- Index
- December 2023
EDBGRD — Read From a Debug Enclave
Opcode/Instruction | Op/En | 64/32 bit Mode Support | CPUID Feature Flag | Description |
---|---|---|---|---|
EAX = 04H ENCLS[EDBGRD] | IR | V/V | SGX1 | This leaf function reads a dword/quadword from a debug enclave. |
Instruction Operand Encoding ¶
Op/En | EAX | RBX | RCX | |
IR | EDBGRD (In) | Return error code (Out) | Data read from a debug enclave (Out) | Address of source memory in the EPC (In) |
Description ¶
This leaf function copies a quadword/doubleword from an EPC page belonging to a debug enclave into the RBX register. Eight bytes are read in 64-bit mode, four bytes are read in non-64-bit modes. The size of data read cannot be overridden.
The effective address of the source location inside the EPC is provided in the register RCX.
EDBGRD Memory Parameter Semantics ¶
EPCQW |
Read access permitted by Enclave |
The error codes are:
Error Code (see Table 38-4) | Description |
---|---|
No Error | EDBGRD successful. |
SGX_PAGE_NOT_DEBUGGABLE | The EPC page cannot be accessed because it is in the PENDING or MODIFIED state. |
The instruction faults if any of the following:
EDBGRD Faulting Conditions ¶
RCX points into a page that is an SECS. | RCX does not resolve to a naturally aligned linear address. |
RCX points to a page that does not belong to an enclave that is in debug mode. | RCX points to a location inside a TCS that is beyond the architectural size of the TCS (SGX_TCS_LIMIT). |
An operand causing any segment violation. | May page fault. |
CPL > 0. |
This instruction ignores the EPCM RWX attributes on the enclave page. Consequently, violation of EPCM RWX attributes via EDBGRD does not result in a #GP.
Concurrency Restrictions ¶
Leaf | Parameter | Base Concurrency Restrictions | ||
---|---|---|---|---|
On Conflict | ||||
EDBGRD EDBGRD Target [DS:RCX] Shared EDBGRD Target [DS:RCX] | Target [DS:RCX] |
Leaf | Parameter | Additional Concurrency Restrictions | |||||
---|---|---|---|---|---|---|---|
vs. EACCEPT, EACCEPTCOPY, vs. EADD, EEXTEND, EINIT vs. ETRACK, ETRACKC Access vs. ETRACK, ETRACKC Access On Conflict Access vs. ETRACK, ETRACKC Access On Conflict EMODPE, EMODPR, EMODT | vs. EADD, EEXTEND, EINIT vs. EADD, EEXTEND, EINIT vs. ETRACK, ETRACKC | vs. ETRACK, ETRACKC | |||||
Access On Conflict Access On Conflict Access Access On Conflict Access On Conflict | |||||||
EDBGRD | Target [DS:RCX] | Concurrent | Concurrent | Concurrent |
Operation ¶
Temp Variables in EDBGRD Operational Flow ¶
Name | Type | Size (Bits) | Description |
---|---|---|---|
TMP_MODE64 | Binary | 1 | ((IA32_EFER.LMA = 1) && (CS.L = 1)) |
TMP_SECS | 64 | Physical address of SECS of the enclave to which source operand belongs. |
TMP_MODE64 := ((IA32_EFER.LMA = 1) && (CS.L = 1));
IF ( (TMP_MODE64 = 1) and (DS:RCX is not 8Byte Aligned) )
THEN #GP(0); FI;
IF ( (TMP_MODE64 = 0) and (DS:RCX is not 4Byte Aligned) )
THEN #GP(0); FI;
IF (DS:RCX does not resolve within an EPC)
THEN #PF(DS:RCX); FI;
