sgx.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498
  1. // SPDX-License-Identifier: GPL-2.0
  2. /* Copyright(c) 2021 Intel Corporation. */
  3. #include <asm/sgx.h>
  4. #include "cpuid.h"
  5. #include "kvm_cache_regs.h"
  6. #include "nested.h"
  7. #include "sgx.h"
  8. #include "vmx.h"
  9. #include "x86.h"
  10. bool __read_mostly enable_sgx = 1;
  11. module_param_named(sgx, enable_sgx, bool, 0444);
  12. /* Initial value of guest's virtual SGX_LEPUBKEYHASHn MSRs */
  13. static u64 sgx_pubkey_hash[4] __ro_after_init;
  14. /*
  15. * ENCLS's memory operands use a fixed segment (DS) and a fixed
  16. * address size based on the mode. Related prefixes are ignored.
  17. */
  18. static int sgx_get_encls_gva(struct kvm_vcpu *vcpu, unsigned long offset,
  19. int size, int alignment, gva_t *gva)
  20. {
  21. struct kvm_segment s;
  22. bool fault;
  23. /* Skip vmcs.GUEST_DS retrieval for 64-bit mode to avoid VMREADs. */
  24. *gva = offset;
  25. if (!is_long_mode(vcpu)) {
  26. vmx_get_segment(vcpu, &s, VCPU_SREG_DS);
  27. *gva += s.base;
  28. }
  29. if (!IS_ALIGNED(*gva, alignment)) {
  30. fault = true;
  31. } else if (likely(is_long_mode(vcpu))) {
  32. fault = is_noncanonical_address(*gva, vcpu);
  33. } else {
  34. *gva &= 0xffffffff;
  35. fault = (s.unusable) ||
  36. (s.type != 2 && s.type != 3) ||
  37. (*gva > s.limit) ||
  38. ((s.base != 0 || s.limit != 0xffffffff) &&
  39. (((u64)*gva + size - 1) > s.limit + 1));
  40. }
  41. if (fault)
  42. kvm_inject_gp(vcpu, 0);
  43. return fault ? -EINVAL : 0;
  44. }
  45. static void sgx_handle_emulation_failure(struct kvm_vcpu *vcpu, u64 addr,
  46. unsigned int size)
  47. {
  48. uint64_t data[2] = { addr, size };
  49. __kvm_prepare_emulation_failure_exit(vcpu, data, ARRAY_SIZE(data));
  50. }
  51. static int sgx_read_hva(struct kvm_vcpu *vcpu, unsigned long hva, void *data,
  52. unsigned int size)
  53. {
  54. if (__copy_from_user(data, (void __user *)hva, size)) {
  55. sgx_handle_emulation_failure(vcpu, hva, size);
  56. return -EFAULT;
  57. }
  58. return 0;
  59. }
  60. static int sgx_gva_to_gpa(struct kvm_vcpu *vcpu, gva_t gva, bool write,
  61. gpa_t *gpa)
  62. {
  63. struct x86_exception ex;
  64. if (write)
  65. *gpa = kvm_mmu_gva_to_gpa_write(vcpu, gva, &ex);
  66. else
  67. *gpa = kvm_mmu_gva_to_gpa_read(vcpu, gva, &ex);
  68. if (*gpa == INVALID_GPA) {
  69. kvm_inject_emulated_page_fault(vcpu, &ex);
  70. return -EFAULT;
  71. }
  72. return 0;
  73. }
  74. static int sgx_gpa_to_hva(struct kvm_vcpu *vcpu, gpa_t gpa, unsigned long *hva)
  75. {
  76. *hva = kvm_vcpu_gfn_to_hva(vcpu, PFN_DOWN(gpa));
  77. if (kvm_is_error_hva(*hva)) {
  78. sgx_handle_emulation_failure(vcpu, gpa, 1);
  79. return -EFAULT;
  80. }
  81. *hva |= gpa & ~PAGE_MASK;
  82. return 0;
  83. }
  84. static int sgx_inject_fault(struct kvm_vcpu *vcpu, gva_t gva, int trapnr)
  85. {
  86. struct x86_exception ex;
  87. /*
  88. * A non-EPCM #PF indicates a bad userspace HVA. This *should* check
  89. * for PFEC.SGX and not assume any #PF on SGX2 originated in the EPC,
  90. * but the error code isn't (yet) plumbed through the ENCLS helpers.
