// SPDX-License-Identifier: GPL-2.0 #include #include #include #include #include #include #undef pr_fmt #define pr_fmt(fmt) "x86/cpu: " fmt #ifdef CONFIG_X86_VMX_FEATURE_NAMES enum vmx_feature_leafs { MISC_FEATURES = 0, PRIMARY_CTLS, SECONDARY_CTLS, TERTIARY_CTLS_LOW, TERTIARY_CTLS_HIGH, NR_VMX_FEATURE_WORDS, }; #define VMX_F(x) BIT(VMX_FEATURE_##x & 0x1f) static void init_vmx_capabilities(struct cpuinfo_x86 *c) { u32 supported, funcs, ept, vpid, ign, low, high; BUILD_BUG_ON(NVMXINTS != NR_VMX_FEATURE_WORDS); /* * The high bits contain the allowed-1 settings, i.e. features that can * be turned on. The low bits contain the allowed-0 settings, i.e. * features that can be turned off. Ignore the allowed-0 settings, * if a feature can be turned on then it's supported. * * Use raw rdmsr() for primary processor controls and pin controls MSRs * as they exist on any CPU that supports VMX, i.e. we want the WARN if * the RDMSR faults. */ rdmsr(MSR_IA32_VMX_PROCBASED_CTLS, ign, supported); c->vmx_capability[PRIMARY_CTLS] = supported; rdmsr_safe(MSR_IA32_VMX_PROCBASED_CTLS2, &ign, &supported); c->vmx_capability[SECONDARY_CTLS] = supported; /* All 64 bits of tertiary controls MSR are allowed-1 settings. */ rdmsr_safe(MSR_IA32_VMX_PROCBASED_CTLS3, &low, &high); c->vmx_capability[TERTIARY_CTLS_LOW] = low; c->vmx_capability[TERTIARY_CTLS_HIGH] = high; rdmsr(MSR_IA32_VMX_PINBASED_CTLS, ign, supported); rdmsr_safe(MSR_IA32_VMX_VMFUNC, &ign, &funcs); /* * Except for EPT+VPID, which enumerates support for both in a single * MSR, low for EPT, high for VPID. */ rdmsr_safe(MSR_IA32_VMX_EPT_VPID_CAP, &ept, &vpid); /* Pin, EPT, VPID and VM-Func are merged into a single word. */ WARN_ON_ONCE(supported >> 16); WARN_ON_ONCE(funcs >> 4); c->vmx_capability[MISC_FEATURES] = (supported & 0xffff) | ((vpid & 0x1) << 16) | ((funcs & 0xf) << 28); /* EPT bits are full on scattered and must be manually handled. */ if (ept & VMX_EPT_EXECUTE_ONLY_BIT) c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_EXECUTE_ONLY); if (ept & VMX_EPT_AD_BIT) c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_AD); if (ept & VMX_EPT_1GB_PAGE_BIT) c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_1GB); if (ept & VMX_EPT_PAGE_WALK_5_BIT) c->vmx_capability[MISC_FEATURES] |= VMX_F(EPT_5LEVEL); /* Synthetic APIC features that are aggregates of multiple features. */ if ((c->vmx_capability[PRIMARY_CTLS] & VMX_F(VIRTUAL_TPR)) && (c->vmx_capability[SECONDARY_CTLS] & VMX_F(VIRT_APIC_ACCESSES))) c->vmx_capability[MISC_FEATURES] |= VMX_F(FLEXPRIORITY); if ((c->vmx_capability[PRIMARY_CTLS] & VMX_F(VIRTUAL_TPR)) && (c->vmx_capability[SECONDARY_CTLS] & VMX_F(APIC_REGISTER_VIRT)) && (c->vmx_capability[SECONDARY_CTLS] & VMX_F(VIRT_INTR_DELIVERY)) && (c->vmx_capability[MISC_FEATURES] & VMX_F(POSTED_INTR))) c->vmx_capability[MISC_FEATURES] |= VMX_F(APICV); /* Set the synthetic cpufeatures to preserve /proc/cpuinfo's ABI. */ if (c->vmx_capability[PRIMARY_CTLS] & VMX_F(VIRTUAL_TPR)) set_cpu_cap(c, X86_FEATURE_TPR_SHADOW); if (c->vmx_capability[MISC_FEATURES] & VMX_F(FLEXPRIORITY)) set_cpu_cap(c, X86_FEATURE_FLEXPRIORITY); if (c->vmx_capability[MISC_FEATURES] & VMX_F(VIRTUAL_NMIS)) set_cpu_cap(c, X86_FEATURE_VNMI); if (c->vmx_capability[SECONDARY_CTLS] & VMX_F(EPT)) set_cpu_cap(c, X86_FEATURE_EPT); if (c->vmx_capability[MISC_FEATURES] & VMX_F(EPT_AD)) set_cpu_cap(c, X86_FEATURE_EPT_AD); if (c->vmx_capability[MISC_FEATURES] & VMX_F(VPID)) set_cpu_cap(c, X86_FEATURE_VPID); } #endif /* CONFIG_X86_VMX_FEATURE_NAMES */ static int __init nosgx(char *str) { setup_clear_cpu_cap(X86_FEATURE_SGX); return 0; } early_param("nosgx", nosgx); void init_ia32_feat_ctl(struct cpuinfo_x86 *c) { bool enable_sgx_kvm = false, enable_sgx_driver = false; bool tboot = tboot_enabled(); bool enable_vmx; u64 msr; if (rdmsrl_safe(MSR_IA32_FEAT_CTL, &msr)) { clear_cpu_cap(c, X86_FEATURE_VMX); clear_cpu_cap(c, X86_FEATURE_SGX); return; } enable_vmx = cpu_has(c, X86_FEATURE_VMX) && IS_ENABLED(CONFIG_KVM_INTEL); if (cpu_has(c, X86_FEATURE_SGX) && IS_ENABLED(CONFIG_X86_SGX)) { /* * Separate out SGX driver enabling from KVM. This allows KVM * guests to use SGX even if the kernel SGX driver refuses to * use it. This happens if flexible Launch Control is not * available. */ enable_sgx_driver = cpu_has(c, X86_FEATURE_SGX_LC); enable_sgx_kvm = enable_vmx && IS_ENABLED(CONFIG_X86_SGX_KVM); } if (msr & FEAT_CTL_LOCKED) goto update_caps; /* * Ignore whatever value BIOS left in the MSR to avoid enabling random * features or faulting on the WRMSR. */ msr = FEAT_CTL_LOCKED; /* * Enable VMX if and only if the kernel may do VMXON at some point, * i.e. KVM is enabled, to avoid unnecessarily adding an attack vector * for the kernel, e.g. using VMX to hide malicious code. */ if (enable_vmx) { msr |= FEAT_CTL_VMX_ENABLED_OUTSIDE_SMX; if (tboot) msr |= FEAT_CTL_VMX_ENABLED_INSIDE_SMX; } if (enable_sgx_kvm || enable_sgx_driver) { msr |= FEAT_CTL_SGX_ENABLED; if (enable_sgx_driver) msr |= FEAT_CTL_SGX_LC_ENABLED; } wrmsrl(MSR_IA32_FEAT_CTL, msr); update_caps: set_cpu_cap(c, X86_FEATURE_MSR_IA32_FEAT_CTL); if (!cpu_has(c, X86_FEATURE_VMX)) goto update_sgx; if ( (tboot && !(msr & FEAT_CTL_VMX_ENABLED_INSIDE_SMX)) || (!tboot && !(msr & FEAT_CTL_VMX_ENABLED_OUTSIDE_SMX))) { if (IS_ENABLED(CONFIG_KVM_INTEL)) pr_err_once("VMX (%s TXT) disabled by BIOS\n", tboot ? "inside" : "outside"); clear_cpu_cap(c, X86_FEATURE_VMX); } else { #ifdef CONFIG_X86_VMX_FEATURE_NAMES init_vmx_capabilities(c); #endif } update_sgx: if (!(msr & FEAT_CTL_SGX_ENABLED)) { if (enable_sgx_kvm || enable_sgx_driver) pr_err_once("SGX disabled by BIOS.\n"); clear_cpu_cap(c, X86_FEATURE_SGX); return; } /* * VMX feature bit may be cleared due to being disabled in BIOS, * in which case SGX virtualization cannot be supported either. */ if (!cpu_has(c, X86_FEATURE_VMX) && enable_sgx_kvm) { pr_err_once("SGX virtualization disabled due to lack of VMX.\n"); enable_sgx_kvm = 0; } if (!(msr & FEAT_CTL_SGX_LC_ENABLED) && enable_sgx_driver) { if (!enable_sgx_kvm) { pr_err_once("SGX Launch Control is locked. Disable SGX.\n"); clear_cpu_cap(c, X86_FEATURE_SGX); } else { pr_err_once("SGX Launch Control is locked. Support SGX virtualization only.\n"); clear_cpu_cap(c, X86_FEATURE_SGX_LC); } } }