| 1 | // SPDX-License-Identifier: GPL-2.0 |
| 2 | #include <linux/tboot.h> |
| 3 | |
| 4 | #include <asm/cpu.h> |
| 5 | #include <asm/cpufeature.h> |
| 6 | #include <asm/msr-index.h> |
| 7 | #include <asm/msr.h> |
| 8 | #include <asm/processor.h> |
| 9 | #include <asm/vmx.h> |
| 10 | |
| 11 | #undef pr_fmt |
| 12 | #define pr_fmt(fmt) "x86/cpu: " fmt |
| 13 | |
| 14 | #ifdef CONFIG_X86_VMX_FEATURE_NAMES |
| 15 | enum vmx_feature_leafs { |
| 16 | MISC_FEATURES = 0, |
| 17 | PRIMARY_CTLS, |
| 18 | SECONDARY_CTLS, |
| 19 | TERTIARY_CTLS_LOW, |
| 20 | TERTIARY_CTLS_HIGH, |
| 21 | NR_VMX_FEATURE_WORDS, |
| 22 | }; |
| 23 | |
| 24 | #define VMX_F(x) BIT(VMX_FEATURE_##x & 0x1f) |
| 25 | |
| 26 | static void init_vmx_capabilities(struct cpuinfo_x86 *c) |
| 27 | { |
| 28 | u32 supported, funcs, ept, vpid, ign, low, high; |
| 29 | |
| 30 | BUILD_BUG_ON(NVMXINTS != NR_VMX_FEATURE_WORDS); |
| 31 | |
| 32 | /* |
| 33 | * The high bits contain the allowed-1 settings, i.e. features that can |
| 34 | * be turned on. The low bits contain the allowed-0 settings, i.e. |
| 35 | * features that can be turned off. Ignore the allowed-0 settings, |
| 36 | * if a feature can be turned on then it's supported. |
| 37 | * |
| 38 | * Use raw rdmsr() for primary processor controls and pin controls MSRs |
| 39 | * as they exist on any CPU that supports VMX, i.e. we want the WARN if |
| 40 | * the RDMSR faults. |
| 41 | */ |
| 42 | rdmsr(MSR_IA32_VMX_PROCBASED_CTLS, ign, supported); |
| 43 | c->vmx_capability[PRIMARY_CTLS] = supported; |
| 44 | |
| 45 | rdmsr_safe(MSR_IA32_VMX_PROCBASED_CTLS2, &ign, &supported); |
| 46 | c->vmx_capability[SECONDARY_CTLS] = supported; |
| 47 | |
| 48 | /* All 64 bits of tertiary controls MSR are allowed-1 settings. */ |
| 49 | rdmsr_safe(MSR_IA32_VMX_PROCBASED_CTLS3, &low, &high); |
| 50 | c->vmx_capability[TERTIARY_CTLS_LOW] = low; |
| 51 | c->vmx_capability[TERTIARY_CTLS_HIGH] = high; |
| 52 | |
| 53 | rdmsr(MSR_IA32_VMX_PINBASED_CTLS, ign, supported); |
| 54 | rdmsr_safe(MSR_IA32_VMX_VMFUNC, &ign, &funcs); |
| 55 | |
| 56 | /* |
| 57 | * Except for EPT+VPID, which enumerates support for both in a single |
| 58 | * MSR, low for EPT, high for VPID. |
| 59 | */ |
| 60 | rdmsr_safe(MSR_IA32_VMX_EPT_VPID_CAP, &ept, &vpid); |
| 61 | |
| 62 | /* Pin, EPT, VPID and VM-Func are merged into a single word. */ |
| 63 | WARN_ON_ONCE(supported >> 16); |
| 64 | WARN_ON_ONCE(funcs >> 4); |
| 65 | c->vmx_capability[MISC_FEATURES] = (supported & 0xffff) | |
| 66 | ((vpid & 0x1) << 16) | |
| 67 | ((funcs & 0xf) << 28); |
| 68 | |
| 69 | /* EPT bits are full on scattered and must be manually handled. */ |
| 70 | if (ept & VMX_EPT_EXECUTE_ONLY_BIT) |
| 71 | c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_EXECUTE_ONLY); |
| 72 | if (ept & VMX_EPT_AD_BIT) |
