sgx_framework.c 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331
  1. /* -*- mode:c; c-file-style:"k&r"; c-basic-offset: 4; tab-width:4; indent-tabs-mode:nil; mode:auto-fill; fill-column:78; -*- */
  2. /* vim: set ts=4 sw=4 et tw=78 fo=cqt wm=0: */
  3. #include <pal_linux.h>
  4. #include <pal_rtld.h>
  5. #include "sgx_internal.h"
  6. #include "sgx_arch.h"
  7. #include "sgx_enclave.h"
  8. #include "sgx-driver/graphene-sgx.h"
  9. #include <asm/errno.h>
  10. int gsgx_device = -1;
  11. int isgx_device = -1;
  12. #define ISGX_FILE "/dev/isgx"
  13. void * zero_page;
  14. int open_gsgx(void)
  15. {
  16. int fd = INLINE_SYSCALL(open, 3, GSGX_FILE, O_RDWR, 0);
  17. if (IS_ERR(fd))
  18. return -ERRNO(fd);
  19. gsgx_device = fd;
  20. fd = INLINE_SYSCALL(open, 3, ISGX_FILE, O_RDWR, 0);
  21. if (IS_ERR(fd))
  22. return -ERRNO(fd);
  23. isgx_device = fd;
  24. return 0;
  25. }
  26. int read_enclave_token(int token_file, sgx_arch_token_t * token)
  27. {
  28. struct stat stat;
  29. int ret;
  30. ret = INLINE_SYSCALL(fstat, 2, token_file, &stat);
  31. if (IS_ERR(ret))
  32. return -ERRNO(ret);
  33. if (stat.st_size != sizeof(sgx_arch_token_t)) {
  34. SGX_DBG(DBG_I, "size of token size does not match\n");
  35. return -EINVAL;
  36. }
  37. int bytes = INLINE_SYSCALL(read, 3, token_file, token, sizeof(sgx_arch_token_t));
  38. if (IS_ERR(bytes))
  39. return -ERRNO(bytes);
  40. return 0;
  41. }
  42. int read_enclave_sigstruct(int sigfile, sgx_arch_sigstruct_t * sig)
  43. {
  44. struct stat stat;
  45. int ret;
  46. ret = INLINE_SYSCALL(fstat, 2, sigfile, &stat);
  47. if (IS_ERR(ret))
  48. return -ERRNO(ret);
  49. if (stat.st_size < sizeof(sgx_arch_sigstruct_t)) {
  50. SGX_DBG(DBG_I, "size of sigstruct size does not match\n");
  51. return -EINVAL;
  52. }
  53. int bytes = INLINE_SYSCALL(read, 3, sigfile, sig, sizeof(sgx_arch_sigstruct_t));
  54. if (IS_ERR(bytes))
  55. return -ERRNO(bytes);
  56. return 0;
  57. }
  58. #define SE_LEAF 0x12
  59. static inline void cpuid(uint32_t leaf, uint32_t subleaf, uint32_t info[4])
  60. {
  61. asm volatile("cpuid"
  62. : "=a"(info[0]),
  63. "=b"(info[1]),
  64. "=c"(info[2]),
  65. "=d"(info[3])
  66. : "a"(leaf),
  67. "c"(subleaf));
  68. }
  69. static size_t get_ssaframesize (uint64_t xfrm)
  70. {
  71. uint32_t cpuinfo[4];
  72. uint64_t xfrm_ex;
  73. int xsave_size = 0;
  74. cpuid(SE_LEAF, 1, cpuinfo);
  75. xfrm_ex = ((uint64_t) cpuinfo[3] << 32) + cpuinfo[2];
  76. for (int i = 2; i < 64; i++)
  77. if ((xfrm & (1 << i)) || (xfrm_ex & (1 << i))) {
  78. cpuid(0xd, i, cpuinfo);
  79. if (cpuinfo[0] + cpuinfo[1] > xsave_size)
  80. xsave_size = cpuinfo[0] + cpuinfo[1];
  81. }
  82. return ALLOC_ALIGNUP(xsave_size + sizeof(sgx_arch_gpr_t) + 1);
  83. }
  84. int check_wrfsbase_support (void)
  85. {
  86. if (gsgx_device == -1)
  87. return -EACCES;
  88. uint32_t cpuinfo[4];
  89. cpuid(7, 0, cpuinfo);
  90. if (!(cpuinfo[1] & 0x1))
  91. return 0;
  92. return 1;
  93. }
  94. int create_enclave(sgx_arch_secs_t * secs,
  95. unsigned long baseaddr,
  96. unsigned long size,
  97. sgx_arch_token_t * token)
  98. {
  99. int flags = MAP_SHARED;
