From: "Zhang, Cathy" <cathy.zhang@intel.com>
To: Jarkko Sakkinen <jarkko@kernel.org>
Cc: "linux-sgx@vger.kernel.org" <linux-sgx@vger.kernel.org>,
"x86@kernel.org" <x86@kernel.org>,
"Chatre, Reinette" <reinette.chatre@intel.com>,
"Hansen, Dave" <dave.hansen@intel.com>,
"Raj, Ashok" <ashok.raj@intel.com>,
"Peng, Chao P" <chao.p.peng@intel.com>,
"Zhong, Yang" <yang.zhong@intel.com>
Subject: RE: [PATCH v4 5/9] x86/sgx: Forced EPC page zapping for EUPDATESVN
Date: Sun, 24 Apr 2022 02:32:34 +0000 [thread overview]
Message-ID: <2682d32989ea40578065b2c14ef20b19@intel.com> (raw)
In-Reply-To: <YmGBNNg05HcnUJBR@kernel.org>
> -----Original Message-----
> From: Jarkko Sakkinen <jarkko@kernel.org>
> Sent: Friday, April 22, 2022 12:07 AM
> To: Zhang, Cathy <cathy.zhang@intel.com>
> Cc: linux-sgx@vger.kernel.org; x86@kernel.org; Chatre, Reinette
> <reinette.chatre@intel.com>; Hansen, Dave <dave.hansen@intel.com>; Raj,
> Ashok <ashok.raj@intel.com>; Peng, Chao P <chao.p.peng@intel.com>;
> Zhong, Yang <yang.zhong@intel.com>
> Subject: Re: [PATCH v4 5/9] x86/sgx: Forced EPC page zapping for
> EUPDATESVN
>
> On Thu, Apr 21, 2022 at 07:03:22PM +0800, Cathy Zhang wrote:
> > Before an EUPDATESVN instruction can be successful, all enclave pages
> > (EPC) must be marked as unused in the SGX hardware metadata (EPCM).
> >
> > A page becomes unused when an issued EREMOVE instruction succeeds.
> > To prepare for EUPDATESVN, loop over all SGX pages and attempt to
> > EREMOVE them. This is fatal to running enclaves and destroys all
> > enclave state and memory contents. This destruction is by design and
> > mitigates any compromise of enclaves or the SGX hardware itself which
> > occurred before the microcode update.
> >
> > An EREMOVE operation on a page may fail for a few reasons. Each has
> > its own mitigations.
> >
> > First, EREMOVE will fail if an enclave that uses the page is
> > executing. Send an IPI to all CPUs that might be running the enclave
> > to force it out of the enclave long enough to EREMOVE the page. Other
> > CPUs might enter the enclave in the meantime, so this is not a
> > rock-solid guarantee.
> >
> > Second, EREMOVE can fail on special SGX metadata pages, such as SECS.
> > EREMOVE will work on them only after the normal SGX pages that depend
> > on them have been EREMOVE'd. Defer handling those pages and repeat
> > EREMOVE after the dependency has been addressed.
> >
> > Signed-off-by: Cathy Zhang <cathy.zhang@intel.com>
> >
> > ---
> > Changes since v3:
> > - Rename SGX_EPC_PAGE_GUEST as SGX_EPC_PAGE_KVM_GUEST
> (Suggested by
> > Jarkko Sakkinen)
> > - Remove "VA" from sentence "Second, EREMOVE can fail on special SGX
> > metadata...", for except concurrency rules, only SECS pages might
> > be EREMOVEd failed and will be tracked for a deferred handling.