  91. */
  92. if (trapnr == PF_VECTOR && !boot_cpu_has(X86_FEATURE_SGX2)) {
  93. kvm_prepare_emulation_failure_exit(vcpu);
  94. return 0;
  95. }
  96. /*
  97. * If the guest thinks it's running on SGX2 hardware, inject an SGX
  98. * #PF if the fault matches an EPCM fault signature (#GP on SGX1,
  99. * #PF on SGX2). The assumption is that EPCM faults are much more
  100. * likely than a bad userspace address.
  101. */
  102. if ((trapnr == PF_VECTOR || !boot_cpu_has(X86_FEATURE_SGX2)) &&
  103. guest_cpuid_has(vcpu, X86_FEATURE_SGX2)) {
  104. memset(&ex, 0, sizeof(ex));
  105. ex.vector = PF_VECTOR;
  106. ex.error_code = PFERR_PRESENT_MASK | PFERR_WRITE_MASK |
  107. PFERR_SGX_MASK;
  108. ex.address = gva;
  109. ex.error_code_valid = true;
  110. ex.nested_page_fault = false;
  111. kvm_inject_emulated_page_fault(vcpu, &ex);
  112. } else {
  113. kvm_inject_gp(vcpu, 0);
  114. }
  115. return 1;
  116. }
  117. static int __handle_encls_ecreate(struct kvm_vcpu *vcpu,
  118. struct sgx_pageinfo *pageinfo,
  119. unsigned long secs_hva,
  120. gva_t secs_gva)
  121. {
  122. struct sgx_secs *contents = (struct sgx_secs *)pageinfo->contents;
  123. struct kvm_cpuid_entry2 *sgx_12_0, *sgx_12_1;
  124. u64 attributes, xfrm, size;
  125. u32 miscselect;
  126. u8 max_size_log2;
  127. int trapnr, ret;
  128. sgx_12_0 = kvm_find_cpuid_entry_index(vcpu, 0x12, 0);
  129. sgx_12_1 = kvm_find_cpuid_entry_index(vcpu, 0x12, 1);
  130. if (!sgx_12_0 || !sgx_12_1) {
  131. kvm_prepare_emulation_failure_exit(vcpu);
  132. return 0;
  133. }
  134. miscselect = contents->miscselect;
  135. attributes = contents->attributes;
  136. xfrm = contents->xfrm;
  137. size = contents->size;
  138. /* Enforce restriction of access to the PROVISIONKEY. */
  139. if (!vcpu->kvm->arch.sgx_provisioning_allowed &&
  140. (attributes & SGX_ATTR_PROVISIONKEY)) {
  141. if (sgx_12_1->eax & SGX_ATTR_PROVISIONKEY)
  142. pr_warn_once("KVM: SGX PROVISIONKEY advertised but not allowed\n");
  143. kvm_inject_gp(vcpu, 0);
  144. return 1;
  145. }
  146. /* Enforce CPUID restrictions on MISCSELECT, ATTRIBUTES and XFRM. */
  147. if ((u32)miscselect & ~sgx_12_0->ebx ||
  148. (u32)attributes & ~sgx_12_1->eax ||
  149. (u32)(attributes >> 32) & ~sgx_12_1->ebx ||
  150. (u32)xfrm & ~sgx_12_1->ecx ||
  151. (u32)(xfrm >> 32) & ~sgx_12_1->edx) {
  152. kvm_inject_gp(vcpu, 0);
  153. return 1;
  154. }
  155. /* Enforce CPUID restriction on max enclave size. */
  156. max_size_log2 = (attributes & SGX_ATTR_MODE64BIT) ? sgx_12_0->edx >> 8 :
  157. sgx_12_0->edx;
  158. if (size >= BIT_ULL(max_size_log2)) {
  159. kvm_inject_gp(vcpu, 0);
  160. return 1;
  161. }
  162. /*
  163. * sgx_virt_ecreate() returns:
  164. * 1) 0: ECREATE was successful
  165. * 2) -EFAULT: ECREATE was run but faulted, and trapnr was set to the
  166. * exception number.
