trts_ecall.cpp 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488
  1. /*
  2. * Copyright (C) 2011-2018 Intel Corporation. All rights reserved.
  3. *
  4. * Redistribution and use in source and binary forms, with or without
  5. * modification, are permitted provided that the following conditions
  6. * are met:
  7. *
  8. * * Redistributions of source code must retain the above copyright
  9. * notice, this list of conditions and the following disclaimer.
  10. * * Redistributions in binary form must reproduce the above copyright
  11. * notice, this list of conditions and the following disclaimer in
  12. * the documentation and/or other materials provided with the
  13. * distribution.
  14. * * Neither the name of Intel Corporation nor the names of its
  15. * contributors may be used to endorse or promote products derived
  16. * from this software without specific prior written permission.
  17. *
  18. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  19. * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  20. * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
  21. * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
  22. * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  23. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  24. * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  25. * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  26. * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  27. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  28. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  29. *
  30. */
  31. #include "se_memcpy.h"
  32. #include "thread_data.h"
  33. #include "global_data.h"
  34. #include "rts.h"
  35. #include "util.h"
  36. #include "xsave.h"
  37. #include "sgx_trts.h"
  38. #include "sgx_lfence.h"
  39. #include "sgx_spinlock.h"
  40. #include "global_init.h"
  41. #include "trts_internal.h"
  42. #include "trts_inst.h"
  43. #include "trts_emodpr.h"
  44. #include "metadata.h"
  45. # include "linux/elf_parser.h"
  46. # define GET_TLS_INFO elf_tls_info
  47. // is_ecall_allowed()
  48. // check the index in the dynamic entry table
  49. static sgx_status_t is_ecall_allowed(uint32_t ordinal)
  50. {
  51. if(ordinal >= g_ecall_table.nr_ecall)
  52. {
  53. return SGX_ERROR_INVALID_FUNCTION;
  54. }
  55. thread_data_t *thread_data = get_thread_data();
  56. sgx_lfence();
  57. if(thread_data->last_sp == thread_data->stack_base_addr)
  58. {
  59. // root ECALL, check the priv bits.
  60. if (g_ecall_table.ecall_table[ordinal].is_priv)
  61. return SGX_ERROR_ECALL_NOT_ALLOWED;
  62. return SGX_SUCCESS;
  63. }
  64. ocall_context_t *context = reinterpret_cast<ocall_context_t*>(thread_data->last_sp);
  65. if(context->ocall_flag != OCALL_FLAG)
  66. {
  67. // abort the enclave if ocall frame is invalid
  68. abort();
  69. }
  70. uintptr_t ocall_index = context->ocall_index;
  71. if(ocall_index >= g_dyn_entry_table.nr_ocall)
  72. {
  73. return SGX_ERROR_INVALID_FUNCTION;
  74. }
  75. return (g_dyn_entry_table.entry_table[ocall_index * g_ecall_table.nr_ecall + ordinal] ? SGX_SUCCESS : SGX_ERROR_ECALL_NOT_ALLOWED);
  76. }
  77. // get_func_addr()
  78. // Get the address of ecall function from the ecall table
  79. // Parameters:
  80. // [IN] ordinal - the index of the ecall function in the ecall table
  81. // Return Value:
  82. // non-zero - success
  83. // zero - fail
  84. //
  85. static sgx_status_t get_func_addr(uint32_t ordinal, void **addr)
  86. {
  87. sgx_status_t status = is_ecall_allowed(ordinal);
  88. if(SGX_SUCCESS != status)
  89. {
  90. return status;
  91. }
  92. *addr = const_cast<void *>(g_ecall_table.ecall_table[ordinal].ecall_addr);
  93. if(!sgx_is_within_enclave(*addr, 0))
  94. {
  95. return SGX_ERROR_UNEXPECTED;
  96. }
  97. return SGX_SUCCESS;
  98. }
  99. typedef struct _tcs_node_t
  100. {
  101. uintptr_t tcs;
  102. struct _tcs_node_t *next;
  103. } tcs_node_t;
  104. static tcs_node_t *g_tcs_node = NULL;
  105. static sgx_spinlock_t g_tcs_node_lock = SGX_SPINLOCK_INITIALIZER;
  106. static uintptr_t g_tcs_cookie = 0;
  107. #define ENC_TCS_POINTER(x) (uintptr_t)(x) ^ g_tcs_cookie
  108. #define DEC_TCS_POINTER(x) (void *)((x) ^ g_tcs_cookie)
  109. // do_save_tcs()
  110. // Save tcs while function do_ecall_add_thread invoked.
