summarylogtreecommitdiffstats
path: root/0027-selftests-sgx-Test-complete-changing-of-page-type-fl.patch
diff options
context:
space:
mode:
authorJarkko Sakkinen2022-03-11 17:28:30 +0200
committerJarkko Sakkinen2022-03-11 17:42:24 +0200
commit126c8eac9f839cef29c96d9e0db11192ad6713f8 (patch)
treefa4ebec9dad95123dfc50fe7757056fa0f66c12a /0027-selftests-sgx-Test-complete-changing-of-page-type-fl.patch
downloadaur-126c8eac9f839cef29c96d9e0db11192ad6713f8.tar.gz
Epoch
Signed-off-by: Jarkko Sakkinen <jarkko@profian.com>
Diffstat (limited to '0027-selftests-sgx-Test-complete-changing-of-page-type-fl.patch')
-rw-r--r--0027-selftests-sgx-Test-complete-changing-of-page-type-fl.patch451
1 files changed, 451 insertions, 0 deletions
diff --git a/0027-selftests-sgx-Test-complete-changing-of-page-type-fl.patch b/0027-selftests-sgx-Test-complete-changing-of-page-type-fl.patch
new file mode 100644
index 000000000000..2e815342d31b
--- /dev/null
+++ b/0027-selftests-sgx-Test-complete-changing-of-page-type-fl.patch
@@ -0,0 +1,451 @@
+From eac764a6b526bdeed60743c0452e75d991c8a5fa Mon Sep 17 00:00:00 2001
+From: Reinette Chatre <reinette.chatre@intel.com>
+Date: Mon, 7 Feb 2022 16:45:49 -0800
+Subject: [PATCH 27/34] selftests/sgx: Test complete changing of page type flow
+
+Support for changing an enclave page's type enables an initialized
+enclave to be expanded with support for more threads by changing the
+type of a regular enclave page to that of a Thread Control Structure
+(TCS). Additionally, being able to change a TCS or regular enclave
+page's type to be trimmed (SGX_PAGE_TYPE_TRIM) initiates the removal
+of the page from the enclave.
+
+Test changing page type to TCS as well as page removal flows
+in two phases: In the first phase support for a new thread is
+dynamically added to an initialized enclave and in the second phase
+the pages associated with the new thread are removed from the enclave.
+As an additional sanity check after the second phase the page used as
+a TCS page during the first phase is added back as a regular page and
+ensured that it can be written to (which is not possible if it was a
+TCS page).
+
+Signed-off-by: Reinette Chatre <reinette.chatre@intel.com>
+---
+ tools/testing/selftests/sgx/load.c | 41 ++++
+ tools/testing/selftests/sgx/main.c | 347 +++++++++++++++++++++++++++++
+ tools/testing/selftests/sgx/main.h | 1 +
+ 3 files changed, 389 insertions(+)
+
+diff --git a/tools/testing/selftests/sgx/load.c b/tools/testing/selftests/sgx/load.c
+index 006b464c8fc9..94bdeac1cf04 100644
+--- a/tools/testing/selftests/sgx/load.c
++++ b/tools/testing/selftests/sgx/load.c
+@@ -130,6 +130,47 @@ static bool encl_ioc_add_pages(struct encl *encl, struct encl_segment *seg)
+ return true;
+ }
+
++/*
++ * Parse the enclave code's symbol table to locate and return address of
++ * the provided symbol
++ */
++uint64_t encl_get_entry(struct encl *encl, const char *symbol)
++{
++ Elf64_Shdr *sections;
++ Elf64_Sym *symtab;
++ Elf64_Ehdr *ehdr;
++ char *sym_names;
++ int num_sym;
++ int i;
++
++ ehdr = encl->bin;
++ sections = encl->bin + ehdr->e_shoff;
++
++ for (i = 0; i < ehdr->e_shnum; i++) {
++ if (sections[i].sh_type == SHT_SYMTAB) {
++ symtab = (Elf64_Sym *)((char *)encl->bin + sections[i].sh_offset);
++ num_sym = sections[i].sh_size / sections[i].sh_entsize;
++ break;
++ }
++ }
++
++ for (i = 0; i < ehdr->e_shnum; i++) {
++ if (sections[i].sh_type == SHT_STRTAB) {
++ sym_names = (char *)encl->bin + sections[i].sh_offset;
++ break;
++ }
++ }
++
++ for (i = 0; i < num_sym; i++) {
++ Elf64_Sym *sym = &symtab[i];
++
++ if (!strcmp(symbol, sym_names + sym->st_name))
++ return (uint64_t)sym->st_value;
++ }
++
++ return 0;
++}
++
+ bool encl_load(const char *path, struct encl *encl, unsigned long heap_size)
+ {
+ const char device_path[] = "/dev/sgx_enclave";
+diff --git a/tools/testing/selftests/sgx/main.c b/tools/testing/selftests/sgx/main.c
+index 68285603b3f0..53a581bd56c5 100644
+--- a/tools/testing/selftests/sgx/main.c
++++ b/tools/testing/selftests/sgx/main.c
+@@ -1125,4 +1125,351 @@ TEST_F(enclave, augment_via_eaccept)
+ munmap(addr, PAGE_SIZE);
+ }
+
++/*
++ * SGX2 page type modification test in two phases:
++ * Phase 1:
++ * Create a new TCS, consisting out of three new pages (stack page with regular
++ * page type, SSA page with regular page type, and TCS page with TCS page
++ * type) in an initialized enclave and run a simple workload within it.