> > (Suggested by Jarkko Sakkinen)
> > ---
> > arch/x86/kernel/cpu/sgx/sgx.h | 13 ++
> > arch/x86/kernel/cpu/sgx/encl.c | 14 +-
> > arch/x86/kernel/cpu/sgx/main.c | 347
> +++++++++++++++++++++++++++++++++
> > 3 files changed, 373 insertions(+), 1 deletion(-)
> >
> > diff --git a/arch/x86/kernel/cpu/sgx/sgx.h
> > b/arch/x86/kernel/cpu/sgx/sgx.h index 775477e0b8af..d90532957181
> > 100644
> > --- a/arch/x86/kernel/cpu/sgx/sgx.h
> > +++ b/arch/x86/kernel/cpu/sgx/sgx.h
> > @@ -32,6 +32,17 @@
> > #define SGX_EPC_PAGE_VA BIT(2)
> > /* Pages allocated for KVM guest */
> > #define SGX_EPC_PAGE_KVM_GUEST BIT(3)
> > +/*
> > + * Pages, failed to be zapped (EREMOVED)
> > + * by SGX CPUSVN update process.
> > + */
> > +#define SGX_EPC_PAGE_ZAP_TRACKED BIT(4)
> > +/*
> > + * Pages, the associated enclave is being
> > + * released while SGX CPUSVN update is
> > + * running.
> > + */
> > +#define SGX_EPC_PAGE_IN_RELEASE BIT(5)
> >
> > struct sgx_epc_page {
> > unsigned int section;
> > @@ -110,5 +121,7 @@ void sgx_update_lepubkeyhash(u64
> *lepubkeyhash);
> >
> > extern struct srcu_struct sgx_lock_epc_srcu; bool
> > sgx_epc_is_locked(void);
> > +void sgx_zap_wakeup(void);
> > +void sgx_zap_abort(void);
> >
> > #endif /* _X86_SGX_H */
> > diff --git a/arch/x86/kernel/cpu/sgx/encl.c
> > b/arch/x86/kernel/cpu/sgx/encl.c index a01a72637e2e..be177a5e3292
> > 100644
> > --- a/arch/x86/kernel/cpu/sgx/encl.c
> > +++ b/arch/x86/kernel/cpu/sgx/encl.c
> > @@ -457,6 +457,12 @@ void sgx_encl_release(struct kref *ref)
> > WARN_ON_ONCE(encl->secs_child_cnt);
> > WARN_ON_ONCE(encl->secs.epc_page);
> >
> > + /*
> > + * EPC pages were freed and EREMOVE was executed. Wake
> > + * up any zappers which were waiting for this.
> > + */
> > + sgx_zap_wakeup();
> > +
> > kfree(encl);
> > }
> >
> > @@ -840,8 +846,14 @@ void sgx_encl_free_epc_page(struct sgx_epc_page
> *page)
> > WARN_ON_ONCE(page->flags &
> SGX_EPC_PAGE_RECLAIMER_TRACKED);
> >
> > ret = __eremove(sgx_get_epc_virt_addr(page));
> > - if (WARN_ONCE(ret, EREMOVE_ERROR_MESSAGE, ret, ret))
> > + if (WARN_ONCE(ret, EREMOVE_ERROR_MESSAGE, ret, ret)) {
> > + /*
> > + * The EREMOVE failed. If a CPUSVN is in progress,
> > + * it is now expected to fail. Notify it.
> > + */
> > + sgx_zap_abort();
> > return;
> > + }
> >
> > sgx_free_epc_page(page);
> > }
> > diff --git a/arch/x86/kernel/cpu/sgx/main.c
> > b/arch/x86/kernel/cpu/sgx/main.c index 031c1402cd7e..72317866ddaa
> > 100644
> > --- a/arch/x86/kernel/cpu/sgx/main.c
> > +++ b/arch/x86/kernel/cpu/sgx/main.c
> > @@ -34,6 +34,16 @@ static bool __rcu sgx_epc_locked;
> > * will be prevented from starting during an SVN update.
> > */
> > DEFINE_SRCU(sgx_lock_epc_srcu);
> > +static DECLARE_WAIT_QUEUE_HEAD(sgx_zap_waitq);
> > +
> > +/* The flag means to abort the SGX CPUSVN update process */ static
> > +bool sgx_zap_abort_wait;
> > +/*
> > + * Track the number of SECS and VA pages associated with enclaves
> > + * in releasing. SGX CPUSVN update will wait for them EREMOVEd by
> > + * enclave exiting process.
