Loading...
Note: File does not exist in v5.4.
1// SPDX-License-Identifier: GPL-2.0
2#include <linux/tboot.h>
3
4#include <asm/cpufeature.h>
5#include <asm/msr-index.h>
6#include <asm/processor.h>
7#include <asm/vmx.h>
8#include "cpu.h"
9
10#undef pr_fmt
11#define pr_fmt(fmt) "x86/cpu: " fmt
12
13#ifdef CONFIG_X86_VMX_FEATURE_NAMES
14enum vmx_feature_leafs {
15 MISC_FEATURES = 0,
16 PRIMARY_CTLS,
17 SECONDARY_CTLS,
18 NR_VMX_FEATURE_WORDS,
19};
20
21#define VMX_F(x) BIT(VMX_FEATURE_##x & 0x1f)
22
23static void init_vmx_capabilities(struct cpuinfo_x86 *c)
24{
25 u32 supported, funcs, ept, vpid, ign;
26
27 BUILD_BUG_ON(NVMXINTS != NR_VMX_FEATURE_WORDS);
28
29 /*
30 * The high bits contain the allowed-1 settings, i.e. features that can
31 * be turned on. The low bits contain the allowed-0 settings, i.e.
32 * features that can be turned off. Ignore the allowed-0 settings,
33 * if a feature can be turned on then it's supported.
34 *
35 * Use raw rdmsr() for primary processor controls and pin controls MSRs
36 * as they exist on any CPU that supports VMX, i.e. we want the WARN if
37 * the RDMSR faults.
38 */
39 rdmsr(MSR_IA32_VMX_PROCBASED_CTLS, ign, supported);
40 c->vmx_capability[PRIMARY_CTLS] = supported;
41
42 rdmsr_safe(MSR_IA32_VMX_PROCBASED_CTLS2, &ign, &supported);
43 c->vmx_capability[SECONDARY_CTLS] = supported;
44
45 rdmsr(MSR_IA32_VMX_PINBASED_CTLS, ign, supported);
46 rdmsr_safe(MSR_IA32_VMX_VMFUNC, &ign, &funcs);
47
48 /*
49 * Except for EPT+VPID, which enumerates support for both in a single
50 * MSR, low for EPT, high for VPID.
51 */
52 rdmsr_safe(MSR_IA32_VMX_EPT_VPID_CAP, &ept, &vpid);
53
54 /* Pin, EPT, VPID and VM-Func are merged into a single word. */
55 WARN_ON_ONCE(supported >> 16);
56 WARN_ON_ONCE(funcs >> 4);
57 c->vmx_capability[MISC_FEATURES] = (supported & 0xffff) |
58 ((vpid & 0x1) << 16) |
59 ((funcs & 0xf) << 28);
60
61 /* EPT bits are full on scattered and must be manually handled. */
62 if (ept & VMX_EPT_EXECUTE_ONLY_BIT)
63 c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_EXECUTE_ONLY);
64 if (ept & VMX_EPT_AD_BIT)
65 c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_AD);
66 if (ept & VMX_EPT_1GB_PAGE_BIT)
67 c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_1GB);
68
69 /* Synthetic APIC features that are aggregates of multiple features. */
70 if ((c->vmx_capability[PRIMARY_CTLS] & VMX_F(VIRTUAL_TPR)) &&
71 (c->vmx_capability[SECONDARY_CTLS] & VMX_F(VIRT_APIC_ACCESSES)))
72 c->vmx_capability[MISC_FEATURES] |= VMX_F(FLEXPRIORITY);
73
74 if ((c->vmx_capability[PRIMARY_CTLS] & VMX_F(VIRTUAL_TPR)) &&
75 (c->vmx_capability[SECONDARY_CTLS] & VMX_F(APIC_REGISTER_VIRT)) &&
76 (c->vmx_capability[SECONDARY_CTLS] & VMX_F(VIRT_INTR_DELIVERY)) &&
77 (c->vmx_capability[MISC_FEATURES] & VMX_F(POSTED_INTR)))
78 c->vmx_capability[MISC_FEATURES] |= VMX_F(APICV);
79
80 /* Set the synthetic cpufeatures to preserve /proc/cpuinfo's ABI. */
81 if (c->vmx_capability[PRIMARY_CTLS] & VMX_F(VIRTUAL_TPR))
82 set_cpu_cap(c, X86_FEATURE_TPR_SHADOW);
83 if (c->vmx_capability[MISC_FEATURES] & VMX_F(FLEXPRIORITY))
84 set_cpu_cap(c, X86_FEATURE_FLEXPRIORITY);
85 if (c->vmx_capability[MISC_FEATURES] & VMX_F(VIRTUAL_NMIS))
86 set_cpu_cap(c, X86_FEATURE_VNMI);
87 if (c->vmx_capability[SECONDARY_CTLS] & VMX_F(EPT))
88 set_cpu_cap(c, X86_FEATURE_EPT);
89 if (c->vmx_capability[MISC_FEATURES] & VMX_F(EPT_AD))