  100. if (gsgx_device == -1)
  101. return -EACCES;
  102. if (!zero_page) {
  103. zero_page = (void *)
  104. INLINE_SYSCALL(mmap, 6, NULL, pagesize,
  105. PROT_READ, MAP_PRIVATE|MAP_ANONYMOUS,
  106. -1, 0);
  107. if (IS_ERR_P(zero_page))
  108. return -ENOMEM;
  109. }
  110. memset(secs, 0, sizeof(sgx_arch_secs_t));
  111. secs->size = pagesize;
  112. while (secs->size < size)
  113. secs->size <<= 1;
  114. secs->ssaframesize = get_ssaframesize(token->attributes.xfrm) / pagesize;
  115. secs->miscselect = token->miscselect_mask;
  116. memcpy(&secs->attributes, &token->attributes,
  117. sizeof(sgx_arch_attributes_t));
  118. memcpy(&secs->mrenclave, &token->mrenclave, sizeof(sgx_arch_hash_t));
  119. memcpy(&secs->mrsigner, &token->mrsigner, sizeof(sgx_arch_hash_t));
  120. struct gsgx_enclave_create param;
  121. if (baseaddr) {
  122. secs->baseaddr = (unsigned long) baseaddr & ~(secs->size - 1);
  123. flags |= MAP_FIXED;
  124. } else
  125. secs->baseaddr = 0ULL;
  126. secs->baseaddr = INLINE_SYSCALL(mmap, 6, secs->baseaddr, size,
  127. PROT_READ|PROT_WRITE|PROT_EXEC, flags,
  128. isgx_device, 0);
  129. if (IS_ERR_P(secs->baseaddr)) {
  130. if (ERRNO_P(secs->baseaddr) == 1 && (flags | MAP_FIXED))
  131. pal_printf("Permission denied on mapping enclave. You may need to set sysctl vm.mmap_min_addr to zero\n");
  132. SGX_DBG(DBG_I, "enclave ECREATE failed in allocating EPC memory - %d\n", ERRNO_P(secs->baseaddr));
  133. return -ENOMEM;
  134. }
  135. param.src = (unsigned long) secs;
  136. int ret = INLINE_SYSCALL(ioctl, 3, gsgx_device, GSGX_IOCTL_ENCLAVE_CREATE,
  137. &param);
  138. if (IS_ERR(ret)) {
  139. if (ERRNO(ret) == EBADF)
  140. gsgx_device = -1;
  141. SGX_DBG(DBG_I, "enclave ECREATE failed in enclave creation ioctl - %d\n", ERRNO(ret));
  142. return -ERRNO(ret);
  143. }
  144. if (ret) {
  145. SGX_DBG(DBG_I, "enclave ECREATE failed - %d\n", ret);
  146. return -EPERM;
  147. }
  148. secs->attributes.flags |= SGX_FLAGS_INITIALIZED;
  149. SGX_DBG(DBG_I, "enclave created:\n");
  150. SGX_DBG(DBG_I, " base: 0x%016lx\n", secs->baseaddr);
  151. SGX_DBG(DBG_I, " size: 0x%x\n", secs->size);
  152. SGX_DBG(DBG_I, " attr: 0x%016lx\n", secs->attributes.flags);
  153. SGX_DBG(DBG_I, " xfrm: 0x%016lx\n", secs->attributes.xfrm);
  154. SGX_DBG(DBG_I, " ssaframesize: %ld\n", secs->ssaframesize);
  155. SGX_DBG(DBG_I, " isvprodid: 0x%08x\n", secs->isvprodid);
  156. SGX_DBG(DBG_I, " isvsvn: 0x%08x\n", secs->isvsvn);
  157. return 0;
  158. }
  159. int add_pages_to_enclave(sgx_arch_secs_t * secs,
  160. void * addr, void * user_addr,
  161. unsigned long size,
  162. enum sgx_page_type type, int prot,
  163. bool skip_eextend,
  164. const char * comment)
  165. {
  166. if (gsgx_device == -1)
  167. return -EACCES;
  168. struct gsgx_enclave_add_pages param;
  169. sgx_arch_secinfo_t secinfo;
  170. memset(&secinfo, 0, sizeof(sgx_arch_secinfo_t));
  171. switch (type) {
  172. case SGX_PAGE_SECS:
  173. return -EPERM;
  174. case SGX_PAGE_TCS:
  175. secinfo.flags |= SGX_SECINFO_FLAGS_TCS;
  176. break;
  177. case SGX_PAGE_REG:
  178. secinfo.flags |= SGX_SECINFO_FLAGS_REG;
  179. if (prot & PROT_READ)