> > + */
> > +static atomic_t zap_waiting_count;
> >
> > /*
> > * These variables are part of the state of the reclaimer, and must
> > be accessed @@ -636,6 +646,24 @@ void sgx_free_epc_page(struct
> > sgx_epc_page *page)
> >
> > spin_lock(&node->lock);
> >
> > + /*
> > + * The page is EREMOVEd, stop tracking it
> > + * as a deferred target for CPUSVN update
> > + * process.
> > + */
> > + if ((page->flags & SGX_EPC_PAGE_ZAP_TRACKED) &&
> > + (!list_empty(&page->list)))
> > + list_del(&page->list);
> > +
> > + /*
> > + * The page is EREMOVEd, decrease
> > + * "zap_waiting_count" to stop counting it
> > + * as a waiting target for CPUSVN update
> > + * process.
> > + */
> > + if (page->flags & SGX_EPC_PAGE_IN_RELEASE)
> > + atomic_dec_if_positive(&zap_waiting_count);
> > +
> > page->owner = NULL;
> > if (page->poison)
> > list_add(&page->list, &node->sgx_poison_page_list); @@ -
> 1010,3
> > +1038,322 @@ bool sgx_epc_is_locked(void)
> > lockdep_assert_held(&sgx_lock_epc_srcu);
> > return sgx_epc_locked;
> > }
> > +
> > +/**
> > + * sgx_zap_encl_page - unuse one EPC page
> > + * @section: EPC section
> > + * @epc_page: EPC page
> > + * @secs_pages_list: list to trac SECS pages failed to be EREMOVEd
> > + *
> > + * Zap an EPC page if it's used by an enclave.
> > + *
> > + * Returns:
> > + * 0: EPC page is unused or EREMOVE succeeds.
> > + * -EBUSY: EREMOVE failed for other threads executing
> > + * in enclave.
>
> Do you need two lines for this? The limit is 100 characters per line.
Changed the annotate for *-EBUSY* as one line in the three sgx_zap_* functions.
>
> > + * -EIO: Other EREMOVE failures, like EPC leaks.
> > + */
> > +static int sgx_zap_encl_page(struct sgx_epc_section *section,
> > + struct sgx_epc_page *epc_page,
> > + struct list_head *secs_pages_list) {
> > + struct sgx_encl *encl;
> > + struct sgx_encl_page *encl_page;
> > + struct sgx_va_page *va_page;
> > + int retry_count = 10;
> > + int ret = 0;
> > +
> > + /*
> > + * Holding the per-section lock to ensure the
> > + * "owner" field will not be cleared while
> > + * checking.
> > + */
> > + spin_lock(§ion->node->lock);
> > +
> > + /*
> > + * The "owner" field is NULL, it means the page
> > + * is unused.
> > + */
> > + if (!epc_page->owner) {
> > + spin_unlock(§ion->node->lock);
> > + return 0;
> > + }
> > +
> > + if (epc_page->flags & SGX_EPC_PAGE_VA) {
> > + va_page = epc_page->owner;
> > + encl = va_page->encl;
> > + } else {
> > + encl_page = epc_page->owner;
> > + encl = encl_page->encl;
> > + }
> > +
> > + if (!encl) {
> > + spin_unlock(§ion->node->lock);
> > + /*
> > + * The page has owner, but without an Enclave
> > + * associated with. This might be caused by
> > + * EPC leaks happen in enclave's release path.
> > + */
> > + ret = __eremove(sgx_get_epc_virt_addr(epc_page));
> > + if (WARN_ONCE(ret, EREMOVE_ERROR_MESSAGE, ret, ret))
> > + ret = -EIO;
> > + else
> > + sgx_free_epc_page(epc_page);
> > + return ret;
> > + }
> > +
> > + /*
> > + * Wait for any enclave already being released to complete
> > + * but prevent any additional enclave from starting release
> > + * while we operate on it.
