From: Sean Christopherson <sean.j.christopherson@intel.com>
To: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
Cc: Nathaniel McCallum <npmccallum@redhat.com>,
Cedric Xing <cedric.xing@intel.com>,
Jethro Beekman <jethro@fortanix.com>,
Andy Lutomirski <luto@amacapital.net>,
linux-sgx@vger.kernel.org
Subject: Re: [RFC PATCH 2/4] x86/vdso: x86/sgx: Rework __vdso_sgx_enter_enclave() API
Date: Wed, 26 Aug 2020 13:20:29 -0700 [thread overview]
Message-ID: <20200826202029.GD21459@sjchrist-ice> (raw)
In-Reply-To: <20200818042405.12871-3-sean.j.christopherson@intel.com>
Andy,
Any thoughts on using a struct versus a plethora of params? If you don't
have a strong opinion, I'd like to push for the struct option as it fixes
the -EFAULT weirdness, satisfies Nathaniel's request, and gives some
flexibility for the future. The code impact, both to the vDSO and to the
caller, is largely a lateral move, i.e. it's different but in the end
doesn't require any more or less work.
On Mon, Aug 17, 2020 at 09:24:03PM -0700, Sean Christopherson wrote:
> Rework __vdso_sgx_enter_enclave() to use a struct to hold the input and
> output params. In the new struct, add an opaque "user_data" that can be
> used to pass context across the vDSO, and an explicit "exit_reason" to
> avoid overloading the return value.
>
> Moving the params into a struct will also make it less painful to use
> dedicated exit reasons, and to support exiting on interrupts in future
> patches.
>
> Cc: Nathaniel McCallum <npmccallum@redhat.com>
> Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
> ---
> arch/x86/entry/vdso/vsgx_enter_enclave.S | 72 ++++++++++++-------
> arch/x86/include/uapi/asm/sgx.h | 90 ++++++++++++++++--------
> 2 files changed, 107 insertions(+), 55 deletions(-)
>
> diff --git a/arch/x86/entry/vdso/vsgx_enter_enclave.S b/arch/x86/entry/vdso/vsgx_enter_enclave.S
> index 2d88acd408d4e..aaae6d6e28ac3 100644
> --- a/arch/x86/entry/vdso/vsgx_enter_enclave.S
> +++ b/arch/x86/entry/vdso/vsgx_enter_enclave.S
> @@ -7,9 +7,21 @@
>
> #include "extable.h"
>
> -#define EX_LEAF 0*8
> -#define EX_TRAPNR 0*8+4
> -#define EX_ERROR_CODE 0*8+6
> +/* Offset of 'struct sgx_enter_enclave' relative to %rbp. */
> +#define RUN_OFFSET 2*8
> +
> +/* Offsets into 'struct sgx_enter_enclave'. */
> +#define TCS_OFFEST 0*8
> +#define FLAGS_OFFSET 1*8
> +#define EXIT_LEAF_OFFSET 2*8
> +#define EXIT_REASON_OFFSET 2*8 + 4
> +#define USER_HANDLER_OFFSET 3*8
> +/* #define USER_DATA_OFFSET 4*8 */
> +#define EXCEPTION_OFFSET 5*8
> +
> +/* Offsets into sgx_enter_enclave.exception. */
> +#define EX_TRAPNR 0*8
> +#define EX_ERROR_CODE 0*8+2
> #define EX_ADDRESS 1*8
>
> .code64
> @@ -30,12 +42,18 @@ SYM_FUNC_START(__vdso_sgx_enter_enclave)
> .Lenter_enclave:
> /* EENTER <= leaf <= ERESUME */
> cmp $EENTER, %eax
> - jb .Linvalid_leaf
> + jb .Linvalid_input
> cmp $ERESUME, %eax
> - ja .Linvalid_leaf
> + ja .Linvalid_input
> +
> + mov RUN_OFFSET(%rbp), %rcx
> +
> + /* No flags are currently defined/supported. */
> + cmpq $0, FLAGS_OFFSET(%rcx)
> + jne .Linvalid_input
>
> /* Load TCS and AEP */
> - mov 0x10(%rbp), %rbx
> + mov TCS_OFFEST(%rcx), %rbx
> lea .Lasync_exit_pointer(%rip), %rcx
>
> /* Single ENCLU serving as both EENTER and AEP (ERESUME) */
> @@ -44,13 +62,21 @@ SYM_FUNC_START(__vdso_sgx_enter_enclave)
> enclu
>
> /* EEXIT jumps here unless the enclave is doing something fancy. */
> - xor %eax, %eax
> + mov RUN_OFFSET(%rbp), %rbx
> +
