On Tue, Sep 03, 2019 at 05:26:37PM +0300, Jarkko Sakkinen wrote: > Define the SGX microarchitectural data structures used by various SGX > opcodes. This is not an exhaustive representation of all SGX data > structures but only those needed by the kernel. > > [1] Intel SDM: 37.6 INTEL® SGX DATA STRUCTURES OVERVIEW That footnote is not being referred to. Just make it a sentence. Btw, you could tell your SDM folks to fix formulations like: "The use of EAX is implied implicitly by the ENCLS, ENCLU, and ENCLV ^^^^^^^^^^^^^^^^^^^ instructions.... The use of additional registers does not use ModR/M encoding and is implied implicitly by the respective leaf function ^^^^^^^^^^^^^^^^^^^ index." "implied" alone wasn't enough I guess. :) > Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx> > Co-developed-by: Sean Christopherson <sean.j.christopherson@xxxxxxxxx> > Signed-off-by: Sean Christopherson <sean.j.christopherson@xxxxxxxxx> > --- > arch/x86/kernel/cpu/sgx/arch.h | 423 +++++++++++++++++++++++++++++++++ > 1 file changed, 423 insertions(+) > create mode 100644 arch/x86/kernel/cpu/sgx/arch.h > > diff --git a/arch/x86/kernel/cpu/sgx/arch.h b/arch/x86/kernel/cpu/sgx/arch.h > new file mode 100644 > index 000000000000..725a47f9f761 > --- /dev/null > +++ b/arch/x86/kernel/cpu/sgx/arch.h > @@ -0,0 +1,423 @@ > +/* SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause) */ > +/** > + * Copyright(c) 2016-18 Intel Corporation. > + * > + * Contains data structures defined by the SGX architecture. Data structures > + * defined by the Linux software stack should not be placed here. > + */ > +#ifndef _ASM_X86_SGX_ARCH_H > +#define _ASM_X86_SGX_ARCH_H > + > +#include <linux/types.h> > + > +#define SGX_CPUID 0x12 > +#define SGX_CPUID_FIRST_VARIABLE_SUB_LEAF 2 > + > +/** > + * enum sgx_sub_leaf_types - SGX CPUID variable sub-leaf types > + * %SGX_CPUID_SUB_LEAF_INVALID: Indicates this sub-leaf is invalid. > + * %SGX_CPUID_SUB_LEAF_EPC_SECTION: Sub-leaf enumerates an EPC section. > + */ > +enum sgx_sub_leaf_types { > + SGX_CPUID_SUB_LEAF_INVALID = 0x0, > + SGX_CPUID_SUB_LEAF_EPC_SECTION = 0x1, > +}; > + > +#define SGX_CPUID_SUB_LEAF_TYPE_MASK GENMASK(3, 0) > + > +/** > + * enum sgx_encls_leaves - ENCLS leaf functions > + * %SGX_ECREATE: Create an enclave. > + * %SGX_EADD: Add a page to an uninitialized enclave. > + * %SGX_EINIT: Initialize an enclave, i.e. launch an enclave. > + * %SGX_EREMOVE: Remove a page from an enclave. > + * %SGX_EDBGRD: Read a word from an enclve (peek). > + * %SGX_EDBGWR: Write a word to an enclave (poke). > + * %SGX_EEXTEND: Measure 256 bytes of an added enclave page. > + * %SGX_ELDB: Load a swapped page in blocked state. > + * %SGX_ELDU: Load a swapped page in unblocked state. > + * %SGX_EBLOCK: Change page state to blocked i.e. entering hardware > + * threads cannot access it and create new TLB entries. > + * %SGX_EPA: Create a Version Array (VA) page used to store isvsvn > + * number for a swapped EPC page. > + * %SGX_EWB: Swap an enclave page to the regular memory. Checks that > + * all threads have exited that were in the previous > + * shoot-down sequence. > + * %SGX_ETRACK: Start a new shoot down sequence. Used to together with > + * EBLOCK to make sure that a page is safe to swap. > + * %SGX_EAUG: Add a page to an initialized enclave. > + * %SGX_EMODPR: Restrict an EPC page's permissions. > + * %SGX_EMODT: Modify the page type of an EPC page. > + */ > +enum sgx_encls_leaves { > + SGX_ECREATE = 0x00, > + SGX_EADD = 0x01, > + SGX_EINIT = 0x02, > + SGX_EREMOVE = 0x03, > + SGX_EDGBRD = 0x04, > + SGX_EDGBWR = 0x05, > + SGX_EEXTEND = 0x06, > + SGX_ELDB = 0x07, > + SGX_ELDU = 0x08, > + SGX_EBLOCK = 0x09, > + SGX_EPA = 0x0A, > + SGX_EWB = 0x0B, > + SGX_ETRACK = 0x0C, > + SGX_EAUG = 0x0D, > + SGX_EMODPR = 0x0E, > + SGX_EMODT = 0x0F, > +}; > + > +#define SGX_MODULUS_SIZE 384 > + > +/** > + * enum sgx_miscselect - additional information to an SSA frame > + * %SGX_MISC_EXINFO: Report #PF or #GP to the SSA frame. > + * > + * Save State Area (SSA) is a stack inside the enclave used to store processor > + * state when an exception or interrupt occurs. This enum defines additional > + * information stored to an SSA frame. > + */ > +enum sgx_miscselect { > + SGX_MISC_EXINFO = BIT(0), > +}; > + > +#define SGX_MISC_RESERVED_MASK GENMASK_ULL(63, 1) > + > +#define SGX_SSA_GPRS_SIZE 182 > +#define SGX_SSA_MISC_EXINFO_SIZE 16 > + > +/** > + * enum sgx_attributes - the attributes field in &struct sgx_secs > + * %SGX_ATTR_INIT: Enclave can be entered (is initialized). > + * %SGX_ATTR_DEBUG: Allow ENCLS(EDBGRD) and ENCLS(EDBGWR). > + * %SGX_ATTR_MODE64BIT: Tell that this a 64-bit enclave. > + * %SGX_ATTR_PROVISIONKEY: Allow to use provisioning keys for remote > + * attestation. > + * %SGX_ATTR_KSS: Allow to use key separation and sharing (KSS). > + * %SGX_ATTR_EINITTOKENKEY: Allow to use token signing key that is used to > + * sign cryptographic tokens that can be passed to > + * EINIT as an authorization to run an enclave. > + */ > +enum sgx_attribute { > + SGX_ATTR_INIT = BIT(0), > + SGX_ATTR_DEBUG = BIT(1), > + SGX_ATTR_MODE64BIT = BIT(2), > + SGX_ATTR_PROVISIONKEY = BIT(4), > + SGX_ATTR_EINITTOKENKEY = BIT(5), > + SGX_ATTR_KSS = BIT(7), > +}; > + > +#define SGX_ATTR_RESERVED_MASK (BIT_ULL(3) | BIT_ULL(7) | GENMASK_ULL(63, 8)) Looking how bit 7 is part of the reserved mask but you have it above as SGX_ATTR_KSS too. Bit 6, OTOH, is not mentioned anywhere and it very much looks like you need to have BIT_ULL(6) above as part of the reserved mask instead of bit 7. Hmmm? > +#define SGX_ATTR_ALLOWED_MASK (SGX_ATTR_DEBUG | SGX_ATTR_MODE64BIT | \ > + SGX_ATTR_KSS) > +#define SGX_SECS_RESERVED1_SIZE 24 > +#define SGX_SECS_RESERVED2_SIZE 32 > +#define SGX_SECS_RESERVED3_SIZE 96 > +#define SGX_SECS_RESERVED4_SIZE 3836 I'd make those defines shorter... > + > +/** > + * struct sgx_secs - SGX Enclave Control Structure (SECS) > + * @size: size of the address space > + * @base: base address of the address space > + * @ssa_frame_size: size of an SSA frame > + * @miscselect: additional information stored to an SSA frame > + * @attributes: attributes for enclave > + * @xfrm: XSave-Feature Request Mask (subset of XCR0) > + * @mrenclave: SHA256-hash of the enclave contents > + * @mrsigner: SHA256-hash of the public key used to sign the SIGSTRUCT > + * @isvprodid: a user-defined value that is used in key derivation > + * @isvsvn: a user-defined value that is used in key derivation > + * > + * SGX Enclave Control Structure (SECS) is a special enclave page that is not > + * visible in the address space. In fact, this structure defines the address > + * range and other global attributes for the enclave and it is the first EPC > + * page created for any enclave. It is moved from a temporary buffer to an EPC > + * by the means of ENCLS(ECREATE) leaf. > + */ > +struct sgx_secs { > + u64 size; > + u64 base; > + u32 ssa_frame_size; > + u32 miscselect; > + u8 reserved1[SGX_SECS_RESERVED1_SIZE]; > + u64 attributes; > + u64 xfrm; > + u32 mrenclave[8]; > + u8 reserved2[SGX_SECS_RESERVED2_SIZE]; > + u32 mrsigner[8]; > + u8 reserved3[SGX_SECS_RESERVED3_SIZE]; > + u16 isvprodid; > + u16 isvsvn; > + u8 reserved4[SGX_SECS_RESERVED4_SIZE]; ... so that they don't stick too much here. ... -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette