+
struct sgx_encl *encl, unsigned long addr)
313+
{
314+
vm_fault_t vmret = VM_FAULT_SIGBUS;
315+
struct sgx_pageinfo pginfo = {0};
316+
struct sgx_encl_page *encl_page;
317+
struct sgx_epc_page *epc_page;
318+
struct sgx_va_page *va_page;
319+
unsigned long phys_addr;
320+
u64 secinfo_flags;
321+
int ret;
322+
323+
if (!test_bit(SGX_ENCL_INITIALIZED, &encl->flags))
324+
return VM_FAULT_SIGBUS;
325+
326+
/*
327+
* Ignore internal permission checking for dynamically added pages.
328+
* They matter only for data added during the pre-initialization
329+
* phase. The enclave decides the permissions by the means of
330+
* EACCEPT, EACCEPTCOPY and EMODPE.
331+
*/
332+
secinfo_flags = SGX_SECINFO_R | SGX_SECINFO_W | SGX_SECINFO_X;
333+
encl_page = sgx_encl_page_alloc(encl, addr - encl->base, secinfo_flags);
334+
if (IS_ERR(encl_page))
335+
return VM_FAULT_OOM;
336+
337+
mutex_lock(&encl->lock);
338+
339+
epc_page = sgx_alloc_epc_page(encl_page, false);
340+
if (IS_ERR(epc_page)) {
341+
if (PTR_ERR(epc_page) == -EBUSY)
342+
vmret = VM_FAULT_NOPAGE;
343+
goto err_out_unlock;
344+
}
345+
346+
va_page = sgx_encl_grow(encl, false);
347+
if (IS_ERR(va_page))
348+
goto err_out_epc;
349+
350+
if (va_page)
351+
list_add(&va_page->list, &encl->va_pages);
352+
353+
ret = xa_insert(&encl->page_array, PFN_DOWN(encl_page->desc),
354+
encl_page, GFP_KERNEL);
355+
/*
356+
* If ret == -EBUSY then page was created in another flow while
357+
* running without encl->lock
358+
*/
359+
if (ret)
360+
goto err_out_shrink;
361+
362+
pginfo.secs = (unsigned long)sgx_get_epc_virt_addr(encl->secs.epc_page);
363+
pginfo.addr = encl_page->desc & PAGE_MASK;
364+
pginfo.metadata = 0;
365+
366+
ret = __eaug(&pginfo, sgx_get_epc_virt_addr(epc_page));
367+
if (ret)
368+
goto err_out;
369+
370+
encl_page->encl = encl;
371+
encl_page->epc_page = epc_page;
372+
encl_page->type = SGX_PAGE_TYPE_REG;
373+
encl->secs_child_cnt++;
374+
375+
sgx_mark_page_reclaimable(encl_page->epc_page);
376+
377+
phys_addr = sgx_get_epc_phys_addr(epc_page);
378+
/*
379+
* Do not undo everything when creating PTE entry fails - next #PF
380+
* would find page ready for a PTE.
381+
*/
382+
vmret = vmf_insert_pfn(vma, addr, PFN_DOWN(phys_addr));
383+
if (vmret != VM_FAULT_NOPAGE) {
384+
mutex_unlock(&encl->lock);
385+
return VM_FAULT_SIGBUS;
386+
}
387+
mutex_unlock(&encl->lock);
388+
return VM_FAULT_NOPAGE;
389+
390+
err_out:
391+
xa_erase(&encl->page_array, PFN_DOWN(encl_page->desc));
392+
393+
err_out_shrink:
394+
sgx_encl_shrink(encl, va_page);
395+
err_out_epc:
396+
sgx_encl_free_epc_page(epc_page);
397+
err_out_unlock:
398+
mutex_unlock(&encl->lock);
399+
kfree(encl_page);
400+
401+
return vmret;
402+
}
403+
298404
static vm_fault_t sgx_vma_fault(struct vm_fault *vmf)
299405
{
300406
unsigned long addr = (unsigned long)vmf->address;
@@ -314,6 +420,17 @@ static vm_fault_t sgx_vma_fault(struct vm_fault *vmf)
314420
if (unlikely(!encl))
315421
return VM_FAULT_SIGBUS;
316422

423+
/*
424+
* The page_array keeps track of all enclave pages, whether they
425+
* are swapped out or not. If there is no entry for this page and
426+
* the system supports SGX2 then it is possible to dynamically add
427+
* a new enclave page. This is only possible for an initialized
428+
* enclave that will be checked for right away.
429+
*/
430+
if (cpu_feature_enabled(X86_FEATURE_SGX2) &&
431+
(!xa_load(&encl->page_array, PFN_DOWN(addr))))
432+
return sgx_encl_eaug_page(vma, encl, addr);
433+
317434
mutex_lock(&encl->lock);
318435

319436
entry = sgx_encl_load_page_in_vma(encl, addr, vma->vm_flags);

0 commit comments

Comments
 (0)