Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2211238pxb; Sat, 23 Jan 2021 22:33:30 -0800 (PST) X-Google-Smtp-Source: ABdhPJzlN4lbdN5YIB5nNzZGC+9CDiNTSIdtCwVul21zmCqExTSgRW90E8b/FUJSj5WXPcql0Nuf X-Received: by 2002:a17:906:358f:: with SMTP id o15mr105379ejb.369.1611470009893; Sat, 23 Jan 2021 22:33:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611470009; cv=none; d=google.com; s=arc-20160816; b=eve9UlsM2oYi1AuuvxD4c8MkfMCIFgzO9ZBB0F0gSoHZiPxyoEZHJSV3r+RgTf1BNg W6O7GiiNCKhhDNKtoAS5gYynrviP+rCXOBWV8Tglsu6t8smEirsM5t5QG1oGsp/cGYH5 DyY7f0DvFBtAMrCe2uuZA25cZ7TSGbQZdMzmDDjwDbBkoqGgw0ml5l64PPwSW8os7dY5 S+YmBhMPeE8ooFc4dwbSekZMGXpePg6kd0B89dB8H1H2Nb5YXe6D9B4HI34FVchU5gcR /S1TEzMX/n6Frqr6o5lNNowwDGuHSccKEELJUFlM6TBRT4Z36cz1bJ2uRiKihTrCA1Xj fyLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=2uTlvAYJFAmyvqgbmFLdv3WWRW2LBDFWx9st3T8ZMi8=; b=OMSbUMVDCHmFy71LJvJ57W8kLgvtrvvqi6mHxAKCDj0xo20VdxopQO3dCOy+4PTOEq islNgzAaTBeqaZvfbjXB0TIn30Z7kqz29nz5tmS8YvLBpcFUaPdWa8HUV9QU5EOuW8jw aazl/qKy0tiicfpmQ7nTtjsBFSpOzm6PbWpHkSxbPPZnBdHaPwWRLLM090i0YFdXmqfB BImfnoUmwvTaompqdZOFcMWm2PXPLtgzAgUAbtcE8PSJj3WwUKyijjMERZIaN0aioSMt RZzellu1T+EwWccUpoGqp9LJQJNNwhmNmET+y/kBtDUj/MJqx24qh2tDCZayGIhLvgHy 4UkQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y1si4692312ejm.62.2021.01.23.22.33.06; Sat, 23 Jan 2021 22:33:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726583AbhAXGbR (ORCPT + 99 others); Sun, 24 Jan 2021 01:31:17 -0500 Received: from out30-131.freemail.mail.aliyun.com ([115.124.30.131]:60050 "EHLO out30-131.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726569AbhAXGbI (ORCPT ); Sun, 24 Jan 2021 01:31:08 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R181e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04357;MF=tianjia.zhang@linux.alibaba.com;NM=1;PH=DS;RN=13;SR=0;TI=SMTPD_---0UMf9yus_1611469749; Received: from localhost(mailfrom:tianjia.zhang@linux.alibaba.com fp:SMTPD_---0UMf9yus_1611469749) by smtp.aliyun-inc.com(127.0.0.1); Sun, 24 Jan 2021 14:29:09 +0800 From: Tianjia Zhang To: Jarkko Sakkinen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Sean Christopherson , Shuah Khan , x86@kernel.org, linux-sgx@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Jia Zhang Cc: Tianjia Zhang Subject: [PATCH v3 4/5] x86/sgx: Allows ioctl PROVISION to execute before CREATE Date: Sun, 24 Jan 2021 14:29:06 +0800 Message-Id: <20210124062907.88229-5-tianjia.zhang@linux.alibaba.com> X-Mailer: git-send-email 2.19.1.3.ge56e4f7 In-Reply-To: <20210124062907.88229-1-tianjia.zhang@linux.alibaba.com> References: <20210124062907.88229-1-tianjia.zhang@linux.alibaba.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the function sgx_create_enclave(), the direct assignment operation of attributes_mask determines that the ioctl PROVISION operation must be executed after the ioctl CREATE operation, which will limit the flexibility of sgx developers. This patch takes the assignment of `attributes_mask` from the function sgx_create_enclave() has been moved to the function sgx_open() to avoid this restriction. Signed-off-by: Tianjia Zhang --- arch/x86/kernel/cpu/sgx/driver.c | 1 + arch/x86/kernel/cpu/sgx/ioctl.c | 1 - 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kernel/cpu/sgx/driver.c b/arch/x86/kernel/cpu/sgx/driver.c index f2eac41bb4ff..fba0d0bfe976 100644 --- a/arch/x86/kernel/cpu/sgx/driver.c +++ b/arch/x86/kernel/cpu/sgx/driver.c @@ -36,6 +36,7 @@ static int sgx_open(struct inode *inode, struct file *file) return ret; } + encl->attributes_mask = SGX_ATTR_DEBUG | SGX_ATTR_MODE64BIT | SGX_ATTR_KSS; file->private_data = encl; return 0; diff --git a/arch/x86/kernel/cpu/sgx/ioctl.c b/arch/x86/kernel/cpu/sgx/ioctl.c index 90a5caf76939..1c6ecf9fbeff 100644 --- a/arch/x86/kernel/cpu/sgx/ioctl.c +++ b/arch/x86/kernel/cpu/sgx/ioctl.c @@ -109,7 +109,6 @@ static int sgx_encl_create(struct sgx_encl *encl, struct sgx_secs *secs) encl->base = secs->base; encl->size = secs->size; encl->attributes = secs->attributes; - encl->attributes_mask = SGX_ATTR_DEBUG | SGX_ATTR_MODE64BIT | SGX_ATTR_KSS; /* Set only after completion, as encl->lock has not been taken. */ set_bit(SGX_ENCL_CREATED, &encl->flags); -- 2.19.1.3.ge56e4f7