  111. // Parameters:
  112. // [IN] ptcs - the tcs_t pointer which need to be saved
  113. // Return Value:
  114. // zero - success
  115. // non-zero - fail
  116. //
  117. static sgx_status_t do_save_tcs(void *ptcs)
  118. {
  119. if(unlikely(g_tcs_cookie == 0))
  120. {
  121. uintptr_t rand = 0;
  122. do
  123. {
  124. if(SGX_SUCCESS != sgx_read_rand((unsigned char *)&rand, sizeof(rand)))
  125. {
  126. return SGX_ERROR_UNEXPECTED;
  127. }
  128. } while(rand == 0);
  129. sgx_spin_lock(&g_tcs_node_lock);
  130. if(g_tcs_cookie == 0)
  131. {
  132. g_tcs_cookie = rand;
  133. }
  134. sgx_spin_unlock(&g_tcs_node_lock);
  135. }
  136. tcs_node_t *tcs_node = (tcs_node_t *)malloc(sizeof(tcs_node_t));
  137. if(!tcs_node)
  138. {
  139. return SGX_ERROR_UNEXPECTED;
  140. }
  141. tcs_node->tcs = ENC_TCS_POINTER(ptcs);
  142. sgx_spin_lock(&g_tcs_node_lock);
  143. tcs_node->next = g_tcs_node;
  144. g_tcs_node = tcs_node;
  145. sgx_spin_unlock(&g_tcs_node_lock);
  146. return SGX_SUCCESS;
  147. }
  148. // do_del_tcs()
  149. // Delete tcs from the global tcs list.
  150. // Parameters:
  151. // [IN] ptcs - the tcs_t pointer which need to be deleted
  152. // Return Value:
  153. // N/A
  154. //
  155. static void do_del_tcs(void *ptcs)
  156. {
  157. sgx_spin_lock(&g_tcs_node_lock);
  158. if (g_tcs_node != NULL)
  159. {
  160. if (DEC_TCS_POINTER(g_tcs_node->tcs) == ptcs)
  161. {
  162. tcs_node_t *tmp = g_tcs_node;
  163. g_tcs_node = g_tcs_node->next;
  164. free(tmp);
  165. }
  166. else
  167. {
  168. tcs_node_t *tcs_node = g_tcs_node->next;
  169. tcs_node_t *pre_tcs_node = g_tcs_node;
  170. while (tcs_node != NULL)
  171. {
  172. if (DEC_TCS_POINTER(tcs_node->tcs) == ptcs)
  173. {
  174. pre_tcs_node->next = tcs_node->next;
  175. free(tcs_node);
  176. break;
  177. }
  178. pre_tcs_node = tcs_node;
  179. tcs_node = tcs_node->next;
  180. }
  181. }
  182. }
  183. sgx_spin_unlock(&g_tcs_node_lock);
  184. }
  185. static volatile bool g_is_first_ecall = true;
  186. static volatile sgx_spinlock_t g_ife_lock = SGX_SPINLOCK_INITIALIZER;
  187. typedef sgx_status_t (*ecall_func_t)(void *ms);
  188. static sgx_status_t trts_ecall(uint32_t ordinal, void *ms)
  189. {
  190. sgx_status_t status = SGX_ERROR_UNEXPECTED;
  191. if (unlikely(g_is_first_ecall))
  192. {
  193. // The thread performing the global initialization cannot do a nested ECall
  194. thread_data_t *thread_data = get_thread_data();
  195. if (thread_data->last_sp != thread_data->stack_base_addr)
  196. { // nested ecall
  197. return SGX_ERROR_ECALL_NOT_ALLOWED;
  198. }
  199. sgx_spin_lock(&g_ife_lock);
  200. if (g_is_first_ecall)
  201. {
  202. #ifndef SE_SIM
  203. if(EDMM_supported)
  204. {
  205. //change back the page permission
  206. size_t enclave_start = (size_t)&__ImageBase;
  207. if((status = change_protection((void *)enclave_start)) != SGX_SUCCESS)
  208. {
  209. sgx_spin_unlock(&g_ife_lock);
  210. return status;
  211. }
  212. }
  213. #endif
  214. //invoke global object's construction
  215. init_global_object();
  216. g_is_first_ecall = false;
  217. }
  218. sgx_spin_unlock(&g_ife_lock);
  219. }
  220. void *addr = NULL;
  221. status = get_func_addr(ordinal, &addr);
  222. if(status == SGX_SUCCESS)
  223. {
  224. ecall_func_t func = (ecall_func_t)addr;
  225. sgx_lfence();
  226. status = func(ms);
  227. }
  228. return status;
  229. }
  230. extern "C" uintptr_t __stack_chk_guard;
  231. static void init_static_stack_canary(void *tcs)
  232. {
  233. size_t *canary = TCS2CANARY(tcs);
  234. *canary = (size_t)__stack_chk_guard;
  235. }
  236. static bool is_utility_thread()
  237. {
  238. thread_data_t *thread_data = get_thread_data();
  239. if ((thread_data != NULL) && (thread_data->flags & SGX_UTILITY_THREAD))
