sgx_framework.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376
  1. /* -*- mode:c; c-file-style:"k&r"; c-basic-offset: 4; tab-width:4; indent-tabs-mode:nil; mode:auto-fill; fill-column:78; -*- */
  2. /* vim: set ts=4 sw=4 et tw=78 fo=cqt wm=0: */
  3. #include <pal_linux.h>
  4. #include <pal_rtld.h>
  5. #include "sgx_internal.h"
  6. #include "sgx_arch.h"
  7. #include "sgx_enclave.h"
  8. #include "graphene-sgx.h"
  9. #include <asm/errno.h>
  10. int gsgx_device = -1;
  11. int isgx_device = -1;
  12. #define ISGX_FILE "/dev/isgx"
  13. void * zero_page;
  14. int open_gsgx(void)
  15. {
  16. gsgx_device = INLINE_SYSCALL(open, 3, GSGX_FILE, O_RDWR, 0);
  17. if (IS_ERR(gsgx_device))
  18. return -ERRNO(gsgx_device);
  19. isgx_device = INLINE_SYSCALL(open, 3, ISGX_FILE, O_RDWR, 0);
  20. if (IS_ERR(isgx_device))
  21. return -ERRNO(isgx_device);
  22. return 0;
  23. }
  24. int read_enclave_token(int token_file, sgx_arch_token_t * token)
  25. {
  26. struct stat stat;
  27. int ret;
  28. ret = INLINE_SYSCALL(fstat, 2, token_file, &stat);
  29. if (IS_ERR(ret))
  30. return -ERRNO(ret);
  31. if (stat.st_size != sizeof(sgx_arch_token_t)) {
  32. SGX_DBG(DBG_I, "size of token size does not match\n");
  33. return -EINVAL;
  34. }
  35. int bytes = INLINE_SYSCALL(read, 3, token_file, token, sizeof(sgx_arch_token_t));
  36. if (IS_ERR(bytes))
  37. return -ERRNO(bytes);
  38. return 0;
  39. }
  40. int read_enclave_sigstruct(int sigfile, sgx_arch_sigstruct_t * sig)
  41. {
  42. struct stat stat;
  43. int ret;
  44. ret = INLINE_SYSCALL(fstat, 2, sigfile, &stat);
  45. if (IS_ERR(ret))
  46. return -ERRNO(ret);
  47. if (stat.st_size < sizeof(sgx_arch_sigstruct_t)) {
  48. SGX_DBG(DBG_I, "size of sigstruct size does not match\n");
  49. return -EINVAL;
  50. }
  51. int bytes = INLINE_SYSCALL(read, 3, sigfile, sig, sizeof(sgx_arch_sigstruct_t));
  52. if (IS_ERR(bytes))
  53. return -ERRNO(bytes);
  54. return 0;
  55. }
  56. #define SE_LEAF 0x12
  57. static inline void cpuid(uint32_t leaf, uint32_t subleaf, uint32_t info[4])
  58. {
  59. asm volatile("cpuid"
  60. : "=a"(info[0]),
  61. "=b"(info[1]),
  62. "=c"(info[2]),
  63. "=d"(info[3])
  64. : "a"(leaf),
  65. "c"(subleaf));
  66. }
  67. static size_t get_ssaframesize (uint64_t xfrm)
  68. {
  69. uint32_t cpuinfo[4];
  70. uint64_t xfrm_ex;
  71. int xsave_size = 0;
  72. cpuid(SE_LEAF, 1, cpuinfo);
  73. xfrm_ex = ((uint64_t) cpuinfo[3] << 32) + cpuinfo[2];
  74. for (int i = 2; i < 64; i++)
  75. if ((xfrm & (1 << i)) || (xfrm_ex & (1 << i))) {
  76. cpuid(0xd, i, cpuinfo);
  77. if (cpuinfo[0] + cpuinfo[1] > xsave_size)
  78. xsave_size = cpuinfo[0] + cpuinfo[1];
  79. }
  80. return ALLOC_ALIGNUP(xsave_size + sizeof(sgx_arch_gpr_t) + 1);