++ * Phase 2:
++ * Remove the three pages added in phase 1, add a new regular page at the
++ * same address that previously hosted the TCS page and verify that it can
++ * be modified.
++ */
++TEST_F(enclave, tcs_create)
++{
++ struct encl_op_init_tcs_page init_tcs_page_op;
++ struct sgx_enclave_remove_pages remove_ioc;
++ struct encl_op_get_from_addr get_addr_op;
++ struct encl_op_put_to_addr put_addr_op;
++ struct encl_op_get_from_buf get_buf_op;
++ struct encl_op_put_to_buf put_buf_op;
++ void *addr, *tcs, *stack_end, *ssa;
++ struct encl_op_eaccept eaccept_op;
++ struct sgx_enclave_modt modt_ioc;
++ struct sgx_secinfo secinfo;
++ size_t total_size = 0;
++ uint64_t val_64;
++ int errno_save;
++ int ret, i;
++
++ ASSERT_TRUE(setup_test_encl(ENCL_HEAP_SIZE_DEFAULT, &self->encl,
++ _metadata));
++
++ memset(&self->run, 0, sizeof(self->run));
++ self->run.tcs = self->encl.encl_base;
++
++ /*
++ * Hardware (SGX2) and kernel support is needed for this test. Start
++ * with check that test has a chance of succeeding.
++ */
++ memset(&modt_ioc, 0, sizeof(modt_ioc));
++ ret = ioctl(self->encl.fd, SGX_IOC_ENCLAVE_MODIFY_TYPE, &modt_ioc);
++
++ if (ret == -1) {
++ if (errno == ENOTTY)
++ SKIP(return, "Kernel does not support SGX_IOC_ENCLAVE_MODIFY_TYPE ioctl()");
++ else if (errno == ENODEV)
++ SKIP(return, "System does not support SGX2");
++ }
++
++ /*
++ * Invalid parameters were provided during sanity check,
++ * expect command to fail.
++ */
++ EXPECT_EQ(ret, -1);
++
++ /*
++ * Add three regular pages via EAUG: one will be the TCS stack, one
++ * will be the TCS SSA, and one will be the new TCS. The stack and
++ * SSA will remain as regular pages, the TCS page will need its
++ * type changed after populated with needed data.
++ */
++ for (i = 0; i < self->encl.nr_segments; i++) {
++ struct encl_segment *seg = &self->encl.segment_tbl[i];
++
++ total_size += seg->size;
++ }
++
++ /*
++ * Actual enclave size is expected to be larger than the loaded
++ * test enclave since enclave size must be a power of 2 in bytes while
++ * test_encl does not consume it all.
++ */
++ EXPECT_LT(total_size + 3 * PAGE_SIZE, self->encl.encl_size);
++
++ /*
++ * mmap() three pages at end of existing enclave to be used for the
++ * three new pages.
++ */
++ addr = mmap((void *)self->encl.encl_base + total_size, 3 * PAGE_SIZE,
++ PROT_READ | PROT_WRITE, MAP_SHARED | MAP_FIXED,
++ self->encl.fd, 0);
++ EXPECT_NE(addr, MAP_FAILED);
++
++ self->run.exception_vector = 0;
++ self->run.exception_error_code = 0;
++ self->run.exception_addr = 0;
++
++ stack_end = (void *)self->encl.encl_base + total_size;
++ tcs = (void *)self->encl.encl_base + total_size + PAGE_SIZE;
++ ssa = (void *)self->encl.encl_base + total_size + 2 * PAGE_SIZE;
++
++ /*
++ * Run EACCEPT on each new page to trigger the
++ * EACCEPT->(#PF)->EAUG->EACCEPT(again without a #PF) flow.
