Przeglądaj źródła

Refactoring enclave sample (#4828)

* refactor(ci): production-ready SGX install script with logging and idempotency

- Add comprehensive logging infrastructure to /tmp/install_sgx.log
- Implement idempotency checks for SGX packages and SDK
- Modularize into functions: platform_detect, install_packages, validate_installation, cleanup
- Add strict error handling with set -euo pipefail and error traps
- Replace FIXME with proper environment sourcing documentation
- Add dynamic platform detection for Ubuntu 20+/Debian 11/12
- Ensure minimal console output (final status only) with all details in log
- Verify all acceptance scenarios pass with comprehensive testing

* Refactoring enclave-sample aligning sgx BKM.

- Buffer interface redesign to separate input and output
- prevent untrusted pointer
- add module and instance handle release functions for better resource management
liang.he 2 dni temu
rodzic
commit
0ec91cee50

+ 3 - 3
.gitignore

@@ -21,9 +21,9 @@ core/iwasm/libraries/lib-wasi-threads/test/*.wasm
 core/iwasm/libraries/lib-socket/test/*.wasm
 
 product-mini/app-samples/hello-world/test.wasm
-product-mini/platforms/linux-sgx/enclave-sample/App/
-product-mini/platforms/linux-sgx/enclave-sample/Enclave/
-product-mini/platforms/linux-sgx/enclave-sample/iwasm
+product-mini/platforms/linux-sgx/enclave-sample/
+!product-mini/platforms/linux-sgx/enclave-sample/App/App.*
+!product-mini/platforms/linux-sgx/enclave-sample/Enclave/Enclave.*
 