  167. * 3) -EINVAL: access_ok() on @secs_hva failed. This should never
  168. * happen as KVM checks host addresses at memslot creation.
  169. * sgx_virt_ecreate() has already warned in this case.
  170. */
  171. ret = sgx_virt_ecreate(pageinfo, (void __user *)secs_hva, &trapnr);
  172. if (!ret)
  173. return kvm_skip_emulated_instruction(vcpu);
  174. if (ret == -EFAULT)
  175. return sgx_inject_fault(vcpu, secs_gva, trapnr);
  176. return ret;
  177. }
  178. static int handle_encls_ecreate(struct kvm_vcpu *vcpu)
  179. {
  180. gva_t pageinfo_gva, secs_gva;
  181. gva_t metadata_gva, contents_gva;
  182. gpa_t metadata_gpa, contents_gpa, secs_gpa;
  183. unsigned long metadata_hva, contents_hva, secs_hva;
  184. struct sgx_pageinfo pageinfo;
  185. struct sgx_secs *contents;
  186. struct x86_exception ex;
  187. int r;
  188. if (sgx_get_encls_gva(vcpu, kvm_rbx_read(vcpu), 32, 32, &pageinfo_gva) ||
  189. sgx_get_encls_gva(vcpu, kvm_rcx_read(vcpu), 4096, 4096, &secs_gva))
  190. return 1;
  191. /*
  192. * Copy the PAGEINFO to local memory, its pointers need to be
  193. * translated, i.e. we need to do a deep copy/translate.
  194. */
  195. r = kvm_read_guest_virt(vcpu, pageinfo_gva, &pageinfo,
  196. sizeof(pageinfo), &ex);
  197. if (r == X86EMUL_PROPAGATE_FAULT) {
  198. kvm_inject_emulated_page_fault(vcpu, &ex);
  199. return 1;
  200. } else if (r != X86EMUL_CONTINUE) {
  201. sgx_handle_emulation_failure(vcpu, pageinfo_gva,
  202. sizeof(pageinfo));
  203. return 0;
  204. }
  205. if (sgx_get_encls_gva(vcpu, pageinfo.metadata, 64, 64, &metadata_gva) ||
  206. sgx_get_encls_gva(vcpu, pageinfo.contents, 4096, 4096,
  207. &contents_gva))
  208. return 1;
  209. /*
  210. * Translate the SECINFO, SOURCE and SECS pointers from GVA to GPA.
  211. * Resume the guest on failure to inject a #PF.
  212. */
  213. if (sgx_gva_to_gpa(vcpu, metadata_gva, false, &metadata_gpa) ||
  214. sgx_gva_to_gpa(vcpu, contents_gva, false, &contents_gpa) ||
  215. sgx_gva_to_gpa(vcpu, secs_gva, true, &secs_gpa))
  216. return 1;
  217. /*
  218. * ...and then to HVA. The order of accesses isn't architectural, i.e.
  219. * KVM doesn't have to fully process one address at a time. Exit to
  220. * userspace if a GPA is invalid.