++ */
++
++ eaccept_op.epc_addr = (unsigned long)stack_end;
++ eaccept_op.flags = SGX_SECINFO_R | SGX_SECINFO_W | SGX_SECINFO_REG | SGX_SECINFO_PENDING;
++ eaccept_op.ret = 0;
++ eaccept_op.header.type = ENCL_OP_EACCEPT;
++
++ EXPECT_EQ(ENCL_CALL(&eaccept_op, &self->run, true), 0);
++
++ if (self->run.exception_vector == 14 &&
++ self->run.exception_error_code == 4 &&
++ self->run.exception_addr == (unsigned long)stack_end) {
++ munmap(addr, 3 * PAGE_SIZE);
++ SKIP(return, "Kernel does not support adding pages to initialized enclave");
++ }
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++ EXPECT_EQ(eaccept_op.ret, 0);
++
++ eaccept_op.epc_addr = (unsigned long)ssa;
++
++ EXPECT_EQ(ENCL_CALL(&eaccept_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++ EXPECT_EQ(eaccept_op.ret, 0);
++
++ eaccept_op.epc_addr = (unsigned long)tcs;
++
++ EXPECT_EQ(ENCL_CALL(&eaccept_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++ EXPECT_EQ(eaccept_op.ret, 0);
++
++ /*
++ * Three new pages added to enclave. Now populate the TCS page with
++ * needed data. This should be done from within enclave. Provide
++ * the function that will do the actual data population with needed
++ * data.
++ */
++
++ /*
++ * New TCS will use the "encl_dyn_entry" entrypoint that expects
++ * stack to begin in page before TCS page.
++ */
++ val_64 = encl_get_entry(&self->encl, "encl_dyn_entry");
++ EXPECT_NE(val_64, 0);
++
++ init_tcs_page_op.tcs_page = (unsigned long)tcs;
++ init_tcs_page_op.ssa = (unsigned long)total_size + 2 * PAGE_SIZE;
++ init_tcs_page_op.entry = val_64;
++ init_tcs_page_op.header.type = ENCL_OP_INIT_TCS_PAGE;
++
++ EXPECT_EQ(ENCL_CALL(&init_tcs_page_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++
++ /* Change TCS page type to TCS. */
++ memset(&modt_ioc, 0, sizeof(modt_ioc));
++ memset(&secinfo, 0, sizeof(secinfo));
++
++ secinfo.flags = SGX_PAGE_TYPE_TCS << 8;
++ modt_ioc.offset = total_size + PAGE_SIZE;
++ modt_ioc.length = PAGE_SIZE;
++ modt_ioc.secinfo = (unsigned long)&secinfo;
++
++ ret = ioctl(self->encl.fd, SGX_IOC_ENCLAVE_MODIFY_TYPE, &modt_ioc);
++ errno_save = ret == -1 ? errno : 0;
++
++ EXPECT_EQ(ret, 0);
++ EXPECT_EQ(errno_save, 0);
++ EXPECT_EQ(modt_ioc.result, 0);
++ EXPECT_EQ(modt_ioc.count, 4096);
++
++ /* EACCEPT new TCS page from enclave. */
++ eaccept_op.epc_addr = (unsigned long)tcs;
++ eaccept_op.flags = SGX_SECINFO_TCS | SGX_SECINFO_MODIFIED;
++ eaccept_op.ret = 0;
++ eaccept_op.header.type = ENCL_OP_EACCEPT;
++
++ EXPECT_EQ(ENCL_CALL(&eaccept_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++ EXPECT_EQ(eaccept_op.ret, 0);
++
++ /* Run workload from new TCS. */
++ self->run.tcs = (unsigned long)tcs;
++
++ /*
++ * Simple workload to write to data buffer and read value back.
++ */
++ put_buf_op.header.type = ENCL_OP_PUT_TO_BUFFER;
++ put_buf_op.value = MAGIC;
++
++ EXPECT_EQ(ENCL_CALL(&put_buf_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++
++ get_buf_op.header.type = ENCL_OP_GET_FROM_BUFFER;
++ get_buf_op.value = 0;
++
++ EXPECT_EQ(ENCL_CALL(&get_buf_op, &self->run, true), 0);
++
++ EXPECT_EQ(get_buf_op.value, MAGIC);
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++
++ /*
++ * Phase 2 of test:
++ * Remove pages associated with new TCS, create a regular page
++ * where TCS page used to be and verify it can be used as a regular
++ * page.
++ */
++
++ /* Start page removal by requesting change of page type to PT_TRIM. */
++ memset(&modt_ioc, 0, sizeof(modt_ioc));
++ memset(&secinfo, 0, sizeof(secinfo));
++
++ secinfo.flags = SGX_PAGE_TYPE_TRIM << 8;
++ modt_ioc.offset = total_size;
++ modt_ioc.length = 3 * PAGE_SIZE;
++ modt_ioc.secinfo = (unsigned long)&secinfo;
++
++ ret = ioctl(self->encl.fd, SGX_IOC_ENCLAVE_MODIFY_TYPE, &modt_ioc);
++ errno_save = ret == -1 ? errno : 0;
++
++ EXPECT_EQ(ret, 0);
++ EXPECT_EQ(errno_save, 0);
++ EXPECT_EQ(modt_ioc.result, 0);
++ EXPECT_EQ(modt_ioc.count, 3 * PAGE_SIZE);
++
++ /*
++ * Enter enclave via TCS #1 and approve page removal by sending
++ * EACCEPT for each of three removed pages.