> > + */
> > + if (!kref_get_unless_zero(&encl->refcount)) {
> > +
> > + /*
> > + * The enclave is exiting. The EUPDATESVN
> > + * procedure needs to wait for the EREMOVE
> > + * operation which happens as a part of
> > + * the enclave exit operation. Use
> > + * "zap_waiting_count" to indicate to the
> > + * EUPDATESVN code when it needs to wait.
> > + */
> > + if (((epc_page->flags & SGX_EPC_PAGE_VA) ||
> > + (encl_page->type == SGX_PAGE_TYPE_SECS)) &&
> > + !(epc_page->flags & SGX_EPC_PAGE_IN_RELEASE)) {
> > + atomic_inc(&zap_waiting_count);
> > + epc_page->flags |= SGX_EPC_PAGE_IN_RELEASE;
> > + }
> > +
> > + spin_unlock(§ion->node->lock);
> > + return 0;
> > + }
> > +
> > + spin_unlock(§ion->node->lock);
> > +
> > + /*
> > + * This EREMOVE has two main purposes:
> > + * 1. Getting EPC pages into the "unused" state.
> > + * Every EPC page must be unused before an
> > + * EUPDATESVN can be succeed.
> > + * 2. Forcing enclaves to exit more frequently.
> > + * EREMOVE will not succeed while any thread is
> > + * running in the enclave. Every successful
> > + * EREMOVE increases the chance that an enclave
> > + * will trip over this page, fault, and exit.
> > + * This, in turn, increases the likelihood of
> > + * success for every future EREMOVE attempt.
> > + */
> > + ret = __eremove(sgx_get_epc_virt_addr(epc_page));
> > +
> > + if (!ret) {
> > + /*
> > + * The SECS page is EREMOVEd successfully this time.
> > + * Remove it from the list to stop tracking it.
> > + */
> > + if ((epc_page->flags & SGX_EPC_PAGE_ZAP_TRACKED) &&
> > + !list_empty(&epc_page->list)) {
> > + list_del_init(&epc_page->list);
> > + epc_page->flags &= ~SGX_EPC_PAGE_ZAP_TRACKED;
> > + }
> > + goto out;
> > + }
> > +
> > + if (ret == SGX_CHILD_PRESENT) {
> > + /*
> > + * The SECS page is failed to be EREMOVEd due
> > + * to associations. Add it to "secs_pages_list"
> > + * for deferred handling.
> > + */
> > + if (!(epc_page->flags & SGX_EPC_PAGE_ZAP_TRACKED) &&
> > + secs_pages_list) {
> > + epc_page->flags |= SGX_EPC_PAGE_ZAP_TRACKED;
> > + list_add_tail(&epc_page->list, secs_pages_list);
> > + }
> > + ret = 0;
> > + goto out;
> > + }
> > +
> > + if (ret) {
> > + /*
> > + * EREMOVE will fail on a page if the owning
> > + * enclave is executing. An IPI will cause the
> > + * enclave to exit, providing an opportunity to
> > + * EREMOVE the page, but it does not guarantee
> > + * the page will be EREMOVEd successfully. Retry
> > + * for several times, if it keeps on failing,
> > + * return -EBUSY to notify userspace for retry.
> > + */
> > + do {
> > + on_each_cpu_mask(sgx_encl_cpumask(encl),
> sgx_ipi_cb, NULL, true);
> > + ret = __eremove(sgx_get_epc_virt_addr(epc_page));
> > + if (!ret)
> > + break;
> > + retry_count--;
> > + } while (retry_count);
> > +
> > + if (ret)
> > + ret = -EBUSY;
> > + }
> > +
> > +out:
> > + kref_put(&encl->refcount, sgx_encl_release);
> > + return ret;
> > +}
> > +
> > +/**
> > + * sgx_zap_section_pages - unuse one EPC section's pages
> > + * @section: EPC section
> > + * @secs_pages_list: list to track SECS pages failed to be EREMOVEd
> > + *
> > + * Iterate through pages in one EPC section, unuse the pages
> > + * initialized for enclaves on bare metal.