  81. }
  82. int check_wrfsbase_support (void)
  83. {
  84. if (gsgx_device == -1)
  85. return -EACCES;
  86. uint32_t cpuinfo[4];
  87. cpuid(7, 0, cpuinfo);
  88. if (!(cpuinfo[1] & 0x1))
  89. return 0;
  90. return 1;
  91. }
  92. int create_enclave(sgx_arch_secs_t * secs,
  93. unsigned long baseaddr,
  94. unsigned long size,
  95. sgx_arch_token_t * token)
  96. {
  97. int flags = MAP_SHARED;
  98. if (!zero_page) {
  99. zero_page = (void *)
  100. INLINE_SYSCALL(mmap, 6, NULL, pagesize,
  101. PROT_READ, MAP_PRIVATE|MAP_ANONYMOUS,
  102. -1, 0);
  103. if (IS_ERR_P(zero_page))
  104. return -ENOMEM;
  105. }
  106. memset(secs, 0, sizeof(sgx_arch_secs_t));
  107. secs->size = pagesize;
  108. while (secs->size < size)
  109. secs->size <<= 1;
  110. secs->ssaframesize = get_ssaframesize(token->attributes.xfrm) / pagesize;
  111. secs->miscselect = token->miscselect_mask;
  112. memcpy(&secs->attributes, &token->attributes,
  113. sizeof(sgx_arch_attributes_t));
  114. memcpy(&secs->mrenclave, &token->mrenclave, sizeof(sgx_arch_hash_t));
  115. memcpy(&secs->mrsigner, &token->mrsigner, sizeof(sgx_arch_hash_t));
  116. if (baseaddr) {
  117. secs->baseaddr = (uint64_t) baseaddr & ~(secs->size - 1);
  118. flags |= MAP_FIXED;
  119. } else {
  120. secs->baseaddr = 0ULL;
  121. }
  122. uint64_t addr = INLINE_SYSCALL(mmap, 6, secs->baseaddr, secs->size,
  123. PROT_READ|PROT_WRITE|PROT_EXEC, flags,
  124. isgx_device, 0);
  125. if (IS_ERR_P(addr)) {
  126. if (ERRNO_P(addr) == 1 && (flags | MAP_FIXED))
  127. pal_printf("Permission denied on mapping enclave. "
  128. "You may need to set sysctl vm.mmap_min_addr to zero\n");
  129. SGX_DBG(DBG_I, "enclave ECREATE failed in allocating EPC memory "
  130. "(errno = %d)\n", ERRNO_P(addr));
  131. return -ENOMEM;
  132. }
  133. secs->baseaddr = addr;
  134. #if SDK_DRIVER_VERSION >= KERNEL_VERSION(1, 8, 0)
  135. struct sgx_enclave_create param = {
  136. .src = (uint64_t) secs,
  137. };
  138. int ret = INLINE_SYSCALL(ioctl, 3, isgx_device, SGX_IOC_ENCLAVE_CREATE,
  139. &param);
  140. #else
  141. struct gsgx_enclave_create param = {
  142. .src = (uint64_t) secs,
  143. };
  144. int ret = INLINE_SYSCALL(ioctl, 3, gsgx_device, GSGX_IOCTL_ENCLAVE_CREATE,
  145. &param);
  146. #endif
  147. if (IS_ERR(ret)) {
  148. SGX_DBG(DBG_I, "enclave ECREATE failed in enclave creation ioctl - %d\n", ERRNO(ret));
  149. return -ERRNO(ret);
  150. }
  151. if (ret) {
  152. SGX_DBG(DBG_I, "enclave ECREATE failed - %d\n", ret);
  153. return -EPERM;
  154. }
  155. secs->attributes.flags |= SGX_FLAGS_INITIALIZED;
  156. SGX_DBG(DBG_I, "enclave created:\n");
  157. SGX_DBG(DBG_I, " base: 0x%016lx\n", secs->baseaddr);
  158. SGX_DBG(DBG_I, " size: 0x%016lx\n", secs->size);
