Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
torvalds
GitHub Repository: torvalds/linux
Path: blob/master/arch/x86/include/uapi/asm/sgx.h
50674 views
1
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
2
/*
3
* Copyright(c) 2016-20 Intel Corporation.
4
*/
5
#ifndef _UAPI_ASM_X86_SGX_H
6
#define _UAPI_ASM_X86_SGX_H
7
8
#include <linux/types.h>
9
#include <linux/ioctl.h>
10
11
/**
12
* enum sgx_page_flags - page control flags
13
* @SGX_PAGE_MEASURE: Measure the page contents with a sequence of
14
* ENCLS[EEXTEND] operations.
15
*/
16
enum sgx_page_flags {
17
SGX_PAGE_MEASURE = 0x01,
18
};
19
20
#define SGX_MAGIC 0xA4
21
22
#define SGX_IOC_ENCLAVE_CREATE \
23
_IOW(SGX_MAGIC, 0x00, struct sgx_enclave_create)
24
#define SGX_IOC_ENCLAVE_ADD_PAGES \
25
_IOWR(SGX_MAGIC, 0x01, struct sgx_enclave_add_pages)
26
#define SGX_IOC_ENCLAVE_INIT \
27
_IOW(SGX_MAGIC, 0x02, struct sgx_enclave_init)
28
#define SGX_IOC_ENCLAVE_PROVISION \
29
_IOW(SGX_MAGIC, 0x03, struct sgx_enclave_provision)
30
#define SGX_IOC_VEPC_REMOVE_ALL \
31
_IO(SGX_MAGIC, 0x04)
32
#define SGX_IOC_ENCLAVE_RESTRICT_PERMISSIONS \
33
_IOWR(SGX_MAGIC, 0x05, struct sgx_enclave_restrict_permissions)
34
#define SGX_IOC_ENCLAVE_MODIFY_TYPES \
35
_IOWR(SGX_MAGIC, 0x06, struct sgx_enclave_modify_types)
36
#define SGX_IOC_ENCLAVE_REMOVE_PAGES \
37
_IOWR(SGX_MAGIC, 0x07, struct sgx_enclave_remove_pages)
38
39
/**
40
* struct sgx_enclave_create - parameter structure for the
41
* %SGX_IOC_ENCLAVE_CREATE ioctl
42
* @src: address for the SECS page data
43
*/
44
struct sgx_enclave_create {
45
__u64 src;
46
};
47
48
/**
49
* struct sgx_enclave_add_pages - parameter structure for the
50
* %SGX_IOC_ENCLAVE_ADD_PAGE ioctl
51
* @src: start address for the page data
52
* @offset: starting page offset
53
* @length: length of the data (multiple of the page size)
54
* @secinfo: address for the SECINFO data
55
* @flags: page control flags
56
* @count: number of bytes added (multiple of the page size)
57
*/
58
struct sgx_enclave_add_pages {
59
__u64 src;
60
__u64 offset;
61
__u64 length;
62
__u64 secinfo;
63
__u64 flags;
64
__u64 count;
65
};
66
67
/**
68
* struct sgx_enclave_init - parameter structure for the
69
* %SGX_IOC_ENCLAVE_INIT ioctl
70
* @sigstruct: address for the SIGSTRUCT data
71
*/
72
struct sgx_enclave_init {
73
__u64 sigstruct;
74
};
75
76
/**
77
* struct sgx_enclave_provision - parameter structure for the
78
* %SGX_IOC_ENCLAVE_PROVISION ioctl
79
* @fd: file handle of /dev/sgx_provision
80
*/
81
struct sgx_enclave_provision {
82
__u64 fd;
83
};
84
85
/**
86
* struct sgx_enclave_restrict_permissions - parameters for ioctl
87
* %SGX_IOC_ENCLAVE_RESTRICT_PERMISSIONS
88
* @offset: starting page offset (page aligned relative to enclave base
89
* address defined in SECS)
90
* @length: length of memory (multiple of the page size)
91
* @permissions:new permission bits for pages in range described by @offset
92
* and @length
93
* @result: (output) SGX result code of ENCLS[EMODPR] function
94
* @count: (output) bytes successfully changed (multiple of page size)
95
*/
96
struct sgx_enclave_restrict_permissions {
97
__u64 offset;
98
__u64 length;
99
__u64 permissions;
100
__u64 result;
101
__u64 count;
102
};
103
104
/**
105
* struct sgx_enclave_modify_types - parameters for ioctl
106
* %SGX_IOC_ENCLAVE_MODIFY_TYPES
107
* @offset: starting page offset (page aligned relative to enclave base
108
* address defined in SECS)
109
* @length: length of memory (multiple of the page size)
110
* @page_type: new type for pages in range described by @offset and @length
111
* @result: (output) SGX result code of ENCLS[EMODT] function
112
* @count: (output) bytes successfully changed (multiple of page size)
113
*/
114
struct sgx_enclave_modify_types {
115
__u64 offset;
116
__u64 length;
117
__u64 page_type;
118
__u64 result;
119
__u64 count;
120
};
121
122
/**
123
* struct sgx_enclave_remove_pages - %SGX_IOC_ENCLAVE_REMOVE_PAGES parameters
124
* @offset: starting page offset (page aligned relative to enclave base
125
* address defined in SECS)
126
* @length: length of memory (multiple of the page size)
127
* @count: (output) bytes successfully changed (multiple of page size)
128
*
129
* Regular (PT_REG) or TCS (PT_TCS) can be removed from an initialized
130
* enclave if the system supports SGX2. First, the %SGX_IOC_ENCLAVE_MODIFY_TYPES
131
* ioctl() should be used to change the page type to PT_TRIM. After that
132
* succeeds ENCLU[EACCEPT] should be run from within the enclave and then
133
* %SGX_IOC_ENCLAVE_REMOVE_PAGES can be used to complete the page removal.
134
*/
135
struct sgx_enclave_remove_pages {
136
__u64 offset;
137
__u64 length;
138
__u64 count;
139
};
140
141
struct sgx_enclave_run;
142
143
/**
144
* typedef sgx_enclave_user_handler_t - Exit handler function accepted by
145
* __vdso_sgx_enter_enclave()
146
* @rdi: RDI at the time of EEXIT, undefined on AEX
147
* @rsi: RSI at the time of EEXIT, undefined on AEX
148
* @rdx: RDX at the time of EEXIT, undefined on AEX
149
* @rsp: RSP (untrusted) at the time of EEXIT or AEX
150
* @r8: R8 at the time of EEXIT, undefined on AEX
151
* @r9: R9 at the time of EEXIT, undefined on AEX
152
* @run: The run instance given by the caller
153
*
154
* The register parameters contain the snapshot of their values at enclave
155
* exit. An invalid ENCLU function number will cause -EINVAL to be returned
156
* to the caller.
157
*
158
* Return:
159
* - <= 0: The given value is returned back to the caller.
160
* - > 0: ENCLU function to invoke, either EENTER or ERESUME.
161
*/
162
typedef int (*sgx_enclave_user_handler_t)(long rdi, long rsi, long rdx,
163
long rsp, long r8, long r9,
164
struct sgx_enclave_run *run);
165
166
/**
167
* struct sgx_enclave_run - the execution context of __vdso_sgx_enter_enclave()
168
* @tcs: TCS used to enter the enclave
169
* @function: The last seen ENCLU function (EENTER, ERESUME or EEXIT)
170
* @exception_vector: The interrupt vector of the exception
171
* @exception_error_code: The exception error code pulled out of the stack
172
* @exception_addr: The address that triggered the exception
173
* @user_handler: User provided callback run on exception
174
* @user_data: Data passed to the user handler
175
* @reserved: Reserved for future extensions
176
*
177
* If @user_handler is provided, the handler will be invoked on all return paths
178
* of the normal flow. The user handler may transfer control, e.g. via a
179
* longjmp() call or a C++ exception, without returning to
180
* __vdso_sgx_enter_enclave().
181
*/
182
struct sgx_enclave_run {
183
__u64 tcs;
184
__u32 function;
185
__u16 exception_vector;
186
__u16 exception_error_code;
187
__u64 exception_addr;
188
__u64 user_handler;
189
__u64 user_data;
190
__u8 reserved[216];
191
};
192
193
/**
194
* typedef vdso_sgx_enter_enclave_t - Prototype for __vdso_sgx_enter_enclave(),
195
* a vDSO function to enter an SGX enclave.
196
* @rdi: Pass-through value for RDI
197
* @rsi: Pass-through value for RSI
198
* @rdx: Pass-through value for RDX
199
* @function: ENCLU function, must be EENTER or ERESUME
200
* @r8: Pass-through value for R8
201
* @r9: Pass-through value for R9
202
* @run: struct sgx_enclave_run, must be non-NULL
203
*
204
* NOTE: __vdso_sgx_enter_enclave() does not ensure full compliance with the
205
* x86-64 ABI, e.g. doesn't handle XSAVE state. Except for non-volatile
206
* general purpose registers, EFLAGS.DF, and RSP alignment, preserving/setting
207
* state in accordance with the x86-64 ABI is the responsibility of the enclave
208
* and its runtime, i.e. __vdso_sgx_enter_enclave() cannot be called from C
209
* code without careful consideration by both the enclave and its runtime.
210
*
211
* All general purpose registers except RAX, RBX and RCX are passed as-is to the
212
* enclave. RAX, RBX and RCX are consumed by EENTER and ERESUME and are loaded
213
* with @function, asynchronous exit pointer, and @run.tcs respectively.
214
*
215
* RBP and the stack are used to anchor __vdso_sgx_enter_enclave() to the
216
* pre-enclave state, e.g. to retrieve @run.exception and @run.user_handler
217
* after an enclave exit. All other registers are available for use by the
218
* enclave and its runtime, e.g. an enclave can push additional data onto the
219
* stack (and modify RSP) to pass information to the optional user handler (see
220
* below).
221
*
222
* Most exceptions reported on ENCLU, including those that occur within the
223
* enclave, are fixed up and reported synchronously instead of being delivered
224
* via a standard signal. Debug Exceptions (#DB) and Breakpoints (#BP) are
225
* never fixed up and are always delivered via standard signals. On synchronously
226
* reported exceptions, -EFAULT is returned and details about the exception are
227
* recorded in @run.exception, the optional sgx_enclave_exception struct.
228
*
229
* Return:
230
* - 0: ENCLU function was successfully executed.
231
* - -EINVAL: Invalid ENCL number (neither EENTER nor ERESUME).
232
*/
233
typedef int (*vdso_sgx_enter_enclave_t)(unsigned long rdi, unsigned long rsi,
234
unsigned long rdx, unsigned int function,
235
unsigned long r8, unsigned long r9,
236
struct sgx_enclave_run *run);
237
238
#endif /* _UAPI_ASM_X86_SGX_H */
239
240