 build_out
 tests/wamr-test-suites/workspace

+ 400 - 0
ci/install_sgx_for_applicaiton_developer.sh

@@ -0,0 +1,400 @@
+#!/bin/bash
+
+# Reference:
+#   https://cc-enabling.trustedservices.intel.com/intel-sgx-sw-installation-guide-linux/02/installation_instructions/#intel-sgx-application-developer
+
+#TODO:
+# report error when curl fails to download files, e.g. due to network issues or incorrect URLs
+
+set -euo pipefail
+if [ "${DEBUG:-0}" -eq 1 ]; then
+  set -o xtrace
+fi
+
+# Error trap handler - logs failure details and calls cleanup before exit
+error_handler() {
+    local exit_code=$?
+    local line_number=${1:-$LINENO}
+    local bash_lineno=${2:-$BASH_LINENO}
+    local last_command=${3:-$BASH_COMMAND}
+    local function_stack=${4:-${FUNCNAME[*]}}
+
+    # Log error context to file
+    {
+        echo "=== ERROR OCCURRED ==="
+        echo "Exit Code: $exit_code"
+        echo "Line Number: $line_number"
+        echo "Bash Line: $bash_lineno"
+        echo "Failed Command: $last_command"
+        echo "Function Stack: $function_stack"
+        echo "Timestamp: $(date '+%Y-%m-%d %H:%M:%S')"
+        echo "======================"
+    } >> "${LOG_FILE:-/tmp/install_sgx.log}" 2>/dev/null || true
+
+    # Print concise error to stderr
+    echo "ERROR: Script failed at line $line_number with exit code $exit_code" >&2
+    echo "Failed command: $last_command" >&2
+    echo "Check log file: ${LOG_FILE:-/tmp/install_sgx.log}" >&2
+
+    # Call cleanup function if it exists
+    if type cleanup >/dev/null 2>&1; then
+        cleanup || true
+    fi
+
+    exit $exit_code
+}
+
+# Set up error trap
+trap 'error_handler $LINENO $BASH_LINENO "$BASH_COMMAND" "${FUNCNAME[*]}"' ERR
+
+# Platform will be detected dynamically by platform_detect() function
+# Supported platforms: Debian12, Debian11, Ubuntu22.04-server, Ubuntu20.04-server
+PLATFORM=""
+
+# Logging infrastructure
+LOG_FILE="/tmp/install_sgx.log"
+
+# Initialize log file with timestamp
+init_log() {
+    echo "=== Intel SGX Installation Log - $(date) ===" > "${LOG_FILE}"
+    echo "Platform: ${PLATFORM}" >> "${LOG_FILE}"
+    echo "Script: $0" >> "${LOG_FILE}"
+    echo "Started at: $(date '+%Y-%m-%d %H:%M:%S')" >> "${LOG_FILE}"
+    echo "" >> "${LOG_FILE}"
+}
+
+# Log message with timestamp
+log_info() {
+    echo "[$(date '+%Y-%m-%d %H:%M:%S')] $*" >> "${LOG_FILE}"
+}
+
+# Execute command with output redirected to log
+log_exec() {
+    log_info "Executing: $*"
+    "$@" >>"$LOG_FILE" 2>&1
+}
+
+# Print environment sourcing instructions
+print_env_instructions() {
+    log_info "Printing environment setup instructions"
+
+    echo "========================================================================"
+    echo "  IMPORTANT: Before building or running SGX applications, you must run:"
+    echo "      source /opt/intel/sgxsdk/environment"
+    echo "  in your current shell to activate SGX SDK environment variables."
+    echo "========================================================================"
+
+    log_info "Environment setup instructions displayed to user"
+}
+
+check_sgx_packages() {
+    log_info "Checking for existing SGX packages..."
+
+    local packages=("libsgx-quote-ex" "libsgx-dcap-ql" "libsgx-enclave-common-dev" "libsgx-dcap-ql-dev" "libsgx-dcap-default-qpl-dev" "tee-appraisal-tool")
+    local missing_packages=()
+
+    for package in "${packages[@]}"; do
+        if ! dpkg -l "$package" >> "${LOG_FILE}" 2>&1; then
+            missing_packages+=("$package")