  221. */
  222. if (sgx_gpa_to_hva(vcpu, metadata_gpa, &metadata_hva) ||
  223. sgx_gpa_to_hva(vcpu, contents_gpa, &contents_hva) ||
  224. sgx_gpa_to_hva(vcpu, secs_gpa, &secs_hva))
  225. return 0;
  226. /*
  227. * Copy contents into kernel memory to prevent TOCTOU attack. E.g. the
  228. * guest could do ECREATE w/ SECS.SGX_ATTR_PROVISIONKEY=0, and
  229. * simultaneously set SGX_ATTR_PROVISIONKEY to bypass the check to
  230. * enforce restriction of access to the PROVISIONKEY.
  231. */
  232. contents = (struct sgx_secs *)__get_free_page(GFP_KERNEL_ACCOUNT);
  233. if (!contents)
  234. return -ENOMEM;
  235. /* Exit to userspace if copying from a host userspace address fails. */
  236. if (sgx_read_hva(vcpu, contents_hva, (void *)contents, PAGE_SIZE)) {
  237. free_page((unsigned long)contents);
  238. return 0;
  239. }
  240. pageinfo.metadata = metadata_hva;
  241. pageinfo.contents = (u64)contents;
  242. r = __handle_encls_ecreate(vcpu, &pageinfo, secs_hva, secs_gva);
  243. free_page((unsigned long)contents);
  244. return r;
  245. }
  246. static int handle_encls_einit(struct kvm_vcpu *vcpu)
  247. {
  248. unsigned long sig_hva, secs_hva, token_hva, rflags;
  249. struct vcpu_vmx *vmx = to_vmx(vcpu);
  250. gva_t sig_gva, secs_gva, token_gva;
  251. gpa_t sig_gpa, secs_gpa, token_gpa;
  252. int ret, trapnr;
  253. if (sgx_get_encls_gva(vcpu, kvm_rbx_read(vcpu), 1808, 4096, &sig_gva) ||
  254. sgx_get_encls_gva(vcpu, kvm_rcx_read(vcpu), 4096, 4096, &secs_gva) ||
  255. sgx_get_encls_gva(vcpu, kvm_rdx_read(vcpu), 304, 512, &token_gva))
  256. return 1;
  257. /*
  258. * Translate the SIGSTRUCT, SECS and TOKEN pointers from GVA to GPA.
  259. * Resume the guest on failure to inject a #PF.
  260. */
  261. if (sgx_gva_to_gpa(vcpu, sig_gva, false, &sig_gpa) ||
  262. sgx_gva_to_gpa(vcpu, secs_gva, true, &secs_gpa) ||
  263. sgx_gva_to_gpa(vcpu, token_gva, false, &token_gpa))
  264. return 1;
  265. /*
  266. * ...and then to HVA. The order of accesses isn't architectural, i.e.
  267. * KVM doesn't have to fully process one address at a time. Exit to
  268. * userspace if a GPA is invalid. Note, all structures are aligned and
  269. * cannot split pages.
  270. */
  271. if (sgx_gpa_to_hva(vcpu, sig_gpa, &sig_hva) ||
  272. sgx_gpa_to_hva(vcpu, secs_gpa, &secs_hva) ||
  273. sgx_gpa_to_hva(vcpu, token_gpa, &token_hva))
  274. return 0;
  275. ret = sgx_virt_einit((void __user *)sig_hva, (void __user *)token_hva,
  276. (void __user *)secs_hva,
  277. vmx->msr_ia32_sgxlepubkeyhash, &trapnr);
  278. if (ret == -EFAULT)
  279. return sgx_inject_fault(vcpu, secs_gva, trapnr);
  280. /*
  281. * sgx_virt_einit() returns -EINVAL when access_ok() fails on @sig_hva,
  282. * @token_hva or @secs_hva. This should never happen as KVM checks host
  283. * addresses at memslot creation. sgx_virt_einit() has already warned
  284. * in this case, so just return.
