Intel® Software Guard Extensions (Intel® SGX)
Use hardware-based isolation and memory encryption to provide more code protection in your solutions.

GPRSGX region from enclave

Shohei_K_
Beginner
252 Views

 

I call this code from enclave:

/*getting now thread data*/ 
  _thread_data_t *thread_data;
  thread_data = get_thread_data();

  /*case 1 (suspended)*/
  ssa_gpr_t *ssa_gpr = reinterpret_cast<ssa_gpr_t *>(thread_data->first_ssa_gpr);
  int l=0;
  unsigned long addbp = ssa_gpr->REG(bp_u);

I think this code returns untrusted stack base pointer. So I use that to get return address to application program.

But return value does not point untrusted stack base pointer, ebp. I could not get the EBP of the stack outside Enclave by tracing that value.i can't solve this problem.Please help me.

Thank you

Shohei

0 Kudos
0 Replies
Reply