++ */
++ self->run.tcs = self->encl.encl_base;
++
++ eaccept_op.epc_addr = (unsigned long)stack_end;
++ eaccept_op.flags = SGX_SECINFO_TRIM | SGX_SECINFO_MODIFIED;
++ eaccept_op.ret = 0;
++ eaccept_op.header.type = ENCL_OP_EACCEPT;
++
++ EXPECT_EQ(ENCL_CALL(&eaccept_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++ EXPECT_EQ(eaccept_op.ret, 0);
++
++ eaccept_op.epc_addr = (unsigned long)tcs;
++ eaccept_op.ret = 0;
++
++ EXPECT_EQ(ENCL_CALL(&eaccept_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++ EXPECT_EQ(eaccept_op.ret, 0);
++
++ eaccept_op.epc_addr = (unsigned long)ssa;
++ eaccept_op.ret = 0;
++
++ EXPECT_EQ(ENCL_CALL(&eaccept_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++ EXPECT_EQ(eaccept_op.ret, 0);
++
++ /* Send final ioctl() to complete page removal. */
++ memset(&remove_ioc, 0, sizeof(remove_ioc));
++
++ remove_ioc.offset = total_size;
++ remove_ioc.length = 3 * PAGE_SIZE;
++
++ ret = ioctl(self->encl.fd, SGX_IOC_ENCLAVE_REMOVE_PAGES, &remove_ioc);
++ errno_save = ret == -1 ? errno : 0;
++
++ EXPECT_EQ(ret, 0);
++ EXPECT_EQ(errno_save, 0);
++ EXPECT_EQ(remove_ioc.count, 3 * PAGE_SIZE);
++
++ /*
++ * Enter enclave via TCS #1 and access location where TCS #3 was to
++ * trigger dynamic add of regular page at that location.
++ */
++ eaccept_op.epc_addr = (unsigned long)tcs;
++ eaccept_op.flags = SGX_SECINFO_R | SGX_SECINFO_W | SGX_SECINFO_REG | SGX_SECINFO_PENDING;
++ eaccept_op.ret = 0;
++ eaccept_op.header.type = ENCL_OP_EACCEPT;
++
++ EXPECT_EQ(ENCL_CALL(&eaccept_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++ EXPECT_EQ(eaccept_op.ret, 0);
++
++ /*
++ * New page should be accessible from within enclave - write to it.
++ */
++ put_addr_op.value = MAGIC;
++ put_addr_op.addr = (unsigned long)tcs;
++ put_addr_op.header.type = ENCL_OP_PUT_TO_ADDRESS;
++
++ EXPECT_EQ(ENCL_CALL(&put_addr_op, &self->run, true), 0);
++
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++
++ /*
++ * Read memory from newly added page that was just written to,
++ * confirming that data previously written (MAGIC) is present.
++ */
++ get_addr_op.value = 0;
++ get_addr_op.addr = (unsigned long)tcs;
++ get_addr_op.header.type = ENCL_OP_GET_FROM_ADDRESS;
++
++ EXPECT_EQ(ENCL_CALL(&get_addr_op, &self->run, true), 0);
++
++ EXPECT_EQ(get_addr_op.value, MAGIC);
++ EXPECT_EEXIT(&self->run);
++ EXPECT_EQ(self->run.exception_vector, 0);
++ EXPECT_EQ(self->run.exception_error_code, 0);
++ EXPECT_EQ(self->run.exception_addr, 0);
++
++ munmap(addr, 3 * PAGE_SIZE);
++}
++
+ TEST_HARNESS_MAIN
+diff --git a/tools/testing/selftests/sgx/main.h b/tools/testing/selftests/sgx/main.h
+index b45c52ec7ab3..fc585be97e2f 100644
+--- a/tools/testing/selftests/sgx/main.h
++++ b/tools/testing/selftests/sgx/main.h
+@@ -38,6 +38,7 @@ void encl_delete(struct encl *ctx);
+ bool encl_load(const char *path, struct encl *encl, unsigned long heap_size);
+ bool encl_measure(struct encl *encl);
+ bool encl_build(struct encl *encl);
++uint64_t encl_get_entry(struct encl *encl, const char *symbol);
+
+ int sgx_enter_enclave(void *rdi, void *rsi, long rdx, u32 function, void *r8, void *r9,
+ struct sgx_enclave_run *run);
+--
+2.35.1
+