Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp327110pxj; Thu, 10 Jun 2021 01:32:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyVqpovkPRzFYsJjKn4+7sSQ+/NR9L2tIHs7FvIjjZXz13e3t/c2xh3jh1BG+/61VeDYXAz X-Received: by 2002:a05:6402:1458:: with SMTP id d24mr3509332edx.85.1623313925968; Thu, 10 Jun 2021 01:32:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623313925; cv=none; d=google.com; s=arc-20160816; b=OJQpkA8ReIxbhAOGPIk1k89RiEafMlcQoovmk9OPIjGqmkWoeNBRIIKe1q3qiWLqOi T9+CZ4086yrv9Chn19QSRgweKMkduVLbUiN42X4OSjl3+AYHmvTwKuW1pZ9fOlJbxNKI pdUzoOI9ST1b6/u81aEK5VcH/EWglLGVgqW2XSVBOcic6cCdsn/SJuDJZB2QKMSfXNZ2 lY/FOFGKruHO5JfyzDpJfVFmQHpBtqcAt366OARG1VUxoDdqQPO5i6lkZpkXDIoyEAPd M3AM1Jc7zSrfnNtkTTbtNCLJdK5Ry91cd3oqlpgN9LCYA1uI5duHCFa+/YYeI+ECSqny 1b5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=bNYtR8vR57NR8qBTFrCH6GVvu/m3IzC46S8vgpTD30k=; b=i6x1hPJDp1Z/z/5DLV4SLc1iev+eCY18aLGvg/BJg8ynkDfEMB/6F+b/diMr+8oTyo drr9zARecWkHjl12VQ3EcpsaOMCVHTCkKCnFrD6/pqYn4rJnZWynB6zJM5Q9gUasCEmz q8FxzfS1aS67mSD3FpO0rbq+Dsj+uP6zjLqiC7bqDRguRYW0xGD0oHqsGJeNnelonCYO DzkU4gkq4VbB5bqrxeIz/q+PniQp75T8KvwHZOXAJ04o1E2yatFUgO5hmlqRp/2ipvOl cinZMT1g8xc701E41jw3mt4JtlWn1NQrJiOPXAXnkR0bC5cOQoIYm8aOiehbUAH8bb49 Ql+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="cF/0TWbm"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l10si1670366edq.534.2021.06.10.01.31.42; Thu, 10 Jun 2021 01:32:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="cF/0TWbm"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230188AbhFJIca (ORCPT + 99 others); Thu, 10 Jun 2021 04:32:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:53874 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229895AbhFJIcZ (ORCPT ); Thu, 10 Jun 2021 04:32:25 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 99F78613E7; Thu, 10 Jun 2021 08:30:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1623313828; bh=EPv1u0azdmPO9qKoh7wx6ebVCAg50T2BxrxpYsroTDs=; h=From:To:Cc:Subject:Date:From; b=cF/0TWbmXLVuj6kyEF3W6yEHcuB588GmlouBQa367GgnKoKjqv6O4nJsJ0wXNq4eG 6jglQmetD0sdglyVBu/7TrU8LO8iNbt++ts9PjsGYbm7OCo9n89LnWqsVy3nznnTiC M4I460Qjw3sjumcrWaBJyNhNjMHrH0Wd/WaC1iqvqgc3Jjs49raIviQtqIixZjJe5b F5Ui6oQuxq9cwdi5kbn78z5Q5DpV2QmwgOYZcU3Sz3642OS3ZtLe6O9qNKR6XELvZr a53LbOPEAt+2dqcR3HU0ST+c8UAs4JhBpqyh74YqZUDu3wxV7D+ce3bZXZurgd9dCg sbUwHqlPoT0oQ== From: Jarkko Sakkinen To: shuah@kernel.org Cc: linux-kselftest@vger.kernel.org, linux-sgx@vger.kernel.org, Reinette Chatre , Jarkko Sakkinen , Dave Hansen , linux-kernel@vger.kernel.org Subject: [PATCH v8 1/5] selftests/sgx: Rename 'eenter' and 'sgx_call_vdso' Date: Thu, 10 Jun 2021 11:30:17 +0300 Message-Id: <20210610083021.392269-1-jarkko@kernel.org> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Rename symbols for better clarity: * 'eenter' might be confused for directly calling ENCLU[EENTER]. It does not. It calls into the VDSO, which actually has the EENTER instruction. * 'sgx_call_vdso' is *only* used for entering the enclave. It's not some generic SGX call into the VDSO. Signed-off-by: Jarkko Sakkinen --- v3: Refine the commit message according to Dave's suggestions. v2: Refined the renames just a bit. tools/testing/selftests/sgx/call.S | 6 +++--- tools/testing/selftests/sgx/main.c | 25 +++++++++++++------------ tools/testing/selftests/sgx/main.h | 4 ++-- 3 files changed, 18 