+            log_info "Package $package not installed"
+        else
+            log_info "Package $package already installed"
+        fi
+    done
+
+    if [ ${#missing_packages[@]} -eq 0 ]; then
+        log_info "All SGX packages are already installed"
+        return 0
+    else
+        log_info "Missing SGX packages: ${missing_packages[*]}"
+        return 1
+    fi
+}
+
+check_sgx_sdk() {
+    log_info "Checking for existing SGX SDK..."
+
+    if [ -d "/opt/intel/sgxsdk" ] && [ -f "/opt/intel/sgxsdk/environment" ]; then
+        log_info "SGX SDK already installed at /opt/intel/sgxsdk"
+
+        # Validate SDK installation by checking key components
+        if [ -f "/opt/intel/sgxsdk/bin/sgx-gdb" ] && [ -d "/opt/intel/sgxsdk/include" ]; then
+            log_info "SGX SDK installation appears complete"
+            return 0
+        else
+            log_info "SGX SDK installation incomplete - missing key components"
+            return 1
+        fi
+    else
+        log_info "SGX SDK not found"
+        return 1
+    fi
+}
+
+check_sgx_repo() {
+    log_info "Checking for existing SGX local repository..."
+
+    if [ -d "/opt/intel/sgx_debian_local_repo" ] && [ -f "/etc/apt/sources.list.d/sgx_debian_local_repo.list" ]; then
+        log_info "SGX local repository already configured"
+        return 0
+    else
+        log_info "SGX local repository not configured"
+        return 1
+    fi
+}
+
+# Modular installation functions
+
+# Platform detection and configuration
+platform_detect() {
+    log_info "Entering platform_detect() function"
+
+    if [ ! -f "/etc/os-release" ]; then
+        log_info "ERROR: /etc/os-release not found - cannot detect OS"
+        echo "ERROR: Cannot detect operating system. /etc/os-release not found." >&2
+        log_info "Exiting platform_detect() function"
+        return 1
+    fi
+
+    # Parse OS information from /etc/os-release
+    local os_id=$(grep '^ID=' /etc/os-release | cut -d'=' -f2 | tr -d '"')
+    local version_id=$(grep '^VERSION_ID=' /etc/os-release | cut -d'=' -f2 | tr -d '"')
+
+    log_info "Raw OS detection: ID=${os_id}, VERSION_ID=${version_id}"
+
+    # Determine platform string based on OS and version
+    case "${os_id}" in
+        "ubuntu")
+            case "${version_id}" in
+                "20.04")
+                    PLATFORM="Ubuntu20.04-server"
+                    ;;
+                "22.04")
+                    PLATFORM="Ubuntu22.04-server"
+                    ;;
+                *)
+                    log_info "ERROR: Unsupported Ubuntu version ${version_id}. Supported: 20.04, 22.04"
+                    echo "ERROR: Unsupported Ubuntu version ${version_id}. This script supports Ubuntu 20.04 and 22.04 only." >&2
+                    log_info "Exiting platform_detect() function"
+                    return 1
+                    ;;
+            esac
+            ;;
+        "debian")
+            case "${version_id}" in
+                "11")
+                    PLATFORM="Debian11"
+                    ;;
+                "12")
+                    PLATFORM="Debian12"
+                    ;;
+                *)
+                    log_info "ERROR: Unsupported Debian version ${version_id}. Supported: 11, 12"
+                    echo "ERROR: Unsupported Debian version ${version_id}. This script supports Debian 11 and 12 only." >&2
+                    log_info "Exiting platform_detect() function"
+                    return 1
+                    ;;
