On 24/04/20 21:11, Alexander Graf wrote:
What I was saying above is that maybe code is easier to transfer thatwhynotboth.jpg :D
than a .txt file that gets lost somewhere in the Documentation directory
:).
Okay, got it. So, correct me if this is wrong, the information that isIt's just a very dumb container format that has a trivial header, aTo answer the question though, the target file is in a newly inventedWhat is this EIF?
file format called "EIF" and it needs to be loaded at offset 0x800000 of
the address space donated to the enclave.
section with the bzImage and one to many sections of initramfs.
As mentioned earlier in this thread, it really is just "-kernel" and
"-initrd", packed into a single binary for transmission to the host.
needed to boot the enclave is:
* the kernel, in bzImage format
* the initrd
* a consecutive amount of memory, to be mapped with
KVM_SET_USER_MEMORY_REGION
Off list, Alex and I discussed having a struct that points to kernel and
initrd off enclave memory, and have the driver build EIF at the
appropriate point in enclave memory (the 8 MiB ofset that you mentioned).
This however has two disadvantages:
1) having the kernel and initrd loaded by the parent VM in enclave
memory has the advantage that you save memory outside the enclave memory
for something that is only needed inside the enclave
2) it is less extensible (what if you want to use PVH in the future for
example) and puts in the driver policy that should be in userspace.
So why not just start running the enclave at 0xfffffff0 in real mode?
Yes everybody hates it, but that's what OSes are written against. In
the simplest example, the parent enclave can load bzImage and initrd at
0x10000 and place firmware tables (MPTable and DMI) somewhere at
0xf0000; the firmware would just be a few movs to segment registers
followed by a long jmp.
If you want to keep EIF, we measured in QEMU that there is no measurable
difference between loading the kernel in the host and doing it in the
guest, so Amazon could provide an EIF loader stub at 0xfffffff0 for
backwards compatibility.
That's great to hear!Again, I cannot provide a sensible review without explaining how to useOh, if there's anything that conflicts with open standards here, I would
all this. I understand that Amazon needs to do part of the design
behind closed doors, but this seems to have the resulted in issues that
reminds me of Intel's SGX misadventures. If Amazon has designed NE in a
way that is incompatible with open standards, it's up to Amazon to fix
love to hear it immediately. I do not believe in security by obscurity :).
Paolo