| 73 | c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_AD); |
| 74 | if (ept & VMX_EPT_1GB_PAGE_BIT) |
| 75 | c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_1GB); |
| 76 | if (ept & VMX_EPT_PAGE_WALK_5_BIT) |
| 77 | c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_5LEVEL); |
| 78 | |
| 79 | /* Synthetic APIC features that are aggregates of multiple features. */ |
| 80 | if ((c->vmx_capability[PRIMARY_CTLS] & VMX_F(VIRTUAL_TPR)) && |
| 81 | (c->vmx_capability[SECONDARY_CTLS] & VMX_F(VIRT_APIC_ACCESSES))) |
| 82 | c->vmx_capability[MISC_FEATURES] |= VMX_F(FLEXPRIORITY); |
| 83 | |
| 84 | if ((c->vmx_capability[PRIMARY_CTLS] & VMX_F(VIRTUAL_TPR)) && |
| 85 | (c->vmx_capability[SECONDARY_CTLS] & VMX_F(APIC_REGISTER_VIRT)) && |
| 86 | (c->vmx_capability[SECONDARY_CTLS] & VMX_F(VIRT_INTR_DELIVERY)) && |
| 87 | (c->vmx_capability[MISC_FEATURES] & VMX_F(POSTED_INTR))) |
| 88 | c->vmx_capability[MISC_FEATURES] |= VMX_F(APICV); |
| 89 | |
| 90 | /* Set the synthetic cpufeatures to preserve /proc/cpuinfo's ABI. */ |
| 91 | if (c->vmx_capability[PRIMARY_CTLS] & VMX_F(VIRTUAL_TPR)) |
| 92 | set_cpu_cap(c, X86_FEATURE_TPR_SHADOW); |
| 93 | if (c->vmx_capability[MISC_FEATURES] & VMX_F(FLEXPRIORITY)) |
| 94 | set_cpu_cap(c, X86_FEATURE_FLEXPRIORITY); |
| 95 | if (c->vmx_capability[MISC_FEATURES] & VMX_F(VIRTUAL_NMIS)) |
| 96 | set_cpu_cap(c, X86_FEATURE_VNMI); |
| 97 | if (c->vmx_capability[SECONDARY_CTLS] & VMX_F(EPT)) |
| 98 | set_cpu_cap(c, X86_FEATURE_EPT); |
| 99 | if (c->vmx_capability[MISC_FEATURES] & VMX_F(EPT_AD)) |
| 100 | set_cpu_cap(c, X86_FEATURE_EPT_AD); |
| 101 | if (c->vmx_capability[MISC_FEATURES] & VMX_F(VPID)) |
| 102 | set_cpu_cap(c, X86_FEATURE_VPID); |
| 103 | } |
| 104 | #endif /* CONFIG_X86_VMX_FEATURE_NAMES */ |
| 105 | |
| 106 | static int __init nosgx(char *str) |
| 107 | { |
| 108 | setup_clear_cpu_cap(X86_FEATURE_SGX); |
| 109 | |
| 110 | return 0; |
| 111 | } |
| 112 | |
| 113 | early_param("nosgx" , nosgx); |
| 114 | |
| 115 | void init_ia32_feat_ctl(struct cpuinfo_x86 *c) |
| 116 | { |
| 117 | bool enable_sgx_kvm = false, enable_sgx_driver = false; |
| 118 | bool tboot = tboot_enabled(); |
| 119 | bool enable_vmx; |
| 120 | u64 msr; |
| 121 | |
| 122 | if (rdmsrq_safe(MSR_IA32_FEAT_CTL, p: &msr)) { |
| 123 | clear_cpu_cap(c, X86_FEATURE_VMX); |
| 124 | clear_cpu_cap(c, X86_FEATURE_SGX); |
| 125 | return; |
| 126 | } |
| 127 | |
| 128 | enable_vmx = cpu_has(c, X86_FEATURE_VMX) && |
| 129 | IS_ENABLED(CONFIG_KVM_INTEL); |
| 130 | |
| 131 | if (cpu_has(c, X86_FEATURE_SGX) && IS_ENABLED(CONFIG_X86_SGX)) { |
| 132 | /* |
| 133 | * Separate out SGX driver enabling from KVM. This allows KVM |
| 134 | * guests to use SGX even if the kernel SGX driver refuses to |
| 135 | * use it. This happens if flexible Launch Control is not |
| 136 | * available. |
