Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp3911169ybf; Tue, 3 Mar 2020 15:37:34 -0800 (PST) X-Google-Smtp-Source: ADFU+vvjXhZ+39Kst6yguA76v2te5v1qmENzSQthiwkNVN+hbluX2xdbhUGUXved7SBdEKDWo3bE X-Received: by 2002:a9d:6f14:: with SMTP id n20mr170456otq.271.1583278654239; Tue, 03 Mar 2020 15:37:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583278654; cv=none; d=google.com; s=arc-20160816; b=iqTtTPr3tUTVNZgsK+1UOhzPjR1m9eDu3DWtqxXIY0MZH4P6pjVh/nBUettLS083LV 0yZZxdgMejPcV0eHhbd53flylejw5+4lIqmqhsQk4oVhJVlZitq1tQ5rew+eq7xRmwse tR0jVi25YPhv/aE5fQ+vvh6w5Q3wgKnmS3r/lngwzfScWF8zGFE0KBp17PCYFc52AhIm YT8SfojtUCAdJ7OwWD84hXjXfrVlY6WM+WXXo3uwGUSWIQdi2jGnsQ8N3clcLgD78xFI U2ZtNMaAg3p08qVkTNYkwF1tiFbfDzZiOoPvdOjV9myAslwXB50hGYLJuvyKqdCx30Xs u/VQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=YPOrcu72RcUYZxT/S1xAm/DDSIC0uXKNB7vwTSJjzkc=; b=CNLI4+IFLo3eUXJSOogwmHNFFMPkMhaid4qG+dF60mlFemke5cgrqmgO0DcW4gU05O IpKZiKMWgSDgpKzr2zKnrfRyBChtOOlMvfQqF89xflirFgX2BcCUcUB80e/VNxLAMKgQ Gpv94WeJdvYnd23L5N+n/Zf3uelBhwLuGzrRtJ7GDEIZFULifoXiyrbz172jiXQY9lJT gLqKD169ODazat0OVvPmV2WHPJJ5sPWNvYbENTkWzUSAytjSUdNbj923IwyEQcOH8ttO Srz60mfH+gzqIDUk1n3MlFsbP+406l0F5ZJVAFW1rWQONwF4wPH11VfL3GDan5SWpAIq W4VA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f187si156916oia.218.2020.03.03.15.37.22; Tue, 03 Mar 2020 15:37:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728618AbgCCXg7 (ORCPT + 99 others); Tue, 3 Mar 2020 18:36:59 -0500 Received: from mga17.intel.com ([192.55.52.151]:9801 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728388AbgCCXg7 (ORCPT ); Tue, 3 Mar 2020 18:36:59 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga107.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Mar 2020 15:36:59 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,511,1574150400"; d="scan'208";a="229117031" Received: from kwasilew-mobl.ger.corp.intel.com (HELO localhost) ([10.251.88.57]) by orsmga007.jf.intel.com with ESMTP; 03 Mar 2020 15:36:50 -0800 From: Jarkko Sakkinen To: linux-kernel@vger.kernel.org, x86@kernel.org, linux-sgx@vger.kernel.org Cc: akpm@linux-foundation.org, dave.hansen@intel.com, sean.j.christopherson@intel.com, nhorman@redhat.com, npmccallum@redhat.com, haitao.huang@intel.com, andriy.shevchenko@linux.intel.com, tglx@linutronix.de, kai.svahn@intel.com, bp@alien8.de, josh@joshtriplett.org, luto@kernel.org, kai.huang@intel.com, rientjes@google.com, cedric.xing@intel.com, puiterwijk@redhat.com, Jarkko Sakkinen Subject: [PATCH v28 03/22] x86/cpufeatures: x86/msr: Intel SGX Launch Control hardware bits Date: Wed, 4 Mar 2020 01:35:50 +0200 Message-Id: <20200303233609.713348-4-jarkko.sakkinen@linux.intel.com> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200303233609.713348-1-jarkko.sakkinen@linux.intel.com> References: <20200303233609.713348-1-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson Add X86_FEATURE_SGX_LC, which informs whether or not the CPU supports SGX Launch Control. Add MSR_IA32_SGXLEPUBKEYHASH{0, 1, 2, 3}, which when combined contain a SHA256 hash of a 3072-bit RSA public key. SGX backed software packages, so called enclaves, are always signed. All enclaves signed with the public key are unconditionally allowed to initialize. [1] Add FEATURE_CONTROL_SGX_LE_WR bit of the feature control MSR, which informs whether the formentioned MSRs are writable or not. If the bit is off, the public key MSRs are read-only for the OS. If the MSRs are read-only, the platform must provide a launch enclave (LE). LE can create cryptographic tokens for other enclaves that they can pass together with their signature to the ENCLS(EINIT) opcode, which is used to initialize enclaves. Linux is unlikely to support the locked configuration because it takes away the control of the launch decisions from the kernel. [1] Intel SDM: 38.1.4 Intel SGX Launch Control Configuration Signed-off-by: Sean Christopherson Co-developed-by: Jarkko Sakkinen Signed-off-by: Jarkko Sakkinen --- arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/msr-index.h | 7 +++++++ 2 files changed, 8 insertions(+) diff --git a/arch/x86/include/asm/cpufeatures.h b/arch/x86/include/asm/cpufeatures.h index 42ae9fb06987..bc5ad93cbeb6 100644 --- a/arch/x86/include/asm/cpufeatures.h +++ b/arch/x86/include/asm/cpufeatures.h @@ -350,6 +350,7 @@ #define X86_FEATURE_CLDEMOTE (16*32+25) /* CLDEMOTE instruction */ #define X86_FEATURE_MOVDIRI (16*32+27) /* MOVDIRI instruction */ #define X86_FEATURE_MOVDIR64B (16*32+28) /* MOVDIR64B instruction */ +#define X86_FEATURE_SGX_LC (16*32+30) /* Software Guard Extensions Launch Control */ /* AMD-defined CPU features, CPUID level 0x80000007 (EBX), word 17 */ #define X86_FEATURE_OVERFLOW_RECOV (17*32+ 0) /* MCA overflow recovery support */ diff --git a/arch/x86/include/asm/msr-index.h b/arch/x86/include/asm/msr-index.h index e190293c8923..bae17ea2c8fe 100644 --- a/arch/x86/include/asm/msr-index.h +++ b/arch/x86/include/asm/msr-index.h @@ -566,6 +566,7 @@ #define FEAT_CTL_LOCKED BIT(0) #define FEAT_CTL_VMX_ENABLED_INSIDE_SMX BIT(1) #define FEAT_CTL_VMX_ENABLED_OUTSIDE_SMX BIT(2) +#define FEAT_CTL_SGX_LC_ENABLED BIT(17) #define FEAT_CTL_SGX_ENABLED BIT(18) #define FEAT_CTL_LMCE_ENABLED BIT(20) @@ -586,6 +587,12 @@ #define MSR_IA32_UCODE_WRITE 0x00000079 #define MSR_IA32_UCODE_REV 0x0000008b +/* Intel SGX Launch Enclave Public Key Hash MSRs */ +#define MSR_IA32_SGXLEPUBKEYHASH0 0x0000008C +#define MSR_IA32_SGXLEPUBKEYHASH1 0x0000008D +#define MSR_IA32_SGXLEPUBKEYHASH2 0x0000008E +#define MSR_IA32_SGXLEPUBKEYHASH3 0x0000008F + #define MSR_IA32_SMM_MONITOR_CTL 0x0000009b #define MSR_IA32_SMBASE 0x0000009e -- 2.25.0