> + /* Set exit_reason. */
> + movl $0, EXIT_REASON_OFFSET(%rbx)
>
> /* Invoke userspace's exit handler if one was provided. */
> .Lhandle_exit:
> - cmpq $0, 0x20(%rbp)
> + mov %eax, EXIT_LEAF_OFFSET(%rbx)
> +
> + cmpq $0, USER_HANDLER_OFFSET(%rbx)
> jne .Linvoke_userspace_handler
>
> + /* Success, in the sense that ENCLU was attempted. */
> + xor %eax, %eax
> +
> .Lout:
> pop %rbx
> leave
> @@ -60,28 +86,28 @@ SYM_FUNC_START(__vdso_sgx_enter_enclave)
> /* The out-of-line code runs with the pre-leave stack frame. */
> .cfi_def_cfa %rbp, 16
>
> -.Linvalid_leaf:
> +.Linvalid_input:
> mov $(-EINVAL), %eax
> jmp .Lout
>
> .Lhandle_exception:
> - mov 0x18(%rbp), %rcx
> - test %rcx, %rcx
> - je .Lskip_exception_info
> + mov RUN_OFFSET(%rbp), %rbx
>
> - /* Fill optional exception info. */
> - mov %eax, EX_LEAF(%rcx)
> - mov %di, EX_TRAPNR(%rcx)
> - mov %si, EX_ERROR_CODE(%rcx)
> - mov %rdx, EX_ADDRESS(%rcx)
> -.Lskip_exception_info:
> - mov $(-EFAULT), %eax
> + /* Set the exit_reason and exception info. */
> + movl $(-EFAULT), EXIT_REASON_OFFSET(%rbx)
> +
> + mov %di, (EXCEPTION_OFFSET + EX_TRAPNR)(%rbx)
> + mov %si, (EXCEPTION_OFFSET + EX_ERROR_CODE)(%rbx)
> + mov %rdx, (EXCEPTION_OFFSET + EX_ADDRESS)(%rbx)
> jmp .Lhandle_exit
>
> .Linvoke_userspace_handler:
> /* Pass the untrusted RSP (at exit) to the callback via %rcx. */
> mov %rsp, %rcx
>
> + /* Save @e, %rbx is about to be clobbered. */
> + mov %rbx, %rax
> +
> /* Save the untrusted RSP offset in %rbx (non-volatile register). */
> mov %rsp, %rbx
> and $0xf, %rbx
> @@ -93,20 +119,18 @@ SYM_FUNC_START(__vdso_sgx_enter_enclave)
> and $-0x10, %rsp
> push %rax
>
> - /* Push @e, the "return" value and @tcs as params to the callback. */
> - push 0x18(%rbp)
> + /* Push @e as a param to the callback. */
> push %rax
> - push 0x10(%rbp)
>
> /* Clear RFLAGS.DF per x86_64 ABI */
> cld
>
> /* Load the callback pointer to %rax and invoke it via retpoline. */
> - mov 0x20(%rbp), %rax
> + mov USER_HANDLER_OFFSET(%rax), %rax
> call .Lretpoline
>
> /* Undo the post-exit %rsp adjustment. */
> - lea 0x20(%rsp, %rbx), %rsp
> + lea 0x10(%rsp, %rbx), %rsp
>
> /*
> * If the return from callback is zero or negative, return immediately,
> diff --git a/arch/x86/include/uapi/asm/sgx.h b/arch/x86/include/uapi/asm/sgx.h
> index 3760e5d5dc0c7..d3b107aac279d 100644
> --- a/arch/x86/include/uapi/asm/sgx.h
> +++ b/arch/x86/include/uapi/asm/sgx.h
> @@ -74,6 +74,28 @@ struct sgx_enclave_set_attribute {
> __u64 attribute_fd;
> };
>
> +struct sgx_enclave_run;
> +
> +/**
> + * typedef sgx_enclave_exit_handler_t - Exit handler function accepted by
> + * __vdso_sgx_enter_enclave()
> + *
> + * @rdi: RDI at the time of enclave exit
> + * @rsi: RSI at the time of enclave exit
> + * @rdx: RDX at the time of enclave exit
> + * @ursp: RSP at the time of enclave exit (untrusted stack)
> + * @r8: R8 at the time of enclave exit
> + * @r9: R9 at the time of enclave exit
> + * @r: Pointer to struct sgx_enclave_run (as provided by caller)
> + *
> + * Return:
> + * 0 or negative to exit vDSO
> + * positive to re-enter enclave (must be EENTER or ERESUME leaf)
> + */
> +typedef int (*sgx_enclave_exit_handler_t)(long rdi, long rsi, long rdx,
> + long ursp, long r8, long r9,
> + struct sgx_enclave_run *r);
> +
> /**
> * struct sgx_enclave_exception - structure to report exceptions encountered in
> * __vdso_sgx_enter_enclave()
> @@ -85,31 +107,43 @@ struct sgx_enclave_set_attribute {