90 set_cpu_cap(c, X86_FEATURE_EPT_AD);
91 if (c->vmx_capability[MISC_FEATURES] & VMX_F(VPID))
92 set_cpu_cap(c, X86_FEATURE_VPID);
93}
94#endif /* CONFIG_X86_VMX_FEATURE_NAMES */
95
96static int __init nosgx(char *str)
97{
98 setup_clear_cpu_cap(X86_FEATURE_SGX);
99
100 return 0;
101}
102
103early_param("nosgx", nosgx);
104
105void init_ia32_feat_ctl(struct cpuinfo_x86 *c)
106{
107 bool enable_sgx_kvm = false, enable_sgx_driver = false;
108 bool tboot = tboot_enabled();
109 bool enable_vmx;
110 u64 msr;
111
112 if (rdmsrl_safe(MSR_IA32_FEAT_CTL, &msr)) {
113 clear_cpu_cap(c, X86_FEATURE_VMX);
114 clear_cpu_cap(c, X86_FEATURE_SGX);
115 return;
116 }
117
118 enable_vmx = cpu_has(c, X86_FEATURE_VMX) &&
119 IS_ENABLED(CONFIG_KVM_INTEL);
120
121 if (cpu_has(c, X86_FEATURE_SGX) && IS_ENABLED(CONFIG_X86_SGX)) {
122 /*
123 * Separate out SGX driver enabling from KVM. This allows KVM
124 * guests to use SGX even if the kernel SGX driver refuses to
125 * use it. This happens if flexible Launch Control is not
126 * available.
127 */
128 enable_sgx_driver = cpu_has(c, X86_FEATURE_SGX_LC);
129 enable_sgx_kvm = enable_vmx && IS_ENABLED(CONFIG_X86_SGX_KVM);
130 }
131
132 if (msr & FEAT_CTL_LOCKED)
133 goto update_caps;
134
135 /*
136 * Ignore whatever value BIOS left in the MSR to avoid enabling random
137 * features or faulting on the WRMSR.
138 */
139 msr = FEAT_CTL_LOCKED;
140
141 /*
142 * Enable VMX if and only if the kernel may do VMXON at some point,
143 * i.e. KVM is enabled, to avoid unnecessarily adding an attack vector
144 * for the kernel, e.g. using VMX to hide malicious code.
145 */
146 if (enable_vmx) {
147 msr |= FEAT_CTL_VMX_ENABLED_OUTSIDE_SMX;
148
149 if (tboot)
150 msr |= FEAT_CTL_VMX_ENABLED_INSIDE_SMX;
151 }
152
153 if (enable_sgx_kvm || enable_sgx_driver) {
154 msr |= FEAT_CTL_SGX_ENABLED;
155 if (enable_sgx_driver)
156 msr |= FEAT_CTL_SGX_LC_ENABLED;
157 }
158
159 wrmsrl(MSR_IA32_FEAT_CTL, msr);
160
161update_caps:
162 set_cpu_cap(c, X86_FEATURE_MSR_IA32_FEAT_CTL);
163
164 if (!cpu_has(c, X86_FEATURE_VMX))
165 goto update_sgx;
166
167 if ( (tboot && !(msr & FEAT_CTL_VMX_ENABLED_INSIDE_SMX)) ||
168 (!tboot && !(msr & FEAT_CTL_VMX_ENABLED_OUTSIDE_SMX))) {
169 if (IS_ENABLED(CONFIG_KVM_INTEL))
170 pr_err_once("VMX (%s TXT) disabled by BIOS\n",
171 tboot ? "inside" : "outside");
172 clear_cpu_cap(c, X86_FEATURE_VMX);
173 } else {
174#ifdef CONFIG_X86_VMX_FEATURE_NAMES
175 init_vmx_capabilities(c);
176#endif
177 }
178
179update_sgx:
180 if (!(msr & FEAT_CTL_SGX_ENABLED)) {
181 if (enable_sgx_kvm || enable_sgx_driver)
182 pr_err_once("SGX disabled by BIOS.\n");
183 clear_cpu_cap(c, X86_FEATURE_SGX);
184 return;
185 }
186
187 /*
188 * VMX feature bit may be cleared due to being disabled in BIOS,
189 * in which case SGX virtualization cannot be supported either.
190 */
191 if (!cpu_has(c, X86_FEATURE_VMX) && enable_sgx_kvm) {
192 pr_err_once("SGX virtualization disabled due to lack of VMX.\n");
193 enable_sgx_kvm = 0;
194 }
195
196 if (!(msr & FEAT_CTL_SGX_LC_ENABLED) && enable_sgx_driver) {
197 if (!enable_sgx_kvm) {
198 pr_err_once("SGX Launch Control is locked. Disable SGX.\n");
199 clear_cpu_cap(c, X86_FEATURE_SGX);
200 } else {
201 pr_err_once("SGX Launch Control is locked. Support SGX virtualization only.\n");
202 clear_cpu_cap(c, X86_FEATURE_SGX_LC);
203 }
204 }
205}