  180. secinfo.flags |= SGX_SECINFO_FLAGS_R;
  181. if (prot & PROT_WRITE)
  182. secinfo.flags |= SGX_SECINFO_FLAGS_W;
  183. if (prot & PROT_EXEC)
  184. secinfo.flags |= SGX_SECINFO_FLAGS_X;
  185. break;
  186. }
  187. param.addr = secs->baseaddr + (uint64_t) addr;
  188. param.user_addr = (uint64_t) user_addr;
  189. param.size = size;
  190. param.secinfo = (uint64_t) &secinfo;
  191. param.flags = skip_eextend ? GSGX_ENCLAVE_ADD_PAGES_SKIP_EEXTEND : 0;
  192. SGX_DBG(DBG_I, "User addr %x, addr %x (%x, %x), skip_eexten %d\n", param.user_addr, param.addr, secs->baseaddr, addr, skip_eextend);
  193. if (!param.user_addr) {
  194. param.user_addr = (unsigned long) zero_page;
  195. param.flags |= GSGX_ENCLAVE_ADD_PAGES_REPEAT_SRC;
  196. }
  197. char p[4] = "---";
  198. const char * t = (type == SGX_PAGE_TCS) ? "TCS" : "REG";
  199. const char * m = skip_eextend ? "" : " measured";
  200. if (type == SGX_PAGE_REG) {
  201. if (prot & PROT_READ)
  202. p[0] = 'R';
  203. if (prot & PROT_WRITE)
  204. p[1] = 'W';
  205. if (prot & PROT_EXEC)
  206. p[2] = 'X';
  207. }
  208. if (size == pagesize)
  209. SGX_DBG(DBG_I, "adding page to enclave: %016lx [%s:%s] (%s)%s\n",
  210. addr, t, p, comment, m);
  211. else
  212. SGX_DBG(DBG_I, "adding pages to enclave: %016lx-%016lx [%s:%s] (%s)%s\n",
  213. addr, addr + size, t, p, comment, m);
  214. int ret = INLINE_SYSCALL(ioctl, 3, gsgx_device,
  215. GSGX_IOCTL_ENCLAVE_ADD_PAGES,
  216. &param);
  217. if (IS_ERR(ret)) {
  218. SGX_DBG(DBG_I, "Enclave add page returned %d\n", ret);
  219. if (ERRNO(ret) == EBADF)
  220. gsgx_device = -1;
  221. return -ERRNO(ret);
  222. }
  223. return 0;
  224. }
  225. int init_enclave(sgx_arch_secs_t * secs,
  226. sgx_arch_sigstruct_t * sigstruct,
  227. sgx_arch_token_t * token)
  228. {
  229. if (gsgx_device == -1)
  230. return -EACCES;
  231. unsigned long enclave_valid_addr =
  232. secs->baseaddr + secs->size - pagesize;
  233. SGX_DBG(DBG_I, "enclave initializing:\n");
  234. SGX_DBG(DBG_I, " enclave id: 0x%016lx\n", enclave_valid_addr);
  235. SGX_DBG(DBG_I, " enclave hash:");
  236. for (int i = 0 ; i < sizeof(sgx_arch_hash_t) ; i++)
  237. SGX_DBG(DBG_I, " %02x", sigstruct->enclave_hash[i]);
  238. SGX_DBG(DBG_I, "\n");
  239. struct gsgx_enclave_init param;
  240. param.addr = enclave_valid_addr;
  241. // DEP 11/6/16: I think sigstruct and token are supposed to
  242. // be pointers in the new driver
  243. param.sigstruct = (uint64_t) sigstruct;
  244. param.einittoken = (uint64_t) token;
  245. int ret = INLINE_SYSCALL(ioctl, 3, gsgx_device, GSGX_IOCTL_ENCLAVE_INIT,
  246. &param);
  247. if (IS_ERR(ret)) {
  248. if (ERRNO(ret) == EBADF)
  249. gsgx_device = -1;
  250. return -ERRNO(ret);
  251. }
  252. if (ret) {
  253. SGX_DBG(DBG_I, "enclave EINIT failed\n");
  254. return -EPERM;
  255. }
  256. return 0;
  257. }
  258. int destroy_enclave(void * base_addr, size_t length)
  259. {
  260. SGX_DBG(DBG_I, "destroying enclave...\n");
  261. int ret = INLINE_SYSCALL(munmap, 2, base_addr, length);
  262. if (IS_ERR(ret)) {
  263. SGX_DBG(DBG_I, "enclave EDESTROY failed\n");
  264. return -ERRNO(ret);
  265. }
  266. return 0;
  267. }