Hi Ross,
This isn’t a scenario we’ve looked at. My suspicion is this will be quite difficult, as Asylo provides a system interface at the level of libc, whereas the golang runtime issues system calls directly. As the syscall instruction is not available inside an SGX enclave, I suspect you would just end up crashing at runtime even if you could resolve the toolchain issues you’re reporting. Without making substantial changes ito the golang runtime (see for instance os_linux.go and syscall_unix.go), and possibly adding critical syscalls to Asylo that the golang runtime requires, I don’t think this is going to work.
Looking around, I do see some examples of calling into untrusted go code running outside an enclave. See: https://github.com/rupc/go-with-intel-sgx. There’s also been some academic research work on adding SGX support at the language / runtime level which you may find interesting. See: https://github.com/epfl-dcsl/gotee.
Regards,
Matt Gingell
--
Visit asylo.dev for the latest information.
---
You received this message because you are subscribed to the Google Groups "Asylo Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to asylo-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/asylo-users/8a146bfb-f189-437a-b81c-55a6ea1fa3ben%40googlegroups.com.