  240. {
  241. return true;
  242. }
  243. else
  244. {
  245. return false;
  246. }
  247. }
  248. sgx_status_t do_init_thread(void *tcs)
  249. {
  250. thread_data_t *thread_data = GET_PTR(thread_data_t, tcs, g_global_data.td_template.self_addr);
  251. #ifndef SE_SIM
  252. size_t saved_stack_commit_addr = thread_data->stack_commit_addr;
  253. bool thread_first_init = (saved_stack_commit_addr == 0) ? true : false;
  254. #endif
  255. size_t stack_guard = thread_data->stack_guard;
  256. size_t thread_flags = thread_data->flags;
  257. memcpy_s(thread_data, SE_PAGE_SIZE, const_cast<thread_data_t *>(&g_global_data.td_template), sizeof(thread_data_t));
  258. thread_data->last_sp += (size_t)tcs;
  259. thread_data->self_addr += (size_t)tcs;
  260. thread_data->stack_base_addr += (size_t)tcs;
  261. thread_data->stack_limit_addr += (size_t)tcs;
  262. thread_data->stack_commit_addr = thread_data->stack_limit_addr;
  263. thread_data->first_ssa_gpr += (size_t)tcs;
  264. thread_data->tls_array += (size_t)tcs;
  265. thread_data->tls_addr += (size_t)tcs;
  266. thread_data->last_sp -= (size_t)STATIC_STACK_SIZE;
  267. thread_data->stack_base_addr -= (size_t)STATIC_STACK_SIZE;
  268. thread_data->stack_guard = stack_guard;
  269. thread_data->flags = thread_flags;
  270. init_static_stack_canary(tcs);
  271. #ifndef SE_SIM
  272. if (EDMM_supported && is_dynamic_thread(tcs))
  273. {
  274. if (thread_first_init)
  275. {
  276. uint32_t page_count = get_dynamic_stack_max_page();
  277. thread_data->stack_commit_addr += ((sys_word_t)page_count << SE_PAGE_SHIFT);
  278. }
  279. else
  280. {
  281. thread_data->stack_commit_addr = saved_stack_commit_addr;
  282. }
  283. }
  284. #endif
  285. uintptr_t tls_addr = 0;
  286. size_t tdata_size = 0;
  287. if(0 != GET_TLS_INFO(&__ImageBase, &tls_addr, &tdata_size))
  288. {
  289. return SGX_ERROR_UNEXPECTED;
  290. }
  291. if(tls_addr)
  292. {
  293. memset((void *)TRIM_TO_PAGE(thread_data->tls_addr), 0, ROUND_TO_PAGE(thread_data->self_addr - thread_data->tls_addr));
  294. memcpy_s((void *)(thread_data->tls_addr), thread_data->self_addr - thread_data->tls_addr, (void *)tls_addr, tdata_size);
  295. }
  296. return SGX_SUCCESS;
  297. }
  298. sgx_status_t do_ecall(int index, void *ms, void *tcs)
  299. {
  300. sgx_status_t status = SGX_ERROR_UNEXPECTED;
  301. if(ENCLAVE_INIT_DONE != get_enclave_state())
  302. {
  303. return status;
  304. }
  305. thread_data_t *thread_data = get_thread_data();
  306. if( (NULL == thread_data) || ((thread_data->stack_base_addr == thread_data->last_sp) && (0 != g_global_data.thread_policy)))
  307. {
  308. status = do_init_thread(tcs);
  309. if(0 != status)
  310. {
  311. return status;
  312. }
  313. }
  314. status = trts_ecall(index, ms);
  315. return status;
  316. }
  317. sgx_status_t do_ecall_add_thread(void *ms, void *tcs)
  318. {
  319. sgx_status_t status = SGX_ERROR_UNEXPECTED;
  320. if(!is_utility_thread())
  321. return status;
  322. struct ms_tcs *ms_tcs = (struct ms_tcs*)ms;
  323. if (ms_tcs == NULL)
  324. {
  325. return status;
  326. }
  327. if (!sgx_is_outside_enclave(ms_tcs, sizeof(struct ms_tcs)))
  328. {
  329. abort();
  330. }
  331. void* ptcs = ms_tcs->ptcs;
  332. if (ptcs == NULL)
  333. {
  334. return status;
  335. }
  336. status = do_init_thread(tcs);
  337. if(SGX_SUCCESS != status)
  338. {
  339. return status;
  340. }
  341. status = do_save_tcs(ptcs);
  342. if(SGX_SUCCESS != status)
  343. {
  344. return status;
  345. }
  346. status = do_add_thread(ptcs);
  347. if (SGX_SUCCESS != status)
  348. {
  349. do_del_tcs(ptcs);
  350. return status;
  351. }
  352. return status;
  353. }
  354. // do_uninit_enclave()
  355. // Run the global uninitialized functions when the enclave is destroyed.
  356. // Parameters:
  357. // [IN] tcs - used for running this task
  358. // Return Value:
  359. // zero - success
  360. // non-zero - fail
  361. //
  362. sgx_status_t do_uninit_enclave(void *tcs)
  363. {
  364. #ifndef SE_SIM
  365. if(is_dynamic_thread_exist() && !is_utility_thread())
  366. return SGX_ERROR_UNEXPECTED;
  367. #endif
  368. sgx_spin_lock(&g_tcs_node_lock);
  369. tcs_node_t *tcs_node = g_tcs_node;
  370. g_tcs_node = NULL;
  371. sgx_spin_unlock(&g_tcs_node_lock);
  372. while (tcs_node != NULL)
  373. {
  374. if (DEC_TCS_POINTER(tcs_node->tcs) == tcs)
  375. {
  376. tcs_node_t *tmp = tcs_node;
  377. tcs_node = tcs_node->next;
  378. free(tmp);
  379. continue;
  380. }
  381. size_t start = (size_t)DEC_TCS_POINTER(tcs_node->tcs);
  382. size_t end = start + (1 << SE_PAGE_SHIFT);
  383. int rc = sgx_accept_forward(SI_FLAG_TRIM | SI_FLAG_MODIFIED, start, end);
  384. if(rc != 0)
  385. {
  386. return SGX_ERROR_UNEXPECTED;
  387. }
  388. tcs_node_t *tmp = tcs_node;
  389. tcs_node = tcs_node->next;
  390. free(tmp);
  391. }
  392. sgx_spin_lock(&g_ife_lock);
  393. if (!g_is_first_ecall)
  394. {
  395. uninit_global_object();
  396. }
  397. sgx_spin_unlock(&g_ife_lock);
  398. set_enclave_state(ENCLAVE_CRASHED);
  399. return SGX_SUCCESS;
  400. }
  401. extern sdk_version_t g_sdk_version;
  402. extern "C" sgx_status_t trts_mprotect(size_t start, size_t size, uint64_t perms)
  403. {
  404. int rc = -1;
  405. size_t page;
  406. sgx_status_t ret = SGX_SUCCESS;
  407. SE_DECLSPEC_ALIGN(sizeof(sec_info_t)) sec_info_t si;
  408. //Error return if start or size is not page-aligned or size is zero.
  409. if (!IS_PAGE_ALIGNED(start) || (size == 0) || !IS_PAGE_ALIGNED(size))
  410. return SGX_ERROR_INVALID_PARAMETER;
  411. if (g_sdk_version == SDK_VERSION_2_0)
  412. {
  413. ret = change_permissions_ocall(start, size, perms);
  414. if (ret != SGX_SUCCESS)
  415. return ret;
  416. }
  417. si.flags = perms|SI_FLAG_REG|SI_FLAG_PR;
  418. memset(&si.reserved, 0, sizeof(si.reserved));
  419. for(page = start; page < start + size; page += SE_PAGE_SIZE)
  420. {
  421. do_emodpe(&si, page);
  422. // If the target permission to set is RWX, no EMODPR, hence no EACCEPT.
  423. if ((perms & (SI_FLAG_W|SI_FLAG_X)) != (SI_FLAG_W|SI_FLAG_X))
  424. {
  425. rc = do_eaccept(&si, page);
  426. if(rc != 0)
  427. return (sgx_status_t)rc;
  428. }
  429. }
  430. return SGX_SUCCESS;
  431. }