  159. SGX_DBG(DBG_I, " attr: 0x%016lx\n", secs->attributes.flags);
  160. SGX_DBG(DBG_I, " xfrm: 0x%016lx\n", secs->attributes.xfrm);
  161. SGX_DBG(DBG_I, " ssaframesize: %ld\n", secs->ssaframesize);
  162. SGX_DBG(DBG_I, " isvprodid: 0x%08x\n", secs->isvprodid);
  163. SGX_DBG(DBG_I, " isvsvn: 0x%08x\n", secs->isvsvn);
  164. return 0;
  165. }
  166. int add_pages_to_enclave(sgx_arch_secs_t * secs,
  167. void * addr, void * user_addr,
  168. unsigned long size,
  169. enum sgx_page_type type, int prot,
  170. bool skip_eextend,
  171. const char * comment)
  172. {
  173. sgx_arch_secinfo_t secinfo;
  174. int ret;
  175. memset(&secinfo, 0, sizeof(sgx_arch_secinfo_t));
  176. switch (type) {
  177. case SGX_PAGE_SECS:
  178. return -EPERM;
  179. case SGX_PAGE_TCS:
  180. secinfo.flags |= SGX_SECINFO_FLAGS_TCS;
  181. break;
  182. case SGX_PAGE_REG:
  183. secinfo.flags |= SGX_SECINFO_FLAGS_REG;
  184. if (prot & PROT_READ)
  185. secinfo.flags |= SGX_SECINFO_FLAGS_R;
  186. if (prot & PROT_WRITE)
  187. secinfo.flags |= SGX_SECINFO_FLAGS_W;
  188. if (prot & PROT_EXEC)
  189. secinfo.flags |= SGX_SECINFO_FLAGS_X;
  190. break;
  191. }
  192. char p[4] = "---";
  193. const char * t = (type == SGX_PAGE_TCS) ? "TCS" : "REG";
  194. const char * m = skip_eextend ? "" : " measured";
  195. if (type == SGX_PAGE_REG) {
  196. if (prot & PROT_READ)
  197. p[0] = 'R';
  198. if (prot & PROT_WRITE)
  199. p[1] = 'W';
  200. if (prot & PROT_EXEC)
  201. p[2] = 'X';
  202. }
  203. if (size == pagesize)
  204. SGX_DBG(DBG_I, "adding page to enclave: %016lx [%s:%s] (%s)%s\n",
  205. addr, t, p, comment, m);
  206. else
  207. SGX_DBG(DBG_I, "adding pages to enclave: %016lx-%016lx [%s:%s] (%s)%s\n",
  208. addr, addr + size, t, p, comment, m);
  209. #if SDK_DRIVER_VERSION >= KERNEL_VERSION(1, 8, 0)
  210. struct sgx_enclave_add_page param = {
  211. .addr = secs->baseaddr + (uint64_t) addr,
  212. .src = (uint64_t) (user_addr ? : zero_page),
  213. .secinfo = (uint64_t) &secinfo,
  214. .mrmask = skip_eextend ? 0 : (uint16_t) -1,
  215. };
  216. uint64_t added_size = 0;
  217. while (added_size < size) {
  218. ret = INLINE_SYSCALL(ioctl, 3, isgx_device,
  219. SGX_IOC_ENCLAVE_ADD_PAGE, &param);
  220. if (IS_ERR(ret)) {
  221. SGX_DBG(DBG_I, "Enclave add page returned %d\n", ret);
  222. return -ERRNO(ret);
  223. }
  224. param.addr += pagesize;
  225. if (param.src != (uint64_t) zero_page) param.src += pagesize;
  226. added_size += pagesize;
  227. }
  228. #else
  229. struct gsgx_enclave_add_pages param = {
  230. .addr = secs->baseaddr + (uint64_t) addr,
  231. .user_addr = (uint64_t) user_addr,
  232. .size = size,
  233. .secinfo = (uint64_t) &secinfo,
