Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3790168pxb; Mon, 1 Feb 2021 04:59:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJwIve+HBUAjVbpgzQP0dmCMgQPl0A7Th/wrxLWcJxWbyiE7dzWhUkdS9rkc7eSNrzNh6t17 X-Received: by 2002:a17:906:2d0:: with SMTP id 16mr10405542ejk.373.1612184398196; Mon, 01 Feb 2021 04:59:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612184398; cv=none; d=google.com; s=arc-20160816; b=WTM3klvS1L04jIA2xQ0zKlv3G7A+bCW0IUo/GtromUYE/ThVF61FZgzT7krIxBAga/ izp2WIGzLjvdYa0eEEA7kSDTaX7v8QHEI96K8yW53pQI/KI4Y50g1Kds1AS8fMCwBoTv mENPt7brcp1+CEjagZl+CaWirE+06EVqA14VC3r9oi5Lvx1tHyvyk0103kGSXXzWVyZA wvfmq3GynArYMCxrvwUH8KuoGxyK2Fyo2TkkISN6ax20663rfSmimaOpTRWPRuz5ywC7 k409nvvSuN8aCvaIMNKEl27sEiqtEejsrTxT+eOhWx45mngC4GMVvXF/TIdPNQSt1D/r 6RFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=jDlP8SvGUQfYQik5vFEQY6Gd3ycv/DE9qNLksSKnC4I=; b=ch9AEZLGlMhacywWMRnFt8M6+0OVAe41ibGt3HGyppPiP/R2ygXMHBHeitWLrLCojS UODbvWXf7VokDXiCrHaXa6XNP/Qdup2hrdLztqQcdphNoz7xpuYBB+w5s0Gi8Zg/Z9BB IvgLcHNwJdLqWBSQu9ukdKaKYudnA/40wR4763CYpiLGchDestHFuHp+/Km92yzWwepd SwNxZQ4G8v9pobrua9O64uByfMhMP8y4fbLibDc2xGR2Xh0QbUV21K4PmQL1wNKZIcAW CoJlwDGLzCnOnNKbP4yAt+Ee3QrX6zr6Mw8o/XDj4E0gWZ+Z7pFmPN1/Ht6whMcosau+ UaGA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u23si2187801edi.71.2021.02.01.04.59.33; Mon, 01 Feb 2021 04:59:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231822AbhBAM4t (ORCPT + 99 others); Mon, 1 Feb 2021 07:56:49 -0500 Received: from out30-57.freemail.mail.aliyun.com ([115.124.30.57]:42581 "EHLO out30-57.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231584AbhBAM4o (ORCPT ); Mon, 1 Feb 2021 07:56:44 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R941e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04400;MF=tianjia.zhang@linux.alibaba.com;NM=1;PH=DS;RN=12;SR=0;TI=SMTPD_---0UNa.ooL_1612184152; Received: from B-455UMD6M-2027.local(mailfrom:tianjia.zhang@linux.alibaba.com fp:SMTPD_---0UNa.ooL_1612184152) by smtp.aliyun-inc.com(127.0.0.1); Mon, 01 Feb 2021 20:55:53 +0800 Subject: Re: [PATCH v3 4/5] x86/sgx: Allows ioctl PROVISION to execute before CREATE To: Jarkko Sakkinen Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Sean Christopherson , Shuah Khan , x86@kernel.org, linux-sgx@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Jia Zhang References: <20210124062907.88229-1-tianjia.zhang@linux.alibaba.com> <20210124062907.88229-5-tianjia.zhang@linux.alibaba.com> From: Tianjia Zhang Message-ID: <478a3f95-c11e-ea37-2a80-c0976c7a189e@linux.alibaba.com> Date: Mon, 1 Feb 2021 20:55:51 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/30/21 9:26 PM, Jarkko Sakkinen wrote: > On Sun, Jan 24, 2021 at 02:29:06PM +0800, Tianjia Zhang wrote: >> In the function sgx_create_enclave(), the direct assignment >> operation of attributes_mask determines that the ioctl PROVISION >> operation must be executed after the ioctl CREATE operation, >> which will limit the flexibility of sgx developers. >> >> This patch takes the assignment of `attributes_mask` from the >> function sgx_create_enclave() has been moved to the function >> sgx_open() to avoid this restriction. >> >> Signed-off-by: Tianjia Zhang > > The commit message should explicit that the API behaviour changes > as the result. Please don't use hyphens in quoting. > > /Jarkko > Will be improved in the next version. Best regards, Tianjia >> --- >> arch/x86/kernel/cpu/sgx/driver.c | 1 + >> arch/x86/kernel/cpu/sgx/ioctl.c | 1 - >> 2 files changed, 1 insertion(+), 1 deletion(-) >> >> diff --git a/arch/x86/kernel/cpu/sgx/driver.c b/arch/x86/kernel/cpu/sgx/driver.c >> index f2eac41bb4ff..fba0d0bfe976 100644 >> --- a/arch/x86/kernel/cpu/sgx/driver.c >> +++ b/arch/x86/kernel/cpu/sgx/driver.c >> @@ -36,6 +36,7 @@ static int sgx_open(struct inode *inode, struct file *file) >> return ret; >> } >> >> + encl->attributes_mask = SGX_ATTR_DEBUG | SGX_ATTR_MODE64BIT | SGX_ATTR_KSS; >> file->private_data = encl; >> >> return 0; >> diff --git a/arch/x86/kernel/cpu/sgx/ioctl.c b/arch/x86/kernel/cpu/sgx/ioctl.c >> index 90a5caf76939..1c6ecf9fbeff 100644 >> --- a/arch/x86/kernel/cpu/sgx/ioctl.c >> +++ b/arch/x86/kernel/cpu/sgx/ioctl.c >> @@ -109,7 +109,6 @@ static int sgx_encl_create(struct sgx_encl *encl, struct sgx_secs *secs) >> encl->base = secs->base; >> encl->size = secs->size; >> encl->attributes = secs->attributes; >> - encl->attributes_mask = SGX_ATTR_DEBUG | SGX_ATTR_MODE64BIT | SGX_ATTR_KSS; >> >> /* Set only after completion, as encl->lock has not been taken. */ >> set_bit(SGX_ENCL_CREATED, &encl->flags); >> -- >> 2.19.1.3.ge56e4f7 >> >>