insertions(+), 17 deletions(-) diff --git a/tools/testing/selftests/sgx/call.S b/tools/testing/selftests/sgx/call.S index 4ecadc7490f4..b09a25890f3b 100644 --- a/tools/testing/selftests/sgx/call.S +++ b/tools/testing/selftests/sgx/call.S @@ -5,8 +5,8 @@ .text - .global sgx_call_vdso -sgx_call_vdso: + .global sgx_enter_enclave +sgx_enter_enclave: .cfi_startproc push %r15 .cfi_adjust_cfa_offset 8 @@ -27,7 +27,7 @@ sgx_call_vdso: .cfi_adjust_cfa_offset 8 push 0x38(%rsp) .cfi_adjust_cfa_offset 8 - call *eenter(%rip) + call *vdso_sgx_enter_enclave(%rip) add $0x10, %rsp .cfi_adjust_cfa_offset -0x10 pop %rbx diff --git a/tools/testing/selftests/sgx/main.c b/tools/testing/selftests/sgx/main.c index d304a4044eb9..43da68388e25 100644 --- a/tools/testing/selftests/sgx/main.c +++ b/tools/testing/selftests/sgx/main.c @@ -21,7 +21,7 @@ #include "../kselftest.h" static const uint64_t MAGIC = 0x1122334455667788ULL; -vdso_sgx_enter_enclave_t eenter; +vdso_sgx_enter_enclave_t vdso_sgx_enter_enclave; struct vdso_symtab { Elf64_Sym *elf_symtab; @@ -149,7 +149,7 @@ int main(int argc, char *argv[]) { struct sgx_enclave_run run; struct vdso_symtab symtab; - Elf64_Sym *eenter_sym; + Elf64_Sym *sgx_enter_enclave_sym; uint64_t result = 0; struct encl encl; unsigned int i; @@ -194,29 +194,30 @@ int main(int argc, char *argv[]) if (!vdso_get_symtab(addr, &symtab)) goto err; - eenter_sym = vdso_symtab_get(&symtab, "__vdso_sgx_enter_enclave"); - if (!eenter_sym) + sgx_enter_enclave_sym = vdso_symtab_get(&symtab, "__vdso_sgx_enter_enclave"); + if (!sgx_enter_enclave_sym) goto err; - eenter = addr + eenter_sym->st_value; + vdso_sgx_enter_enclave = addr + sgx_enter_enclave_sym->st_value; - ret = sgx_call_vdso((void *)&MAGIC, &result, 0, EENTER, NULL, NULL, &run); - if (!report_results(&run, ret, result, "sgx_call_vdso")) + ret = sgx_enter_enclave((void *)&MAGIC, &result, 0, EENTER, + NULL, NULL, &run); + if (!report_results(&run, ret, result, "sgx_enter_enclave_unclobbered")) goto err; /* Invoke the vDSO directly. */ result = 0; - ret = eenter((unsigned long)&MAGIC, (unsigned long)&result, 0, EENTER, - 0, 0, &run); - if (!report_results(&run, ret, result, "eenter")) + ret = vdso_sgx_enter_enclave((unsigned long)&MAGIC, (unsigned long)&result, + 0, EENTER, 0, 0, &run); + if (!report_results(&run, ret, result, "sgx_enter_enclave")) goto err; /* And with an exit handler. */ run.user_handler = (__u64)user_handler; run.user_data = 0xdeadbeef; - ret = eenter((unsigned long)&MAGIC, (unsigned long)&result, 0, EENTER, - 0, 0, &run); + ret = vdso_sgx_enter_enclave((unsigned long)&MAGIC, (unsigned long)&result, + 0, EENTER, 0, 0, &run); if (!report_results(&run, ret, result, "user_handler")) goto err; diff --git a/tools/testing/selftests/sgx/main.h b/tools/testing/selftests/sgx/main.h index 67211a708f04..68672fd86cf9 100644 --- a/tools/testing/selftests/sgx/main.h +++ b/tools/testing/selftests/sgx/main.h @@ -35,7 +35,7 @@ bool encl_load(const char *path, struct encl *encl); bool encl_measure(struct encl *encl); bool encl_build(struct encl *encl); -int sgx_call_vdso(void *rdi, void *rsi, long rdx, u32 function, void *r8, void *r9, - struct sgx_enclave_run *run); +int sgx_enter_enclave(void *rdi, void *rsi, long rdx, u32 function, void *r8, void *r9, + struct sgx_enclave_run *run); #endif /* MAIN_H */ -- 2.31.1