(* make sure no other Intel SGX instruction is accessing the same EPCM entry *)
IF (Another instruction modifying the same EPCM entry is executing)
THEN #GP(0); FI;
IF (EPCM(DS:RCX).VALID = 0)
THEN #PF(DS:RCX); FI;
(* make sure that DS:RCX (SOURCE) is pointing to a PT_REG or PT_TCS or PT_VA or PT_SS_FIRST or PT_SS_REST *)
IF ( (EPCM(DS:RCX).PT ≠ PT_REG) and (EPCM(DS:RCX).PT ≠ PT_TCS) and (EPCM(DS:RCX).PT ≠ PT_VA)
and (EPCM(DS:RCX).PT ≠ PT_SS_FIRST) and (EPCM(DS:RCX).PT ≠ PT_SS_REST))
THEN #PF(DS:RCX); FI;
(* make sure that DS:RCX points to an accessible EPC page *)
IF (EPCM(DS:RCX).PENDING is not 0 or (EPCM(DS:RCX).MODIFIED is not 0) )
THEN
RFLAGS.ZF := 1;
RAX := SGX_PAGE_NOT_DEBUGGABLE;
GOTO DONE;
FI;
(* If source is a TCS, then make sure that the offset into the page is not beyond the TCS size*) IF ( ( EPCM(DS:RCX). PT = PT_TCS) and ((DS:RCX) & FFFH ≥ SGX_TCS_LIMIT) ) THEN #GP(0); FI;
(* make sure the enclave owning the PT_REG or PT_TCS page allow debug *)
IF ( (EPCM(DS:RCX).PT = PT_REG) or (EPCM(DS:RCX).PT = PT_TCS) )
THEN
TMP_SECS := GET_SECS_ADDRESS;
IF (TMP_SECS.ATTRIBUTES.DEBUG = 0)
THEN #GP(0); FI;
IF ( (TMP_MODE64 = 1) )
THEN RBX[63:0] := (DS:RCX)[63:0];
ELSE EBX[31:0] := (DS:RCX)[31:0];
FI;
ELSE
TMP_64BIT_VAL[63:0] := (DS:RCX)[63:0] & (~07H); // Read contents from VA slot
IF (TMP_MODE64 = 1)
THEN
IF (TMP_64BIT_VAL ≠ 0H)
THEN RBX[63:0] := 0FFFFFFFFFFFFFFFFH;
ELSE RBX[63:0] := 0H;
FI;
ELSE
IF (TMP_64BIT_VAL ≠ 0H)
THEN EBX[31:0] := 0FFFFFFFFH;
ELSE EBX[31:0] := 0H;
FI;
FI;
(* clear EAX and ZF to indicate successful completion *)
RAX := 0;
RFLAGS.ZF := 0;
DONE:
(* clear flags *)
RFLAGS.CF,PF,AF,OF,SF := 0;
Flags Affected ¶
ZF is set if the page is MODIFIED or PENDING; RAX contains the error code. Otherwise ZF is cleared and RAX is set to 0. CF, PF, AF, OF, SF are cleared.
Protected Mode Exceptions ¶
#GP(0) | If the address in RCS violates DS limit or access rights. |
If DS segment is unusable. | |
If RCX points to a memory location not 4Byte-aligned. | |
If the address in RCX points to a page belonging to a non-debug enclave. | |
If the address in RCX points to a page which is not PT_TCS, PT_REG or PT_VA. | |
If the address in RCX points to a location inside TCS that is beyond SGX_TCS_LIMIT. | |
#PF(error | code) If a page fault occurs in accessing memory operands. |
If the address in RCX points to a non-EPC page. | |
If the address in RCX points to an invalid EPC page. |
64-Bit Mode Exceptions ¶
#GP(0) | If RCX is non-canonical form. |
If RCX points to a memory location not 8Byte-aligned. | |
If the address in RCX points to a page belonging to a non-debug enclave. | |
If the address in RCX points to a page which is not PT_TCS, PT_REG or PT_VA. | |
If the address in RCX points to a location inside TCS that is beyond SGX_TCS_LIMIT. | |
#PF(error | code) If a page fault occurs in accessing memory operands. |
If the address in RCX points to a non-EPC page. | |
If the address in RCX points to an invalid EPC page. |