> > + *
> > + * TODO: EPC pages for KVM guest will be handled in future.
> > + *
> > + * Returns:
> > + * 0: EPC page is unused.
> > + * -EBUSY: EREMOVE failed for other threads executing
> > + * in enclave.
> > + * -EIO: Other EREMOVE failures, like EPC leaks.
> > + */
> > +static int sgx_zap_section_pages(struct sgx_epc_section *section,
> > + struct list_head *secs_pages_list) {
> > + struct sgx_epc_page *epc_page;
> > + int i, ret = 0;
> > + unsigned long nr_pages = section->size >> PAGE_SHIFT;
> > +
> > + for (i = 0; i < nr_pages; i++) {
> > + epc_page = §ion->pages[i];
> > +
> > + /*
> > + * EPC page has "NULL" owner, indicating
> > + * it's unused. No action required for
> > + * this case.
> > + *
> > + * No new owner can be assigned when SGX
> > + * is "frozen".
> > + */
> > + if (!epc_page->owner)
> > + continue;
> > +
> > + /*
> > + * Try to "unuse" all SGX memory used by enclaves
> > + * on bare-metal.
> > + *
> > + * Failures might be caused by the following reasons:
> > + * 1. EREMOVE failure due to other threads executing
> > + * in enclave. Return -EBUSY to notify userspace
> > + * for a later retry.
> > + * 2. Other EREMOVE failures. For example, a bug in
> > + * SGX memory management like a leak that lost
> > + * track of an SGX EPC page. Upon these failures,
> > + * do not even attempt EUPDATESVN.
> > + */
> > + if (!(epc_page->flags & SGX_EPC_PAGE_KVM_GUEST)) {
> > + ret = sgx_zap_encl_page(section, epc_page,
> secs_pages_list);
> > + if (ret)
> > + return ret;
> > + }
> > + }
> > +
> > + return ret;
> > +}
> > +
> > +/**
> > + * sgx_zap_pages - unuse all EPC sections' pages
> > + *
> > + * Context: This function is called while microcode_mutex lock
> > + * is held by the caller, it ensures that the update
> > + * process will not run concurrently.
> > + *
> > + * Returns:
> > + * 0: All enclaves have been torn down and
> > + * all EPC pages are unused.
> > + * -ERESTARTSYS: Interrupted by a signal.
> > + * -EBUSY: EREMOVE failed for other threads executing
> > + * in enclave.
> > + * -EIO: Other EREMOVE failures, like EPC leaks.
> > + */
> > +static int sgx_zap_pages(void)
> > +{
> > + struct sgx_epc_page *epc_page, *tmp;
> > + struct sgx_epc_section *section;
> > + int i, ret = 0;
> > +
> > + LIST_HEAD(secs_pages_list);
> > +
> > + for (i = 0; i < ARRAY_SIZE(sgx_epc_sections); i++) {
> > + section = &sgx_epc_sections[i];
> > + if (!section->pages)
> > + break;
> > + /*
> > + * Go through the section's pages and try to EREMOVE
> > + * each one, except the ones associated with enclaves
> > + * in releasing.
> > + */
> > + ret = sgx_zap_section_pages(section, &secs_pages_list);
> > + if (WARN_ON_ONCE(ret))
> > + goto out;
> > + }
> > +
> > + /*
> > + * The SECS page should have no associations now, try
> > + * EREMOVE them again.
> > + */
> > + list_for_each_entry_safe(epc_page, tmp, &secs_pages_list, list) {
> > + section = &sgx_epc_sections[epc_page->section];
> > + ret = sgx_zap_encl_page(section, epc_page, NULL);
> > + if (ret)
> > + goto out;
> > + }
> > +
> > + /*
> > + * There might be pages in the process of being freed
> > + * by exiting enclaves. Wait for the exiting process
> > + * to succeed or fail.
