123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236 |
- /* SPDX-License-Identifier: GPL-2.0 */
- #ifndef _X86_ENCLS_H
- #define _X86_ENCLS_H
- #include <linux/bitops.h>
- #include <linux/err.h>
- #include <linux/io.h>
- #include <linux/rwsem.h>
- #include <linux/types.h>
- #include <asm/asm.h>
- #include <asm/traps.h>
- #include "sgx.h"
- /* Retrieve the encoded trapnr from the specified return code. */
- #define ENCLS_TRAPNR(r) ((r) & ~SGX_ENCLS_FAULT_FLAG)
- /* Issue a WARN() about an ENCLS function. */
- #define ENCLS_WARN(r, name) { \
- do { \
- int _r = (r); \
- WARN_ONCE(_r, "%s returned %d (0x%x)\n", (name), _r, _r); \
- } while (0); \
- }
- /*
- * encls_faulted() - Check if an ENCLS leaf faulted given an error code
- * @ret: the return value of an ENCLS leaf function call
- *
- * Return:
- * - true: ENCLS leaf faulted.
- * - false: Otherwise.
- */
- static inline bool encls_faulted(int ret)
- {
- return ret & SGX_ENCLS_FAULT_FLAG;
- }
- /**
- * encls_failed() - Check if an ENCLS function failed
- * @ret: the return value of an ENCLS function call
- *
- * Check if an ENCLS function failed. This happens when the function causes a
- * fault that is not caused by an EPCM conflict or when the function returns a
- * non-zero value.
- */
- static inline bool encls_failed(int ret)
- {
- if (encls_faulted(ret))
- return ENCLS_TRAPNR(ret) != X86_TRAP_PF;
- return !!ret;
- }
- /**
- * __encls_ret_N - encode an ENCLS function that returns an error code in EAX
- * @rax: function number
- * @inputs: asm inputs for the function
- *
- * Emit assembly for an ENCLS function that returns an error code, e.g. EREMOVE.
- * And because SGX isn't complex enough as it is, function that return an error
- * code also modify flags.
- *
- * Return:
- * 0 on success,
- * SGX error code on failure
- */
- #define __encls_ret_N(rax, inputs...) \
- ({ \
- int ret; \
- asm volatile( \
- "1: .byte 0x0f, 0x01, 0xcf;\n\t" \
- "2:\n" \
- _ASM_EXTABLE_TYPE(1b, 2b, EX_TYPE_FAULT_SGX) \
- : "=a"(ret) \
- : "a"(rax), inputs \
- : "memory", "cc"); \
- ret; \
- })
- #define __encls_ret_1(rax, rcx) \
- ({ \
- __encls_ret_N(rax, "c"(rcx)); \
- })
- #define __encls_ret_2(rax, rbx, rcx) \
- ({ \
- __encls_ret_N(rax, "b"(rbx), "c"(rcx)); \
- })
- #define __encls_ret_3(rax, rbx, rcx, rdx) \
- ({ \
- __encls_ret_N(rax, "b"(rbx), "c"(rcx), "d"(rdx)); \
- })
- /**
- * __encls_N - encode an ENCLS function that doesn't return an error code
- * @rax: function number
- * @rbx_out: optional output variable
- * @inputs: asm inputs for the function
- *
- * Emit assembly for an ENCLS function that does not return an error code, e.g.
- * ECREATE. Leaves without error codes either succeed or fault. @rbx_out is an
- * optional parameter for use by EDGBRD, which returns the requested value in
- * RBX.