  285. */
  286. if (ret < 0)
  287. return ret;
  288. rflags = vmx_get_rflags(vcpu) & ~(X86_EFLAGS_CF | X86_EFLAGS_PF |
  289. X86_EFLAGS_AF | X86_EFLAGS_SF |
  290. X86_EFLAGS_OF);
  291. if (ret)
  292. rflags |= X86_EFLAGS_ZF;
  293. else
  294. rflags &= ~X86_EFLAGS_ZF;
  295. vmx_set_rflags(vcpu, rflags);
  296. kvm_rax_write(vcpu, ret);
  297. return kvm_skip_emulated_instruction(vcpu);
  298. }
  299. static inline bool encls_leaf_enabled_in_guest(struct kvm_vcpu *vcpu, u32 leaf)
  300. {
  301. if (!enable_sgx || !guest_cpuid_has(vcpu, X86_FEATURE_SGX))
  302. return false;
  303. if (leaf >= ECREATE && leaf <= ETRACK)
  304. return guest_cpuid_has(vcpu, X86_FEATURE_SGX1);
  305. if (leaf >= EAUG && leaf <= EMODT)
  306. return guest_cpuid_has(vcpu, X86_FEATURE_SGX2);
  307. return false;
  308. }
  309. static inline bool sgx_enabled_in_guest_bios(struct kvm_vcpu *vcpu)
  310. {
  311. const u64 bits = FEAT_CTL_SGX_ENABLED | FEAT_CTL_LOCKED;
  312. return (to_vmx(vcpu)->msr_ia32_feature_control & bits) == bits;
  313. }
  314. int handle_encls(struct kvm_vcpu *vcpu)
  315. {
  316. u32 leaf = (u32)kvm_rax_read(vcpu);
  317. if (!encls_leaf_enabled_in_guest(vcpu, leaf)) {
  318. kvm_queue_exception(vcpu, UD_VECTOR);
  319. } else if (!sgx_enabled_in_guest_bios(vcpu)) {
  320. kvm_inject_gp(vcpu, 0);
  321. } else {
  322. if (leaf == ECREATE)
  323. return handle_encls_ecreate(vcpu);
  324. if (leaf == EINIT)
  325. return handle_encls_einit(vcpu);
  326. WARN(1, "KVM: unexpected exit on ENCLS[%u]", leaf);
  327. vcpu->run->exit_reason = KVM_EXIT_UNKNOWN;
  328. vcpu->run->hw.hardware_exit_reason = EXIT_REASON_ENCLS;
  329. return 0;
  330. }
  331. return 1;
  332. }
  333. void setup_default_sgx_lepubkeyhash(void)
  334. {
  335. /*
  336. * Use Intel's default value for Skylake hardware if Launch Control is
  337. * not supported, i.e. Intel's hash is hardcoded into silicon, or if
  338. * Launch Control is supported and enabled, i.e. mimic the reset value
  339. * and let the guest write the MSRs at will. If Launch Control is
  340. * supported but disabled, then use the current MSR values as the hash
  341. * MSRs exist but are read-only (locked and not writable).
  342. */
  343. if (!enable_sgx || boot_cpu_has(X86_FEATURE_SGX_LC) ||
  344. rdmsrl_safe(MSR_IA32_SGXLEPUBKEYHASH0, &sgx_pubkey_hash[0])) {
  345. sgx_pubkey_hash[0] = 0xa6053e051270b7acULL;
  346. sgx_pubkey_hash[1] = 0x6cfbe8ba8b3b413dULL;
  347. sgx_pubkey_hash[2] = 0xc4916d99f2b3735dULL;
  348. sgx_pubkey_hash[3] = 0xd4f8c05909f9bb3bULL;
  349. } else {
  350. /* MSR_IA32_SGXLEPUBKEYHASH0 is read above */
  351. rdmsrl(MSR_IA32_SGXLEPUBKEYHASH1, sgx_pubkey_hash[1]);
  352. rdmsrl(MSR_IA32_SGXLEPUBKEYHASH2, sgx_pubkey_hash[2]);
  353. rdmsrl(MSR_IA32_SGXLEPUBKEYHASH3, sgx_pubkey_hash[3]);
  354. }
  355. }
  356. void vcpu_setup_sgx_lepubkeyhash(struct kvm_vcpu *vcpu)
  357. {
  358. struct vcpu_vmx *vmx = to_vmx(vcpu);
  359. memcpy(vmx->msr_ia32_sgxlepubkeyhash, sgx_pubkey_hash,
  360. sizeof(sgx_pubkey_hash));
  361. }
  362. /*
  363. * ECREATE must be intercepted to enforce MISCSELECT, ATTRIBUTES and XFRM
  364. * restrictions if the guest's allowed-1 settings diverge from hardware.
