Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3287100pxb; Tue, 19 Jan 2021 20:06:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJzAwYWbtu7r8dbomA1+3ZcCxJNKANlqcoIA/J7J/BJia7Dj76jKq4XEmTCfIvIirB+DQVSK X-Received: by 2002:a17:906:1796:: with SMTP id t22mr4741441eje.372.1611115580391; Tue, 19 Jan 2021 20:06:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611115580; cv=none; d=google.com; s=arc-20160816; b=lS0yme+S3vNXDboG9HJS45KeFckc3j916Fhe4CAefbrCLYenLCIt7655eSpLiWvy9f 6pFCC7ph+V3Lr65KwXrdCo+hU1kCkmeCTRYOEOBS9k+UavRdgBOUb71U/uZtulY376TT ugt1FdLm2nHKTfCOpPdWz44k60yvls+Pg7MeCg8CzK6fQndlqOyUNyfG/0zM3i95Hq3R w96rkji6DOiXIgRQDfngpPOSw6zZlXKEoKRn3ZOIOwbmCF3Eg+PItx8dypcGNnphl2TF NBOHmkKGWN8GsI+/OTu5vkrhaqWsdiPRREPh25EZJY1Kko2L3rmt2TARWyqC+An1p0on Cybw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=q2XDGgL6oOSUUjgXJ1GyTey2zyFWB7TYMMkQGTQnlKA=; b=gTx5sOK39pj1ktJYu7yoNg6hEUzqRzkroEgXx2QZPf7+/l7os+MsXaJLzBT2rASPii +h0wsQkXOEc6xRgdImpStObCH+VbSSJpS9RXnVtIS5QfkcYgP3QEltIsLV4hwFe0hLfQ dnkfVg7sU2wIpPoxv6TYufW4UJUvE66OYsfoz8dh6jcjPQuFKD9JeoA8IGwg7c24LpEr c0xndMHEo9O/v+Cj9Z1u/Mat93roEWvkW7gzrOkKI3zx0hfz9o8+Ja7bp2lkDjfsVOUU YR4xBTZJ6bK96bSdU3azDR0Ib8LdRZmSiCwgGTefgK0Q+IxLLuEbOkK3RWerpXrvz0Hj /Szg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f6si363579edq.152.2021.01.19.20.05.55; Tue, 19 Jan 2021 20:06:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725968AbhATD7t (ORCPT + 99 others); Tue, 19 Jan 2021 22:59:49 -0500 Received: from out30-57.freemail.mail.aliyun.com ([115.124.30.57]:54481 "EHLO out30-57.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729321AbhATDxz (ORCPT ); Tue, 19 Jan 2021 22:53:55 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R811e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04423;MF=tianjia.zhang@linux.alibaba.com;NM=1;PH=DS;RN=11;SR=0;TI=SMTPD_---0UMIdG0V_1611114789; Received: from localhost(mailfrom:tianjia.zhang@linux.alibaba.com fp:SMTPD_---0UMIdG0V_1611114789) by smtp.aliyun-inc.com(127.0.0.1); Wed, 20 Jan 2021 11:53:10 +0800 From: Tianjia Zhang To: Jarkko Sakkinen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Sean Christopherson , x86@kernel.org, linux-sgx@vger.kernel.org, linux-kernel@vger.kernel.org, Jia Zhang Cc: Tianjia Zhang Subject: [PATCH v2] x86/sgx: Allows ioctl PROVISION to execute before CREATE Date: Wed, 20 Jan 2021 11:53:09 +0800 Message-Id: <20210120035309.19545-1-tianjia.zhang@linux.alibaba.com> X-Mailer: git-send-email 2.19.1.3.ge56e4f7 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In function sgx_encl_create(), the logic of directly assigning value to attributes_mask determines that the call to SGX_IOC_ENCLAVE_PROVISION must be after the command of SGX_IOC_ENCLAVE_CREATE. If move this assignment statement to function sgx_open(), the PROVISION command can be executed earlier and more flexibly. Reported-by: Jia Zhang Suggested-by: Sean Christopherson Signed-off-by: Tianjia Zhang --- arch/x86/kernel/cpu/sgx/driver.c | 3 +++ arch/x86/kernel/cpu/sgx/ioctl.c | 1 - 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/arch/x86/kernel/cpu/sgx/driver.c b/arch/x86/kernel/cpu/sgx/driver.c index f2eac41bb4ff..8766580194ae 100644 --- a/arch/x86/kernel/cpu/sgx/driver.c +++ b/arch/x86/kernel/cpu/sgx/driver.c @@ -36,6 +36,9 @@ static int sgx_open(struct inode *inode, struct file *file) return ret; } + encl->attributes_mask = SGX_ATTR_DEBUG | SGX_ATTR_MODE64BIT | + SGX_ATTR_KSS; + file->private_data = encl; return 0; diff --git a/arch/x86/kernel/cpu/sgx/ioctl.c b/arch/x86/kernel/cpu/sgx/ioctl.c index 90a5caf76939..1c6ecf9fbeff 100644 --- a/arch/x86/kernel/cpu/sgx/ioctl.c +++ b/arch/x86/kernel/cpu/sgx/ioctl.c @@ -109,7 +109,6 @@ static int sgx_encl_create(struct sgx_encl *encl, struct sgx_secs *secs) encl->base = secs->base; encl->size = secs->size; encl->attributes = secs->attributes; - encl->attributes_mask = SGX_ATTR_DEBUG | SGX_ATTR_MODE64BIT | SGX_ATTR_KSS; /* Set only after completion, as encl->lock has not been taken. */ set_bit(SGX_ENCL_CREATED, &encl->flags); -- 2.19.1.3.ge56e4f7