+            esac
+            ;;
+        *)
+            log_info "ERROR: Unsupported OS ${os_id}. Supported: ubuntu, debian"
+            echo "ERROR: Unsupported operating system '${os_id}'. This script supports Ubuntu and Debian only." >&2
+            log_info "Exiting platform_detect() function"
+            return 1
+            ;;
+    esac
+
+    log_info "Successfully detected platform: ${PLATFORM}"
+    echo "Detected platform: ${PLATFORM}"
+
+    log_info "Exiting platform_detect() function"
+    return 0
+}
+
+# Install SGX packages and SDK
+install_packages() {
+    log_info "Entering install_packages() function"
+
+    # Skip repo setup if already configured
+    if ! check_sgx_repo; then
+        log_info "Setting up SGX local repository..."
+
+        pushd /tmp >> "${LOG_FILE}" 2>&1
+        log_exec curl -fsSLO \
+            https://download.01.org/intel-sgx/latest/linux-latest/distro/${PLATFORM}/sgx_debian_local_repo.tgz
+
+        local_sum=$(sha256sum sgx_debian_local_repo.tgz | awk '{print $1}')
+        remote_sum=$(curl -s https://download.01.org/intel-sgx/latest/dcap-latest/linux/SHA256SUM_dcap_1.24.cfg | grep "distro/${PLATFORM}/sgx_debian_local_repo.tgz" | awk '{print $1}')
+        if [[ "$local_sum" == "$remote_sum" ]]; then
+            log_info "Checksum matches"
+        else
+            log_info "Checksum mismatch!"
+        fi
+
+        log_exec sudo mkdir -p /opt/intel
+        log_exec sudo tar xzf sgx_debian_local_repo.tgz -C /opt/intel
+
+        echo 'deb [signed-by=/etc/apt/keyrings/intel-sgx-keyring.asc arch=amd64] file:///opt/intel/sgx_debian_local_repo bookworm main' \
+            | sudo tee /etc/apt/sources.list.d/sgx_debian_local_repo.list | tee -a "${LOG_FILE}" > /dev/null
+
+        log_exec sudo cp /opt/intel/sgx_debian_local_repo/keys/intel-sgx.key /etc/apt/keyrings/intel-sgx-keyring.asc
+        popd >> "${LOG_FILE}" 2>&1
+    else
+        log_info "SGX repository already configured, skipping setup"
+    fi
+
+    # Install SGX packages only if missing
+    if ! check_sgx_packages; then
+        log_info "Installing missing SGX packages..."
+        log_exec sudo apt-get update
+        log_exec sudo apt-get install -y libsgx-quote-ex libsgx-dcap-ql
+    else
+        log_info "SGX packages already installed, skipping"
+    fi
+
+    # Install build dependencies
+    log_exec sudo apt-get update --quiet
+    log_exec sudo apt-get install --quiet -y build-essential python3
+    log_exec sudo update-alternatives --install /usr/bin/python python /usr/bin/python3 1
+
+    # Install Intel SGX SDK only if missing
+    if ! check_sgx_sdk; then
+        log_info "Installing Intel SGX SDK for Application Developer..."
+
+        pushd /opt/intel >> "${LOG_FILE}" 2>&1
+        log_exec sudo curl -fsSLo sgx_linux_x64_sdk.bin \
+            https://download.01.org/intel-sgx/latest/linux-latest/distro/${PLATFORM}/sgx_linux_x64_sdk_2.27.100.1.bin
+        log_exec sudo chmod +x sgx_linux_x64_sdk.bin
+        log_exec sudo ./sgx_linux_x64_sdk.bin --prefix /opt/intel
+
+        # Log environment setup instructions for user
+        log_info "SGX SDK installation completed successfully."
+        log_info "IMPORTANT: To use the SGX SDK in your development session:"
+        log_info "  1. Run: source /opt/intel/sgxsdk/environment"
+        log_info "  2. This must be done in each shell session where you use SGX"
+        log_info "  3. Environment variables are session-specific and cannot be exported by this script"