  234. .flags = skip_eextend ? GSGX_ENCLAVE_ADD_PAGES_SKIP_EEXTEND : 0,
  235. };
  236. if (!user_addr) {
  237. param.user_addr = (unsigned long) zero_page;
  238. param.flags |= GSGX_ENCLAVE_ADD_PAGES_REPEAT_SRC;
  239. }
  240. ret = INLINE_SYSCALL(ioctl, 3, gsgx_device,
  241. GSGX_IOCTL_ENCLAVE_ADD_PAGES,
  242. &param);
  243. if (IS_ERR(ret)) {
  244. SGX_DBG(DBG_I, "Enclave add page returned %d\n", ret);
  245. return -ERRNO(ret);
  246. }
  247. #endif
  248. return 0;
  249. }
  250. int init_enclave(sgx_arch_secs_t * secs,
  251. sgx_arch_sigstruct_t * sigstruct,
  252. sgx_arch_token_t * token)
  253. {
  254. unsigned long enclave_valid_addr =
  255. secs->baseaddr + secs->size - pagesize;
  256. SGX_DBG(DBG_I, "enclave initializing:\n");
  257. SGX_DBG(DBG_I, " enclave id: 0x%016lx\n", enclave_valid_addr);
  258. SGX_DBG(DBG_I, " enclave hash:");
  259. for (int i = 0 ; i < sizeof(sgx_arch_hash_t) ; i++)
  260. SGX_DBG(DBG_I, " %02x", sigstruct->enclave_hash[i]);
  261. SGX_DBG(DBG_I, "\n");
  262. #if SDK_DRIVER_VERSION >= KERNEL_VERSION(1, 8, 0)
  263. struct sgx_enclave_init param = {
  264. .addr = enclave_valid_addr,
  265. .sigstruct = (uint64_t) sigstruct,
  266. .einittoken = (uint64_t) token,
  267. };
  268. int ret = INLINE_SYSCALL(ioctl, 3, isgx_device, SGX_IOC_ENCLAVE_INIT,
  269. &param);
  270. #else
  271. struct gsgx_enclave_init param = {
  272. .addr = enclave_valid_addr,
  273. .sigstruct = (uint64_t) sigstruct,
  274. .einittoken = (uint64_t) token,
  275. };
  276. int ret = INLINE_SYSCALL(ioctl, 3, gsgx_device, GSGX_IOCTL_ENCLAVE_INIT,
  277. &param);
  278. #endif
  279. if (IS_ERR(ret)) {
  280. return -ERRNO(ret);
  281. }
  282. if (ret) {
  283. const char * error;
  284. /* DEP 3/22/17: Try to improve error messages */
  285. switch(ret) {
  286. case SGX_INVALID_SIG_STRUCT:
  287. error = "Invalid SIGSTRUCT"; break;
  288. case SGX_INVALID_ATTRIBUTE:
  289. error = "Invalid enclave attribute"; break;
  290. case SGX_INVALID_MEASUREMENT:
  291. error = "Invalid measurement"; break;
  292. case SGX_INVALID_SIGNATURE:
  293. error = "Invalid signature"; break;
  294. case SGX_INVALID_LICENSE:
  295. error = "Invalid EINIT token"; break;
  296. case SGX_INVALID_CPUSVN:
  297. error = "Invalid CPU SVN"; break;
  298. default:
  299. error = "Unknown reason"; break;
  300. }
  301. SGX_DBG(DBG_I, "enclave EINIT failed - %s\n", error);
  302. return -EPERM;
  303. }
  304. return 0;
  305. }
  306. int destroy_enclave(void * base_addr, size_t length)
  307. {
  308. SGX_DBG(DBG_I, "destroying enclave...\n");
  309. int ret = INLINE_SYSCALL(munmap, 2, base_addr, length);
  310. if (IS_ERR(ret)) {
  311. SGX_DBG(DBG_I, "enclave EDESTROY failed\n");
  312. return -ERRNO(ret);
  313. }
  314. return 0;
  315. }