  365. */
  366. static bool sgx_intercept_encls_ecreate(struct kvm_vcpu *vcpu)
  367. {
  368. struct kvm_cpuid_entry2 *guest_cpuid;
  369. u32 eax, ebx, ecx, edx;
  370. if (!vcpu->kvm->arch.sgx_provisioning_allowed)
  371. return true;
  372. guest_cpuid = kvm_find_cpuid_entry_index(vcpu, 0x12, 0);
  373. if (!guest_cpuid)
  374. return true;
  375. cpuid_count(0x12, 0, &eax, &ebx, &ecx, &edx);
  376. if (guest_cpuid->ebx != ebx || guest_cpuid->edx != edx)
  377. return true;
  378. guest_cpuid = kvm_find_cpuid_entry_index(vcpu, 0x12, 1);
  379. if (!guest_cpuid)
  380. return true;
  381. cpuid_count(0x12, 1, &eax, &ebx, &ecx, &edx);
  382. if (guest_cpuid->eax != eax || guest_cpuid->ebx != ebx ||
  383. guest_cpuid->ecx != ecx || guest_cpuid->edx != edx)
  384. return true;
  385. return false;
  386. }
  387. void vmx_write_encls_bitmap(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12)
  388. {
  389. /*
  390. * There is no software enable bit for SGX that is virtualized by
  391. * hardware, e.g. there's no CR4.SGXE, so when SGX is disabled in the
  392. * guest (either by the host or by the guest's BIOS) but enabled in the
  393. * host, trap all ENCLS leafs and inject #UD/#GP as needed to emulate
  394. * the expected system behavior for ENCLS.
  395. */
  396. u64 bitmap = -1ull;
  397. /* Nothing to do if hardware doesn't support SGX */
  398. if (!cpu_has_vmx_encls_vmexit())
  399. return;
  400. if (guest_cpuid_has(vcpu, X86_FEATURE_SGX) &&
  401. sgx_enabled_in_guest_bios(vcpu)) {
  402. if (guest_cpuid_has(vcpu, X86_FEATURE_SGX1)) {
  403. bitmap &= ~GENMASK_ULL(ETRACK, ECREATE);
  404. if (sgx_intercept_encls_ecreate(vcpu))
  405. bitmap |= (1 << ECREATE);
  406. }
  407. if (guest_cpuid_has(vcpu, X86_FEATURE_SGX2))
  408. bitmap &= ~GENMASK_ULL(EMODT, EAUG);
  409. /*
  410. * Trap and execute EINIT if launch control is enabled in the
  411. * host using the guest's values for launch control MSRs, even
  412. * if the guest's values are fixed to hardware default values.
  413. * The MSRs are not loaded/saved on VM-Enter/VM-Exit as writing
  414. * the MSRs is extraordinarily expensive.
  415. */
  416. if (boot_cpu_has(X86_FEATURE_SGX_LC))
  417. bitmap |= (1 << EINIT);
  418. if (!vmcs12 && is_guest_mode(vcpu))
  419. vmcs12 = get_vmcs12(vcpu);
  420. if (vmcs12 && nested_cpu_has_encls_exit(vmcs12))
  421. bitmap |= vmcs12->encls_exiting_bitmap;
  422. }
  423. vmcs_write64(ENCLS_EXITING_BITMAP, bitmap);
  424. }