+        log_info "  4. Consider adding 'source /opt/intel/sgxsdk/environment' to your ~/.bashrc for automatic setup"
+        popd >> "${LOG_FILE}" 2>&1
+    else
+        log_info "SGX SDK already installed, skipping"
+    fi
+
+    # Install Developer packages for Intel SGX only if missing
+    if ! check_sgx_packages; then
+        log_info "Installing Intel SGX Developer packages..."
+
+        log_exec sudo apt-get install -y libsgx-enclave-common-dev \
+            libsgx-dcap-ql-dev \
+            libsgx-dcap-default-qpl-dev \
+            tee-appraisal-tool
+    else
+        log_info "SGX Developer packages already installed, skipping"
+    fi
+
+    log_info "Exiting install_packages() function"
+    return 0
+}
+
+# Validate the installation was successful
+validate_installation() {
+    log_info "Entering validate_installation() function"
+
+    local validation_failed=0
+
+    # Re-check all components after installation
+    if ! check_sgx_packages; then
+        log_info "VALIDATION FAILED: SGX packages not properly installed"
+        validation_failed=1
+    fi
+
+    if ! check_sgx_sdk; then
+        log_info "VALIDATION FAILED: SGX SDK not properly installed"
+        validation_failed=1
+    fi
+
+    if ! check_sgx_repo; then
+        log_info "VALIDATION FAILED: SGX repository not properly configured"
+        validation_failed=1
+    fi
+
+    if [ $validation_failed -eq 0 ]; then
+        log_info "VALIDATION SUCCESS: All SGX components properly installed"
+    else
+        log_info "VALIDATION FAILED: Some SGX components failed installation"
+        log_info "Exiting validate_installation() function"
+        return 1
+    fi
+
+    log_info "Exiting validate_installation() function"
+    return 0
+}
+
+# Clean up temporary files
+cleanup() {
+    log_info "Entering cleanup() function"
+
+    # Clean up any temporary files in /tmp related to SGX installation
+    if [ -f "/tmp/sgx_debian_local_repo.tgz" ]; then
+        log_info "Removing temporary SGX repository archive"
+        rm -f /tmp/sgx_debian_local_repo.tgz
+    fi
+
+    # Additional cleanup can be added here as needed
+    log_info "Temporary file cleanup completed"
+
+    log_info "Exiting cleanup() function"
+    return 0
+}
+
+# Initialize logging
+init_log
+
+log_info "Starting idempotency checks..."
+
+# Check if everything is already installed
+if check_sgx_packages && check_sgx_sdk && check_sgx_repo; then
+    log_info "Complete SGX installation detected - no action needed"
+    echo "Intel SGX for Application Developer is already installed and configured."
+    print_env_instructions
+    exit 0
+fi
+
+log_info "Partial or missing SGX installation detected - proceeding with installation"
+
+# Main installation flow using modular functions
+
+log_info "Starting Intel SGX for Application Developer installation..."
+
+# Execute installation steps in modular fashion
+platform_detect
+if [ $? -ne 0 ]; then
+    log_info "Platform detection failed"
+    exit 1
+fi
+
+install_packages
+if [ $? -ne 0 ]; then
+    log_info "Package installation failed"
+    exit 1
+fi
+
+validate_installation
+if [ $? -ne 0 ]; then
+    log_info "Installation validation failed"
+    exit 1
+fi
+
+cleanup
+if [ $? -ne 0 ]; then
+    log_info "Cleanup failed"
+    exit 1
+fi
+
+cleanup
+if [ $? -ne 0 ]; then
+    log_info "Cleanup failed"
+    exit 1
+fi
+
+echo "Intel SGX for Application Developer installation completed."
+print_env_instructions

