Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp6637359ybi; Wed, 5 Jun 2019 04:13:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqyzcdMyahJNuQ6C7bWoPAQvRgCv2vgQoVFZMHpTyLZdAfxFlqlk9I6u+/0dmDntLDrLLKWj X-Received: by 2002:a17:902:2ba9:: with SMTP id l38mr36348581plb.300.1559733182760; Wed, 05 Jun 2019 04:13:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559733182; cv=none; d=google.com; s=arc-20160816; b=Q6rvH1dVi6Gb1IJwbIas6eitUatYn30bXDN2R6LSOeieZ9CNM5vrVcF2cx5Eo49elZ IvIBMUIyY/YGXq6j222jJfTcnrkS+zpYvlvVzPDvzrywIwKeNlumUMnrTFBIbGqhp6Fu dkzaokBCylCL4T9/IdkcFrxaNd3IvVCE5rqWw8tKnhKekCy5cZ1uN9Sa/ubBtpMyjdGK yNmQWnsHaLAC+JMTpJ+xDXQZMOHq/zuUybDYIqN1OUahlcatSEUzs5Cj2XTChieVHRF2 TlUg71fuEfWEYbZjvrO7vLiY2pKYHzRdzT7ur0lQIipy6cNTvJP8sBYS5ilIXCn+Ptzc jGyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :dlp-reaction:dlp-version:dlp-product:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from; bh=cdIASUpycSxEyCcOENTB6x8hQyMgHYxusk4eXz4Kzvg=; b=nIQV4tIl66zVp/fd/qqD/PlOHGkqv2FyNwpSugsuqS9gEAqz9sHk8AjwB4gWRimQaL 5fOx8uXg+x/haBkb37BdMpmQ9tG6fQ7ZSvBk0O+7sC1vRO3Pzwru5/+VRsql/BebFIaT PddSLF+qONHk1c0liF9B3yiGSUeYeYxnUF6fAYKE8YRvR0G6dtQaQh6Tv/fbiCgPpG01 rfuSN6m9SojYNTILkOpD3PbfQykyGW6Re2QqhjCD4Kk/r+ZAcsPvs7tEqGn0vBCOV+F3 PnaupgFgbu7KccaXvewRahghodbe7KzrhPaB8AqsaLgt56b8KgxH3VwZV0YTRL4HzjEZ Ae0w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c21si17807796pgg.66.2019.06.05.04.12.43; Wed, 05 Jun 2019 04:13:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727400AbfFELKw convert rfc822-to-8bit (ORCPT + 99 others); Wed, 5 Jun 2019 07:10:52 -0400 Received: from mga14.intel.com ([192.55.52.115]:43361 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727154AbfFELKv (ORCPT ); Wed, 5 Jun 2019 07:10:51 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Jun 2019 04:10:50 -0700 X-ExtLoop1: 1 Received: from fmsmsx108.amr.corp.intel.com ([10.18.124.206]) by orsmga007.jf.intel.com with ESMTP; 05 Jun 2019 04:10:49 -0700 Received: from fmsmsx112.amr.corp.intel.com (10.18.116.6) by FMSMSX108.amr.corp.intel.com (10.18.124.206) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 5 Jun 2019 04:10:49 -0700 Received: from HASMSX109.ger.corp.intel.com (10.184.198.21) by FMSMSX112.amr.corp.intel.com (10.18.116.6) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 5 Jun 2019 04:10:48 -0700 Received: from hasmsx108.ger.corp.intel.com ([169.254.9.66]) by hasmsx109.ger.corp.intel.com ([169.254.3.53]) with mapi id 14.03.0415.000; Wed, 5 Jun 2019 14:10:46 +0300 From: "Ayoun, Serge" To: "Christopherson, Sean J" CC: Andy Lutomirski , "Xing, Cedric" , Stephen Smalley , James Morris , "Serge E . Hallyn" , LSM List , Paul Moore , Eric Paris , "selinux@vger.kernel.org" , Jethro Beekman , "Hansen, Dave" , Thomas Gleixner , "Linus Torvalds" , LKML , X86 ML , "linux-sgx@vger.kernel.org" , Andrew Morton , "nhorman@redhat.com" , "npmccallum@redhat.com" , "Katz-zamir, Shay" , "Huang, Haitao" , "Jarkko Sakkinen" , Andy Shevchenko , "Svahn, Kai" , Borislav Petkov , Josh Triplett , "Huang, Kai" , David Rientjes , "Roberts, William C" , "Tricca, Philip B" Subject: RE: [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES Thread-Topic: [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES Thread-Index: AQHVGAkkmG7HFOrZhE6WGVzca6YfCqaM7RtA Date: Wed, 5 Jun 2019 11:10:44 +0000 Message-ID: <88B7642769729B409B4A93D7C5E0C5E7C64475FB@hasmsx108.ger.corp.intel.com> References: <20190531233159.30992-1-sean.j.christopherson@intel.com> <20190531233159.30992-7-sean.j.christopherson@intel.com> In-Reply-To: <20190531233159.30992-7-sean.j.christopherson@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiNWY0NjBiOTctZTkxMy00Nzg1LTk4OTgtMmQ1NTAwYTZmZDU0IiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX05UIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE3LjEwLjE4MDQuNDkiLCJUcnVzdGVkTGFiZWxIYXNoIjoiZndTM0lNaWlzSTNSU3hoc3M5TlNjc2xyXC94cVBuaTFseGdTQ01SeUYzQXlUMHBnOHJkQjhTMGdERTYzZ2tFdkQifQ== x-ctpclassification: CTP_NT dlp-product: dlpe-windows dlp-version: 11.0.600.7 dlp-reaction: no-action x-originating-ip: [10.184.70.11] Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > From: Christopherson, Sean J > Sent: Saturday, June 01, 2019 02:32 > > /** > * struct sgx_enclave_add_pages - parameter structure for the > * %SGX_IOC_ENCLAVE_ADD_PAGES ioctl > @@ -39,6 +44,7 @@ struct sgx_enclave_create { > * @secinfo: address for the SECINFO data (common to all pages) > * @nr_pages: number of pages (must be virtually contiguous) > * @mrmask: bitmask for the measured 256 byte chunks (common to all > pages) > + * @flags: flags, e.g. SGX_ALLOW_{READ,WRITE,EXEC} (common to all > pages) > */ > struct sgx_enclave_add_pages { > __u64 addr; > @@ -46,7 +52,8 @@ struct sgx_enclave_add_pages { > __u64 secinfo; > __u32 nr_pages; > __u16 mrmask; > -} __attribute__((__packed__)); > + __u16 flags; > +}; You are adding a flags member. The secinfo structure has already a flags member in it. Why do you need both - they are both coming from user mode. What kind of scenario would require having different values. Seems confusing. --------------------------------------------------------------------- Intel Israel (74) Limited This e-mail and any attachments may contain confidential material for the sole use of the intended recipient(s). Any review or distribution by others is strictly prohibited. If you are not the intended recipient, please contact the sender and delete all copies.