- *
- * Return:
- * 0 on success,
- * trapnr with SGX_ENCLS_FAULT_FLAG set on fault
- */
- #define __encls_N(rax, rbx_out, inputs...) \
- ({ \
- int ret; \
- asm volatile( \
- "1: .byte 0x0f, 0x01, 0xcf;\n\t" \
- " xor %%eax,%%eax;\n" \
- "2:\n" \
- _ASM_EXTABLE_TYPE(1b, 2b, EX_TYPE_FAULT_SGX) \
- : "=a"(ret), "=b"(rbx_out) \
- : "a"(rax), inputs \
- : "memory"); \
- ret; \
- })
- #define __encls_2(rax, rbx, rcx) \
- ({ \
- unsigned long ign_rbx_out; \
- __encls_N(rax, ign_rbx_out, "b"(rbx), "c"(rcx)); \
- })
- #define __encls_1_1(rax, data, rcx) \
- ({ \
- unsigned long rbx_out; \
- int ret = __encls_N(rax, rbx_out, "c"(rcx)); \
- if (!ret) \
- data = rbx_out; \
- ret; \
- })
- /* Initialize an EPC page into an SGX Enclave Control Structure (SECS) page. */
- static inline int __ecreate(struct sgx_pageinfo *pginfo, void *secs)
- {
- return __encls_2(ECREATE, pginfo, secs);
- }
- /* Hash a 256 byte region of an enclave page to SECS:MRENCLAVE. */
- static inline int __eextend(void *secs, void *addr)
- {
- return __encls_2(EEXTEND, secs, addr);
- }
- /*
- * Associate an EPC page to an enclave either as a REG or TCS page
- * populated with the provided data.
- */
- static inline int __eadd(struct sgx_pageinfo *pginfo, void *addr)
- {
- return __encls_2(EADD, pginfo, addr);
- }
- /* Finalize enclave build, initialize enclave for user code execution. */
- static inline int __einit(void *sigstruct, void *token, void *secs)
- {
- return __encls_ret_3(EINIT, sigstruct, secs, token);
- }
- /* Disassociate EPC page from its enclave and mark it as unused. */
- static inline int __eremove(void *addr)
- {
- return __encls_ret_1(EREMOVE, addr);
- }
- /* Copy data to an EPC page belonging to a debug enclave. */
- static inline int __edbgwr(void *addr, unsigned long *data)
- {
- return __encls_2(EDGBWR, *data, addr);
- }
- /* Copy data from an EPC page belonging to a debug enclave. */
- static inline int __edbgrd(void *addr, unsigned long *data)
- {
- return __encls_1_1(EDGBRD, *data, addr);
- }
- /* Track that software has completed the required TLB address clears. */
- static inline int __etrack(void *addr)
- {
- return __encls_ret_1(ETRACK, addr);
- }
- /* Load, verify, and unblock an EPC page. */
- static inline int __eldu(struct sgx_pageinfo *pginfo, void *addr,
- void *va)
- {
- return __encls_ret_3(ELDU, pginfo, addr, va);
- }
- /* Make EPC page inaccessible to enclave, ready to be written to memory. */
- static inline int __eblock(void *addr)
- {
- return __encls_ret_1(EBLOCK, addr);
- }
- /* Initialize an EPC page into a Version Array (VA) page. */
- static inline int __epa(void *addr)
- {
- unsigned long rbx = SGX_PAGE_TYPE_VA;
- return __encls_2(EPA, rbx, addr);
- }
- /* Invalidate an EPC page and write it out to main memory. */
- static inline int __ewb(struct sgx_pageinfo *pginfo, void *addr,
- void *va)
- {
- return __encls_ret_3(EWB, pginfo, addr, va);
- }
- /* Restrict the EPCM permissions of an EPC page. */
- static inline int __emodpr(struct sgx_secinfo *secinfo, void *addr)
- {
- return __encls_ret_2(EMODPR, secinfo, addr);
- }
- /* Change the type of an EPC page. */
- static inline int __emodt(struct sgx_secinfo *secinfo, void *addr)
- {
- return __encls_ret_2(EMODT, secinfo, addr);
- }
- /* Zero a page of EPC memory and add it to an initialized enclave. */
- static inline int __eaug(struct sgx_pageinfo *pginfo, void *addr)
- {
- return __encls_2(EAUG, pginfo, addr);
- }
- #endif /* _X86_ENCLS_H */
|