> * @reserved: reserved for future use
> */
> struct sgx_enclave_exception {
> - __u32 leaf;
> __u16 trapnr;
> __u16 error_code;
> + __u32 reserved;
> __u64 address;
> - __u64 reserved[2];
> };
>
> /**
> - * typedef sgx_enclave_exit_handler_t - Exit handler function accepted by
> - * __vdso_sgx_enter_enclave()
> + * struct sgx_enclave_run - Control structure for __vdso_sgx_enter_enclave()
> *
> - * @rdi: RDI at the time of enclave exit
> - * @rsi: RSI at the time of enclave exit
> - * @rdx: RDX at the time of enclave exit
> - * @ursp: RSP at the time of enclave exit (untrusted stack)
> - * @r8: R8 at the time of enclave exit
> - * @r9: R9 at the time of enclave exit
> - * @tcs: Thread Control Structure used to enter enclave
> - * @ret: 0 on success (EEXIT), -EFAULT on an exception
> - * @e: Pointer to struct sgx_enclave_exception (as provided by caller)
> + * @tcs: Thread Control Structure used to enter enclave
> + * @flags: Control flags
> + * @exit_leaf: ENCLU leaf from \%eax at time of exit
> + * @exit_reason: Cause of exit from enclave, e.g. EEXIT vs. exception
> + * @user_handler: User provided exit handler (optional)
> + * @user_data: User provided opaque value (optional)
> + * @exception: Valid on exit due to exception
> */
> -typedef int (*sgx_enclave_exit_handler_t)(long rdi, long rsi, long rdx,
> - long ursp, long r8, long r9,
> - void *tcs, int ret,
> - struct sgx_enclave_exception *e);
> +struct sgx_enclave_run {
> + __u64 tcs;
> + __u64 flags;
> +
> + __u32 exit_leaf;
> + __u32 exit_reason;
> +
> + union {
> + sgx_enclave_exit_handler_t user_handler;
> + __u64 __user_handler;
> + };
> + __u64 user_data;
> +
> + union {
> + struct sgx_enclave_exception exception;
> +
> + /* Pad the entire struct to 256 bytes. */
> + __u8 pad[256 - 40];
> + };
> +};
>
> /**
> * __vdso_sgx_enter_enclave() - Enter an SGX enclave
> @@ -119,16 +153,14 @@ typedef int (*sgx_enclave_exit_handler_t)(long rdi, long rsi, long rdx,
> * @leaf: ENCLU leaf, must be EENTER or ERESUME
> * @r8: Pass-through value for R8
> * @r9: Pass-through value for R9
> - * @tcs: TCS, must be non-NULL
> - * @e: Optional struct sgx_enclave_exception instance
> - * @handler: Optional enclave exit handler
> + * @r: struct sgx_enclave_run, must be non-NULL
> *
> * NOTE: __vdso_sgx_enter_enclave() does not ensure full compliance with the
> - * x86-64 ABI, e.g. doesn't explicitly clear EFLAGS.DF after EEXIT. Except for
> - * non-volatile general purpose registers, preserving/setting state in
> - * accordance with the x86-64 ABI is the responsibility of the enclave and its
> - * runtime, i.e. __vdso_sgx_enter_enclave() cannot be called from C code
> - * without careful consideration by both the enclave and its runtime.
> + * x86-64 ABI, e.g. doesn't handle XSAVE state. Except for non-volatile
> + * general purpose registers, EFLAGS.DF, and RSP alignment, preserving/setting
> + * state in accordance with the x86-64 ABI is the responsibility of the enclave
> + * and its runtime, i.e. __vdso_sgx_enter_enclave() cannot be called from C
> + * code without careful consideration by both the enclave and its runtime.
> *
> * All general purpose registers except RAX, RBX and RCX are passed as-is to
> * the enclave. RAX, RBX and RCX are consumed by EENTER and ERESUME and are
> @@ -160,16 +192,12 @@ typedef int (*sgx_enclave_exit_handler_t)(long rdi, long rsi, long rdx,
> * without returning to __vdso_sgx_enter_enclave().
