Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3811271pxb; Mon, 1 Feb 2021 05:29:49 -0800 (PST) X-Google-Smtp-Source: ABdhPJz9L158Vj9cPcECcwPBDNYw/2mLD31bw42oBKyqNj5nA4MxFPY0VPZWhYJ+gUicYow8jFHr X-Received: by 2002:aa7:de8f:: with SMTP id j15mr19141384edv.268.1612186189277; Mon, 01 Feb 2021 05:29:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612186189; cv=none; d=google.com; s=arc-20160816; b=nNN11+diBBV/pGGTR18KbwIUTKhxJUpQlS5aDMbBPJqc0vDHu+ySKjNh4v3u01Vupy +ohuHxBdFrqLeVPTcod8JWm5m9Fpw8/z98Dge8PKybxpLwJLRdx6IsHaebm/KwRdssAw vAYEVKjH2clPMTHhXXGPlTiBtZ37C5rULVwIcC1qp63uWlfnO3OmvykpKQAMFcmr2/Ti AXxwqrtu67CXsCYwXbtcLNpiDuL8mhvei7RSKWYyp71u1s36dhCYimHm325nqHfUuIRJ BiaijLvuC+LelivzStDMPjMFBcpI11yI/w270M/hV+qxbPBxy7KyrFtSs94yhCCn/mXZ HwbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=9WVmke+r/nSyN+KY1mcrvoOkDHtHkZ5YYTqEOKlvuMg=; b=r5Slt0/88eb07JyNkjXRZxl1MwSaV4+jZ/zEYbaIFaf/wDZ5Ov/u8/I1YJaKnN8MPf E4WFD+huZ1MWfjWdRDfSkYT0lTWA+UZgFNnI3/OIb2if3Mm567MND4l6wmWZK/Hkk2wo IV/ALS5DKr/GWoaBGUoIY0Yn+5aHI6PoSfzyYASJb03qCJoyHkFKf8Ymjpj2qQDfyBeM uT8fqUiWF4AWBm4hT2jmoNYRkgScXkMaRcwr4AUJmrUVLrnD0ZydiIJM6m8LYexowcEu oDZTzwjPWAaFguVBAHaUf7dxAYCjMj0qPQYMKY3BuLJcXC7Qm3EKROwffKkXxMshJcg2 rtuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j15si11257561edw.310.2021.02.01.05.29.24; Mon, 01 Feb 2021 05:29:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231867AbhBAN2N (ORCPT + 99 others); Mon, 1 Feb 2021 08:28:13 -0500 Received: from out30-131.freemail.mail.aliyun.com ([115.124.30.131]:48205 "EHLO out30-131.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231511AbhBAN1s (ORCPT ); Mon, 1 Feb 2021 08:27:48 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R101e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e01424;MF=tianjia.zhang@linux.alibaba.com;NM=1;PH=DS;RN=13;SR=0;TI=SMTPD_---0UNbByqp_1612186014; Received: from localhost(mailfrom:tianjia.zhang@linux.alibaba.com fp:SMTPD_---0UNbByqp_1612186014) by smtp.aliyun-inc.com(127.0.0.1); Mon, 01 Feb 2021 21:26:55 +0800 From: Tianjia Zhang To: Jarkko Sakkinen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Sean Christopherson , Shuah Khan , x86@kernel.org, linux-sgx@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Jia Zhang Cc: Tianjia Zhang Subject: [PATCH v4 4/5] x86/sgx: Allows ioctl PROVISION to execute before CREATE Date: Mon, 1 Feb 2021 21:26:52 +0800 Message-Id: <20210201132653.35690-5-tianjia.zhang@linux.alibaba.com> X-Mailer: git-send-email 2.19.1.3.ge56e4f7 In-Reply-To: <20210201132653.35690-1-tianjia.zhang@linux.alibaba.com> References: <20210201132653.35690-1-tianjia.zhang@linux.alibaba.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the function sgx_create_enclave(), the direct assignment operation of attributes_mask determines that the ioctl PROVISION operation must be executed after the ioctl CREATE operation, which will limit the flexibility of sgx developers. This patch takes the assignment of attributes_mask from the function sgx_create_enclave() has been moved to the function sgx_open(), this will allow users to perform ioctl PROVISION operations before ioctl CREATE, increase the flexibility of the API and reduce restrictions. Signed-off-by: Tianjia Zhang --- arch/x86/kernel/cpu/sgx/driver.c | 1 + arch/x86/kernel/cpu/sgx/ioctl.c | 1 - 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kernel/cpu/sgx/driver.c b/arch/x86/kernel/cpu/sgx/driver.c index f2eac41bb4ff..fba0d0bfe976 100644 --- a/arch/x86/kernel/cpu/sgx/driver.c +++ b/arch/x86/kernel/cpu/sgx/driver.c @@ -36,6 +36,7 @@ static int sgx_open(struct inode *inode, struct file *file) return ret; } + encl->attributes_mask = SGX_ATTR_DEBUG | SGX_ATTR_MODE64BIT | SGX_ATTR_KSS; file->private_data = encl; return 0; diff --git a/arch/x86/kernel/cpu/sgx/ioctl.c b/arch/x86/kernel/cpu/sgx/ioctl.c index 90a5caf76939..1c6ecf9fbeff 100644 --- a/arch/x86/kernel/cpu/sgx/ioctl.c +++ b/arch/x86/kernel/cpu/sgx/ioctl.c @@ -109,7 +109,6 @@ static int sgx_encl_create(struct sgx_encl *encl, struct sgx_secs *secs) encl->base = secs->base; encl->size = secs->size; encl->attributes = secs->attributes; - encl->attributes_mask = SGX_ATTR_DEBUG | SGX_ATTR_MODE64BIT | SGX_ATTR_KSS; /* Set only after completion, as encl->lock has not been taken. */ set_bit(SGX_ENCL_CREATED, &encl->flags); -- 2.19.1.3.ge56e4f7