| 137 | */ |
| 138 | enable_sgx_driver = cpu_has(c, X86_FEATURE_SGX_LC); |
| 139 | enable_sgx_kvm = enable_vmx && IS_ENABLED(CONFIG_X86_SGX_KVM); |
| 140 | } |
| 141 | |
| 142 | if (msr & FEAT_CTL_LOCKED) |
| 143 | goto update_caps; |
| 144 | |
| 145 | /* |
| 146 | * Ignore whatever value BIOS left in the MSR to avoid enabling random |
| 147 | * features or faulting on the WRMSR. |
| 148 | */ |
| 149 | msr = FEAT_CTL_LOCKED; |
| 150 | |
| 151 | /* |
| 152 | * Enable VMX if and only if the kernel may do VMXON at some point, |
| 153 | * i.e. KVM is enabled, to avoid unnecessarily adding an attack vector |
| 154 | * for the kernel, e.g. using VMX to hide malicious code. |
| 155 | */ |
| 156 | if (enable_vmx) { |
| 157 | msr |= FEAT_CTL_VMX_ENABLED_OUTSIDE_SMX; |
| 158 | |
| 159 | if (tboot) |
| 160 | msr |= FEAT_CTL_VMX_ENABLED_INSIDE_SMX; |
| 161 | } |
| 162 | |
| 163 | if (enable_sgx_kvm || enable_sgx_driver) { |
| 164 | msr |= FEAT_CTL_SGX_ENABLED; |
| 165 | if (enable_sgx_driver) |
| 166 | msr |= FEAT_CTL_SGX_LC_ENABLED; |
| 167 | } |
| 168 | |
| 169 | wrmsrq(MSR_IA32_FEAT_CTL, val: msr); |
| 170 | |
| 171 | update_caps: |
| 172 | set_cpu_cap(c, X86_FEATURE_MSR_IA32_FEAT_CTL); |
| 173 | |
| 174 | if (!cpu_has(c, X86_FEATURE_VMX)) |
| 175 | goto update_sgx; |
| 176 | |
| 177 | if ( (tboot && !(msr & FEAT_CTL_VMX_ENABLED_INSIDE_SMX)) || |
| 178 | (!tboot && !(msr & FEAT_CTL_VMX_ENABLED_OUTSIDE_SMX))) { |
| 179 | if (IS_ENABLED(CONFIG_KVM_INTEL)) |
| 180 | pr_err_once("VMX (%s TXT) disabled by BIOS\n" , |
| 181 | tboot ? "inside" : "outside" ); |
| 182 | clear_cpu_cap(c, X86_FEATURE_VMX); |
| 183 | } else { |
| 184 | #ifdef CONFIG_X86_VMX_FEATURE_NAMES |
| 185 | init_vmx_capabilities(c); |
| 186 | #endif |
| 187 | } |
| 188 | |
| 189 | update_sgx: |
| 190 | if (!(msr & FEAT_CTL_SGX_ENABLED)) { |
| 191 | if (enable_sgx_kvm || enable_sgx_driver) |
| 192 | pr_err_once("SGX disabled or unsupported by BIOS.\n" ); |
| 193 | clear_cpu_cap(c, X86_FEATURE_SGX); |
| 194 | return; |
| 195 | } |
| 196 | |
| 197 | /* |
| 198 | * VMX feature bit may be cleared due to being disabled in BIOS, |
| 199 | * in which case SGX virtualization cannot be supported either. |
| 200 | */ |
| 201 | if (!cpu_has(c, X86_FEATURE_VMX) && enable_sgx_kvm) { |
| 202 | pr_err_once("SGX virtualization disabled due to lack of VMX.\n" ); |
| 203 | enable_sgx_kvm = 0; |
| 204 | } |
| 205 | |
| 206 | if (!(msr & FEAT_CTL_SGX_LC_ENABLED) && enable_sgx_driver) { |
| 207 | if (!enable_sgx_kvm) { |
| 208 | pr_err_once("SGX Launch Control is locked. Disable SGX.\n" ); |
| 209 | clear_cpu_cap(c, X86_FEATURE_SGX); |
| 210 | } else { |
| 211 | pr_err_once("SGX Launch Control is locked. Support SGX virtualization only.\n" ); |
| 212 | clear_cpu_cap(c, X86_FEATURE_SGX_LC); |
| 213 | } |
| 214 | } |
| 215 | } |
| 216 | |