> *
> * Return:
> - * 0 on success,
> + * 0 on success (ENCLU reached),
> * -EINVAL if ENCLU leaf is not allowed,
> - * -EFAULT if an exception occurs on ENCLU or within the enclave
> - * -errno for all other negative values returned by the userspace exit handler
> */
> typedef int (*vdso_sgx_enter_enclave_t)(unsigned long rdi, unsigned long rsi,
> unsigned long rdx, unsigned int leaf,
> unsigned long r8, unsigned long r9,
> - void *tcs,
> - struct sgx_enclave_exception *e,
> - sgx_enclave_exit_handler_t handler);
> + struct sgx_enclave_run *r);
>
> #endif /* _UAPI_ASM_X86_SGX_H */
> --
> 2.28.0
>
next prev parent reply other threads:[~2020-08-26 20:20 UTC|newest]
Thread overview: 44+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-08-18 4:24 [RFC PATCH 0/4] x86/vdso: x86/sgx: Rework SGX vDSO API Sean Christopherson
2020-08-18 4:24 ` [RFC PATCH 1/4] x86/vdso: x86/sgx: Explicitly force 8-byte CMP for detecting user handler Sean Christopherson
2020-08-18 16:46 ` Jarkko Sakkinen
2020-08-20 11:13 ` Jethro Beekman
2020-08-18 4:24 ` [RFC PATCH 2/4] x86/vdso: x86/sgx: Rework __vdso_sgx_enter_enclave() API Sean Christopherson
2020-08-18 16:57 ` Jarkko Sakkinen
2020-08-20 11:23 ` Jethro Beekman
2020-08-24 13:36 ` Jethro Beekman
2020-08-24 19:49 ` Jarkko Sakkinen
2020-09-04 10:25 ` Sean Christopherson
2020-09-04 13:36 ` Jarkko Sakkinen
2020-09-04 16:01 ` Sean Christopherson
2020-08-24 23:54 ` Sean Christopherson
2020-08-25 7:36 ` Jethro Beekman
2020-08-25 7:38 ` Sean Christopherson
2020-08-25 7:41 ` Jethro Beekman
2020-08-26 20:16 ` Sean Christopherson
2020-08-26 19:27 ` Xing, Cedric
2020-08-26 20:15 ` Sean Christopherson
2020-08-26 23:26 ` Xing, Cedric
2020-09-04 9:52 ` Sean Christopherson
2020-08-27 8:58 ` Jethro Beekman
2020-08-26 20:20 ` Sean Christopherson [this message]
2020-08-26 20:55 ` Andy Lutomirski
2020-08-27 13:35 ` Jarkko Sakkinen
2020-08-18 4:24 ` [RFC PATCH 3/4] x86/vdso: x86/sgx: Introduce dedicated SGX exit reasons for vDSO Sean Christopherson
2020-08-18 16:58 ` Jarkko Sakkinen
2020-08-20 11:13 ` Jethro Beekman
2020-08-18 4:24 ` [RFC PATCH 4/4] x86/vdso: x86/sgx: Allow the user to exit the vDSO loop on interrupts Sean Christopherson
2020-08-18 17:00 ` Jarkko Sakkinen
2020-08-18 17:15 ` Andy Lutomirski
2020-08-18 17:31 ` Sean Christopherson
2020-08-18 19:05 ` Andy Lutomirski
2020-08-19 14:21 ` Jethro Beekman
2020-08-19 15:02 ` Andy Lutomirski
2020-08-20 11:20 ` Jethro Beekman
2020-08-20 17:44 ` Andy Lutomirski
2020-08-20 17:53 ` Jethro Beekman
2020-08-22 21:55 ` Andy Lutomirski
2020-08-24 13:36 ` Jethro Beekman
2020-08-26 18:32 ` Sean Christopherson
2020-08-26 19:09 ` Xing, Cedric
2020-08-27 8:57 ` Jethro Beekman
2020-08-20 11:13 ` Jethro Beekman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200826202029.GD21459@sjchrist-ice \
--to=sean.j.christopherson@intel.com \
--cc=cedric.xing@intel.com \
--cc=jarkko.sakkinen@linux.intel.com \
--cc=jethro@fortanix.com \
--cc=linux-sgx@vger.kernel.org \
--cc=luto@amacapital.net \
--cc=npmccallum@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).