+ 2 - 1
product-mini/platforms/linux-sgx/enclave-sample/Enclave/Enclave.config.xml

@@ -8,7 +8,8 @@
   <ReservedMemExecutable>1</ReservedMemExecutable>
   <TCSNum>10</TCSNum>
   <TCSPolicy>1</TCSPolicy>
-  <DisableDebug>0</DisableDebug>
+  <!-- Debug mode disabled for production enclave security -->
+  <DisableDebug>1</DisableDebug>
   <MiscSelect>0</MiscSelect>
   <MiscMask>0xFFFFFFFF</MiscMask>
 </EnclaveConfiguration>

+ 278 - 11
product-mini/platforms/linux-sgx/enclave-sample/Enclave/Enclave.cpp

@@ -81,6 +81,171 @@ static EnclaveModule *enclave_module_list = NULL;
 static korp_mutex enclave_module_list_lock = OS_THREAD_MUTEX_INITIALIZER;
 #endif
 
+/* Handle table for secure EnclaveModule reference management */
+#define MAX_MODULES 128
+typedef struct HandleTableEntry {
+    uint32 id;
+    EnclaveModule *module_ref;
+    bool in_use;
+} HandleTableEntry;
+
+static HandleTableEntry module_table[MAX_MODULES] = { 0 };
+static uint32 next_module_id = 1;
+static korp_mutex module_table_lock = OS_THREAD_MUTEX_INITIALIZER;
+
+/* : Allocate secure handle for EnclaveModule, preventing pointer
+ * exposure */
+static uint32
+allocate_module_handle(EnclaveModule *module)
+{
+    uint32 handle_id = 0;
+
+    os_mutex_lock(&module_table_lock);
+
+    /* Find free slot */
+    for (uint32 i = 0; i < MAX_MODULES; i++) {
+        if (!module_table[i].in_use) {
+            module_table[i].id = next_module_id++;
+            module_table[i].module_ref = module;
+            module_table[i].in_use = true;
+            handle_id = module_table[i].id;
+            break;
+        }
+    }
+
+    os_mutex_unlock(&module_table_lock);
+
+    if (handle_id == 0) {
+        int bytes_written = 0;
+        ocall_print(&bytes_written,
+                    "SECURITY WARNING: Module handle table full\n");
+    }
+
+    return handle_id;
+}
+
+/* Lookup EnclaveModule by handle ID, preventing direct pointer access */
+static EnclaveModule *
+lookup_module_by_handle(uint32 handle_id)
+{
+    EnclaveModule *module = NULL;
+
+    if (handle_id == 0)
+        return NULL;
+
+    os_mutex_lock(&module_table_lock);
+
+    for (uint32 i = 0; i < MAX_MODULES; i++) {
+        if (module_table[i].in_use && module_table[i].id == handle_id) {
+            module = module_table[i].module_ref;
+            break;
+        }
+    }
+
+    os_mutex_unlock(&module_table_lock);
+
+    return module;
+}
+
+static void
+release_module_handle(uint32 handle_id)
+{
+    os_mutex_lock(&module_table_lock);
+
+    for (uint32 i = 0; i < MAX_MODULES; i++) {
+        if (module_table[i].in_use && module_table[i].id == handle_id) {
+            module_table[i].id = 0;
+            module_table[i].module_ref = NULL;
+            module_table[i].in_use = false;
+            break;
+        }
+    }
+
+    os_mutex_unlock(&module_table_lock);
+}
+
+/* Handle table for secure wasm_module_inst_t reference management */
+#define MAX_INSTANCES 128
+typedef struct InstanceTableEntry {
+    uint32 id;
+    wasm_module_inst_t inst_ref;
+    bool in_use;
+} InstanceTableEntry;
+
+static InstanceTableEntry instance_table[MAX_INSTANCES] = { 0 };
+static uint32 next_instance_id = 1;
+static korp_mutex instance_table_lock = OS_THREAD_MUTEX_INITIALIZER;
+
+/*Allocate secure handle for wasm_module_inst_t, preventing pointer exposure */
+static uint32
+allocate_instance_handle(wasm_module_inst_t inst)
+{
+    uint32 handle_id = 0;
+
+    os_mutex_lock(&instance_table_lock);
+
+    for (uint32 i = 0; i < MAX_INSTANCES; i++) {
+        if (!instance_table[i].in_use) {
+            instance_table[i].id = next_instance_id++;
+            instance_table[i].inst_ref = inst;
+            instance_table[i].in_use = true;
+            handle_id = instance_table[i].id;
+            break;
+        }
+    }
+
+    os_mutex_unlock(&instance_table_lock);
+
+    if (handle_id == 0) {
+        int bytes_written = 0;
+        ocall_print(&bytes_written,
+                    "SECURITY WARNING: Instance handle table full\n");
+    }
+
+    return handle_id;
+}
+
+/* SECURITY: Lookup wasm_module_inst_t by handle ID, preventing direct pointer
+ * access */
+static wasm_module_inst_t
+lookup_instance_by_handle(uint32 handle_id)
+{
+    wasm_module_inst_t inst = NULL;
+
+    if (handle_id == 0)
+        return NULL;
+
+    os_mutex_lock(&instance_table_lock);
+
+    for (uint32 i = 0; i < MAX_INSTANCES; i++) {
+        if (instance_table[i].in_use && instance_table[i].id == handle_id) {
+            inst = instance_table[i].inst_ref;
+            break;
+        }
+    }
+
+    os_mutex_unlock(&instance_table_lock);
+
+    return inst;
+}
+
+static void
+release_instance_handle(uint32 handle_id)
+{
+    os_mutex_lock(&instance_table_lock);
+
+    for (uint32 i = 0; i < MAX_INSTANCES; i++) {
+        if (instance_table[i].in_use && instance_table[i].id == handle_id) {
+            instance_table[i].id = 0;
+            instance_table[i].inst_ref = NULL;
+            instance_table[i].in_use = false;
+            break;
+        }
+    }
+
+    os_mutex_unlock(&instance_table_lock);
+}
+
 #if WASM_ENABLE_GLOBAL_HEAP_POOL != 0
 static char global_heap_buf[WASM_GLOBAL_HEAP_SIZE] = { 0 };
 #endif
@@ -277,7 +442,17 @@ handle_cmd_load_module(uint64 *args, uint32 argc)
         return;
     }
 