> > + */
> > + ret = wait_event_interruptible(sgx_zap_waitq,
> > + (!atomic_read(&zap_waiting_count) ||
> > + sgx_zap_abort_wait));
> > + if (ret == -ERESTARTSYS) {
> > + pr_err("CPUSVN update is not finished yet, but killed by
> userspace\n");
> > + goto out;
> > + }
> > +
> > + if (sgx_zap_abort_wait) {
> > + ret = -EIO;
> > + pr_err("exit-side EREMOVE failure. Aborting CPUSVN
> update\n");
> > + goto out;
> > + }
> > +
> > +out:
> > + return ret;
> > +}
> > +
> > +/**
> > + * sgx_zap_wakeup - wake up CPUSVN update process
> > + *
> > + * Whenever enclave is freed, this function will
> > + * be called to check if all EPC pages are unused.
> > + * Wake up the CPUSVN update process if it's true.
> > + */
> > +void sgx_zap_wakeup(void)
> > +{
> > + if (wq_has_sleeper(&sgx_zap_waitq) &&
> > + !atomic_read(&zap_waiting_count))
> > + wake_up(&sgx_zap_waitq);
> > +}
> > +
> > +/**
> > + * sgx_zap_abort - abort SGX CPUSVN update process
> > + *
> > + * When EPC leaks happen in enclave release process,
> > + * it will set flag sgx_zap_abort_wait as true to
> > + * abort the CPUSVN update process.
> > + */
> > +void sgx_zap_abort(void)
> > +{
> > + sgx_zap_abort_wait = true;
> > + wake_up(&sgx_zap_waitq);
> > +}
> > --
> > 2.17.1
> >
>
> BR, Jarkko
next prev parent reply other threads:[~2022-04-24 2:32 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-04-21 11:03 [PATCH v4 0/9] Support microcode updates affecting SGX Cathy Zhang
2022-04-21 11:03 ` [PATCH v4 1/9] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages Cathy Zhang
2022-04-21 16:02 ` Jarkko Sakkinen
2022-04-24 2:27 ` Zhang, Cathy
2022-04-25 14:00 ` Jarkko Sakkinen
2022-04-21 11:03 ` [PATCH v4 2/9] x86/sgx: Save enclave pointer for VA page Cathy Zhang
2022-04-21 16:04 ` Jarkko Sakkinen
2022-04-24 2:31 ` Zhang, Cathy
2022-04-21 11:03 ` [PATCH v4 3/9] x86/sgx: Keep record for SGX VA and Guest page type Cathy Zhang
2022-04-21 11:03 ` [PATCH v4 4/9] x86/sgx: Save the size of each EPC section Cathy Zhang
2022-04-21 11:03 ` [PATCH v4 5/9] x86/sgx: Forced EPC page zapping for EUPDATESVN Cathy Zhang
2022-04-21 16:07 ` Jarkko Sakkinen
2022-04-24 2:32 ` Zhang, Cathy [this message]
2022-04-21 11:03 ` [PATCH v4 6/9] x86/sgx: Define error codes for ENCLS[EUPDATESVN] Cathy Zhang
2022-04-21 11:03 ` [PATCH v4 7/9] x86/sgx: Implement ENCLS[EUPDATESVN] Cathy Zhang
2022-04-21 11:03 ` [PATCH v4 8/9] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update Cathy Zhang
2022-04-21 12:07 ` Borislav Petkov
2022-04-24 2:18 ` Zhang, Cathy
2022-04-21 11:03 ` [PATCH v4 9/9] x86/sgx: Call ENCLS[EUPDATESVN] during SGX initialization Cathy Zhang
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2682d32989ea40578065b2c14ef20b19@intel.com \
--to=cathy.zhang@intel.com \
--cc=ashok.raj@intel.com \
--cc=chao.p.peng@intel.com \
--cc=dave.hansen@intel.com \
--cc=jarkko@kernel.org \
--cc=linux-sgx@vger.kernel.org \
--cc=reinette.chatre@intel.com \
--cc=x86@kernel.org \
--cc=yang.zhong@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox