Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp4241313ybh; Tue, 17 Mar 2020 15:10:47 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvoYE9eNutcCXBg1NXLk3Gxt/rvHbFwRGYAoZCiQRAv/zhubqrbdSAoKD3LrOjHi658BrDR X-Received: by 2002:aca:ac46:: with SMTP id v67mr898374oie.62.1584483047079; Tue, 17 Mar 2020 15:10:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584483047; cv=none; d=google.com; s=arc-20160816; b=Y2fh/nGgrZkil8AMjMMSMRwka6I1C19KrQRmND103s8UwT80qHVtodSmidmQ/GGrAZ gbm2VtJdvx4clw0EEzfIKh2FfkX8XDz5gmXT9XDWL0AAtpy0o9nHjLMQDPjAD7SRaW9m tRDYS+nDey6kdawL5vd+FG2ad5AVYJEaiVGqKU1LgQjiYJReZQoikHu1cK4+f6cboI74 lipQ5P559U4MDos0Mn7Q/PLQfHfZgiFe+NOSsPOt5azwfilD+fXS4k2aEN4gPhCuZ+MP gWst0LediwqP7bCTtX0I0v0dqmk+pLvdDY0QYMjplwCZgP6C2m/t+sGNVpti+8+foaqM 6Jog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=VfOF63BA4uWvZgSaEs/n+1yJh7PxARi1D7ZpqJY0bik=; b=yRurDXyUSeBbHBtBY6FVaUEltH/lRMR0su+m/fyHJEmHyynQVYNHL263aDvJQQBIRZ YvUOq6EencsxBQqeZpiA5GCjWCN5GgmZbhTTz72+lTtzNIBv7y6LUrrhxKdgLWo5/5tu G4VfRHKgZkw8iw2i3WeE9aS1fbxuF0wj0HjUerzZdHloUqVivHwSV4/1NBSlprBPWARW XnQ5jxrgIs0SIf2EsYd7Jw5B4IJsZu0wA8c5hlj8XphMZfWFoTE3W2DLEChEkpjjPBb6 jA33JMpHt+JfT2iQKGyhb1ov4fiBPEHf5Mi6TcJRCvTN33vZCCbzVeXV5acxfUyG0CdR CDEQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f20si2289973oti.224.2020.03.17.15.10.32; Tue, 17 Mar 2020 15:10:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726998AbgCQWKD (ORCPT + 99 others); Tue, 17 Mar 2020 18:10:03 -0400 Received: from mga14.intel.com ([192.55.52.115]:34823 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726549AbgCQWKD (ORCPT ); Tue, 17 Mar 2020 18:10:03 -0400 IronPort-SDR: TMVEEKVUfsYj4L/QHQMvtWwb/yR1raTHFvohlANzTYh7Etv8Qgy9Pkmhjuy7yXt/wUnQn4/ZUv bQrRE8165AVw== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Mar 2020 15:09:49 -0700 IronPort-SDR: NP0szG/2mGRotf576QdlCabAdaPmVU+IN+qaFxzumpyTXaqcEelFsaQNdPsUXWjFJvyH1nZolv JO1XRxtbQBNQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,565,1574150400"; d="scan'208";a="355504118" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.202]) by fmsmga001.fm.intel.com with ESMTP; 17 Mar 2020 15:09:48 -0700 Date: Tue, 17 Mar 2020 15:09:48 -0700 From: Sean Christopherson To: "Xing, Cedric" Cc: Nathaniel McCallum , Jarkko Sakkinen , linux-kernel@vger.kernel.org, x86@kernel.org, linux-sgx@vger.kernel.org, akpm@linux-foundation.org, dave.hansen@intel.com, Neil Horman , "Huang, Haitao" , andriy.shevchenko@linux.intel.com, tglx@linutronix.de, "Svahn, Kai" , bp@alien8.de, Josh Triplett , luto@kernel.org, kai.huang@intel.com, David Rientjes , Patrick Uiterwijk , Andy Lutomirski , Jethro Beekman , Connor Kuehl , Harald Hoyer , Lily Sturmann Subject: Re: [PATCH v28 21/22] x86/vdso: Implement a vDSO for Intel SGX enclave call Message-ID: <20200317220948.GB14566@linux.intel.com> References: <94ce05323c4de721c4a6347223885f2ad9f541af.camel@linux.intel.com> <5dc2ec4bc9433f9beae824759f411c32b45d4b74.camel@linux.intel.com> <20200316225322.GJ24267@linux.intel.com> <20200316235934.GM24267@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 17, 2020 at 02:40:34PM -0700, Xing, Cedric wrote: > Hi Nathaniel, > > I reread your email today and thought I might have misunderstood your email > earlier. What changes are you asking for exactly? Is that just passing @leaf > in %ecx rather than in %eax? If so, I wouldn't have any problem. I agree > with you that the resulted API would then be callable from C, even though it > wouldn't be able to return back to C due to tampered %rbx. But I think the > vDSO API can preserve %rbx too, given it is used by both EENTER and EEXIT > (so is unavailable for parameter passing anyway). Alternatively, the C > caller can setjmp() to be longjmp()'d back from within the exit handler. Yep, exactly. The other proposed change that is fairly straightforward is to make the save/restore of %rsp across the exit handler call relative instead of absolute, i.e. allow the exit handler to modify %rsp. I don't think this would conflict with the Intel SDK usage model? diff --git a/arch/x86/entry/vdso/vsgx_enter_enclave.S b/arch/x86/entry/vdso/vsgx_enter_enclave.S index 94a8e5f99961..05d54f79b557 100644 --- a/arch/x86/entry/vdso/vsgx_enter_enclave.S +++ b/arch/x86/entry/vdso/vsgx_enter_enclave.S @@ -139,8 +139,9 @@ SYM_FUNC_START(__vdso_sgx_enter_enclave) /* Pass the untrusted RSP (at exit) to the callback via %rcx. */ mov %rsp, %rcx - /* Save the untrusted RSP in %rbx (non-volatile register). */ + /* Save the untrusted RSP offset in %rbx (non-volatile register). */ mov %rsp, %rbx + and $0xf, %rbx /* * Align stack per x86_64 ABI. Note, %rsp needs to be 16-byte aligned @@ -161,8 +162,8 @@ SYM_FUNC_START(__vdso_sgx_enter_enclave) mov 0x20(%rbp), %rax call .Lretpoline - /* Restore %rsp to its post-exit value. */ - mov %rbx, %rsp + /* Undo the post-exit %rsp adjustment. */ + lea 0x20(%rsp,%rbx), %rsp