-    *(EnclaveModule **)args_org = enclave_module;
+    uint32 enclave_module_id = allocate_module_handle(enclave_module);
+    if (enclave_module_id == 0) {
+        /* Handle table full - cleanup and return error */
+        if (!enclave_module->is_xip_file)
+            wasm_runtime_free(enclave_module);
+        else
+            os_munmap(enclave_module, (uint32)total_size);
+        *(void **)args_org = NULL;
+        return;
+    }
+    *(uint32 *)args_org = enclave_module_id;
 
 #if WASM_ENABLE_LIB_RATS != 0
     /* Calculate the module hash */
@@ -299,7 +474,8 @@ handle_cmd_load_module(uint64 *args, uint32 argc)
 static void
 handle_cmd_unload_module(uint64 *args, uint32 argc)
 {
-    EnclaveModule *enclave_module = *(EnclaveModule **)args++;
+    uint32 module_handle_id = *(uint32 *)args++;
+    EnclaveModule *enclave_module = lookup_module_by_handle(module_handle_id);
 
     bh_assert(argc == 1);
 
@@ -328,6 +504,9 @@ handle_cmd_unload_module(uint64 *args, uint32 argc)
     os_mutex_unlock(&enclave_module_list_lock);
 #endif
 
+    /* Release module handle */
+    release_module_handle(module_handle_id);
+
     /* Destroy enclave module resources */
     if (enclave_module->wasi_arg_buf)
         wasm_runtime_free(enclave_module->wasi_arg_buf);
@@ -368,7 +547,8 @@ static void
 handle_cmd_instantiate_module(uint64 *args, uint32 argc)
 {
     uint64 *args_org = args;
-    EnclaveModule *enclave_module = *(EnclaveModule **)args++;
+    uint32 module_handle_id = *(uint32 *)args++;
+    EnclaveModule *enclave_module = lookup_module_by_handle(module_handle_id);
     uint32 stack_size = *(uint32 *)args++;
     uint32 heap_size = *(uint32 *)args++;
     char *error_buf = *(char **)args++;
@@ -377,7 +557,7 @@ handle_cmd_instantiate_module(uint64 *args, uint32 argc)
 
     bh_assert(argc == 5);
 
-    if (!runtime_inited) {
+    if (!runtime_inited || !enclave_module) {
         *(void **)args_org = NULL;
         return;
     }
@@ -389,7 +569,13 @@ handle_cmd_instantiate_module(uint64 *args, uint32 argc)
         return;
     }
 
-    *(wasm_module_inst_t *)args_org = module_inst;
+    uint32 instance_id = allocate_instance_handle(module_inst);
+    if (instance_id == 0) {
+        wasm_runtime_deinstantiate(module_inst);
+        *(void **)args_org = NULL;
+        return;
+    }
+    *(uint32 *)args_org = instance_id;
 
     LOG_VERBOSE("Instantiate module success.\n");
 }
@@ -397,7 +583,9 @@ handle_cmd_instantiate_module(uint64 *args, uint32 argc)
 static void
 handle_cmd_deinstantiate_module(uint64 *args, uint32 argc)
 {
-    wasm_module_inst_t module_inst = *(wasm_module_inst_t *)args++;
+    uint32 instance_handle_id = *(uint32 *)args++;
+    wasm_module_inst_t module_inst =
+        lookup_instance_by_handle(instance_handle_id);
 
     bh_assert(argc == 1);
 
@@ -407,6 +595,8 @@ handle_cmd_deinstantiate_module(uint64 *args, uint32 argc)
 
     wasm_runtime_deinstantiate(module_inst);
 
+    release_instance_handle(instance_handle_id);
+
     LOG_VERBOSE("Deinstantiate module success.\n");
 }
 
@@ -414,7 +604,9 @@ static void
 handle_cmd_get_exception(uint64 *args, uint32 argc)
 {
     uint64 *args_org = args;
-    wasm_module_inst_t module_inst = *(wasm_module_inst_t *)args++;
+    uint32 instance_handle_id = *(uint32 *)args++;
+    wasm_module_inst_t module_inst =
+        lookup_instance_by_handle(instance_handle_id);
     char *exception = *(char **)args++;
     uint32 exception_size = *(uint32 *)args++;
     const char *exception1;
@@ -438,7 +630,9 @@ handle_cmd_get_exception(uint64 *args, uint32 argc)
 static void
 handle_cmd_exec_app_main(uint64 *args, int32 argc)
 {
-    wasm_module_inst_t module_inst = *(wasm_module_inst_t *)args++;
+    uint32 instance_handle_id = *(uint32 *)args++;
+    wasm_module_inst_t module_inst =
+        lookup_instance_by_handle(instance_handle_id);
     uint32 app_argc = *(uint32 *)args++;
     char **app_argv = NULL;
     uint64 total_size;
@@ -471,7 +665,9 @@ handle_cmd_exec_app_main(uint64 *args, int32 argc)
 static void
 handle_cmd_exec_app_func(uint64 *args, int32 argc)
 {
-    wasm_module_inst_t module_inst = *(wasm_module_inst_t *)args++;
+    uint32 instance_handle_id = *(uint32 *)args++;
+    wasm_module_inst_t module_inst =
+        lookup_instance_by_handle(instance_handle_id);
     char *func_name = *(char **)args++;
     uint32 app_argc = *(uint32 *)args++;
     char **app_argv = NULL;
@@ -515,7 +711,8 @@ static void
 handle_cmd_set_wasi_args(uint64 *args, int32 argc)
 {
     uint64 *args_org = args;
-    EnclaveModule *enclave_module = *(EnclaveModule **)args++;
+    uint32 module_handle_id = *(uint32 *)args++;
+    EnclaveModule *enclave_module = lookup_module_by_handle(module_handle_id);
     char **dir_list = *(char ***)args++;
     uint32 dir_list_size = *(uint32 *)args++;
     char **env_list = *(char ***)args++;
@@ -533,7 +730,48 @@ handle_cmd_set_wasi_args(uint64 *args, int32 argc)
 
     bh_assert(argc == 10);
 
-    if (!runtime_inited) {
+    if (!runtime_inited || !enclave_module) {
+        *args_org = false;
+        return;
+    }
+
+    /* Validate all pointer arrays before use */
+    if (dir_list_size > 0
+        && (!dir_list
+            || !sgx_is_outside_enclave(dir_list,
+                                       sizeof(char *) * dir_list_size))) {
+        int bytes_written = 0;
+        ocall_print(&bytes_written, "SECURITY ERROR: Invalid dir_list\n");
+        *args_org = false;
+        return;
+    }
+
+    if (env_list_size > 0
+        && (!env_list
+            || !sgx_is_outside_enclave(env_list,
+                                       sizeof(char *) * env_list_size))) {
+        int bytes_written = 0;
+        ocall_print(&bytes_written, "SECURITY ERROR: Invalid env_list\n");
+        *args_org = false;
+        return;
+    }
+
+    if (wasi_argc > 0
+        && (!wasi_argv
+            || !sgx_is_outside_enclave(wasi_argv,
+                                       sizeof(char *) * wasi_argc))) {
+        int bytes_written = 0;
+        ocall_print(&bytes_written, "SECURITY ERROR: Invalid wasi_argv\n");
+        *args_org = false;
+        return;
+    }
+
+    if (addr_pool_list_size > 0
+        && (!addr_pool_list
+            || !sgx_is_outside_enclave(addr_pool_list,
+                                       sizeof(char *) * addr_pool_list_size))) {
+        int bytes_written = 0;
+        ocall_print(&bytes_written, "SECURITY ERROR: Invalid addr_pool_list\n");
         *args_org = false;
         return;
     }
@@ -695,9 +933,38 @@ void
 ecall_handle_command(unsigned cmd, unsigned char *cmd_buf,
                      unsigned cmd_buf_size)
 {
+    /*
+     * Validate buffer before processing
+     * cmd_buf can be NULL if cmd_buf_size is 0, but if cmd_buf_size is
+     * non-zero, cmd_buf must be valid
+     */
+    if ((!cmd_buf && cmd_buf_size > 0) || (cmd_buf && cmd_buf_size == 0)) {
+        int bytes_written = 0;
+        ocall_print(&bytes_written,
+                    "SECURITY ERROR: Invalid buffer parameters\n");
+        return;
+    }
+
+    // Because of [in, out] cmd_buf in edl, it is allocated inside enclave.
+    if (cmd_buf && sgx_is_outside_enclave(cmd_buf, cmd_buf_size)) {
+        int bytes_written = 0;
+        ocall_print(&bytes_written,
+                    "SECURITY ERROR: Buffer should be inside enclave\n");
+        return;
+    }
+
+    if (cmd_buf_size % sizeof(uint64) != 0) {
+        int bytes_written = 0;
+        ocall_print(&bytes_written,
+                    "SECURITY ERROR: Buffer alignment invalid\n");
+        return;
+    }
+
     uint64 *args = (uint64 *)cmd_buf;
     uint32 argc = cmd_buf_size / sizeof(uint64);
 
+    LOG_VERBOSE("Received command %d with %u arguments.\n", cmd, argc);
+
     switch (cmd) {
         case CMD_INIT_RUNTIME:
             handle_cmd_init_runtime(args, argc);

+ 1 - 0
product-mini/platforms/linux-sgx/enclave-sample/Enclave/Enclave.edl

@@ -18,6 +18,7 @@ enclave {
     from "sgx_tprotected_fs.edl" import *;
 #endif
 
+    //TODO: replace void with an int as error code
     trusted {
         /* define ECALLs here. */
         public void ecall_handle_command(unsigned cmd,