From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753348AbdF0PKZ (ORCPT ); Tue, 27 Jun 2017 11:10:25 -0400 Received: from mail-dm3nam03on0077.outbound.protection.outlook.com ([104.47.41.77]:6752 "EHLO NAM03-DM3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752454AbdF0PIY (ORCPT ); Tue, 27 Jun 2017 11:08:24 -0400 Authentication-Results: vger.kernel.org; dkim=none (message not signed) header.d=none;vger.kernel.org; dmarc=none action=none header.from=amd.com; From: Tom Lendacky Subject: [PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, xen-devel@lists.xen.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Cc: Brijesh Singh , Toshimitsu Kani , Radim =?utf-8?b?S3LEjW3DocWZ?= , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Larry Woodman , Jonathan Corbet , Joerg Roedel , "Michael S. Tsirkin" , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Konrad Rzeszutek Wilk , Borislav Petkov , Andy Lutomirski , Boris Ostrovsky , Dmitry Vyukov , Juergen Gross , Thomas Gleixner , Paolo Bonzini Date: Tue, 27 Jun 2017 10:08:13 -0500 Message-ID: <20170627150813.17428.17375.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20170627150718.17428.81813.stgit@tlendack-t1.amdoffice.net> References: <20170627150718.17428.81813.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: BN6PR03CA0040.namprd03.prod.outlook.com (10.175.124.26) To DM5PR12MB1146.namprd12.prod.outlook.com (10.168.236.141) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 1e1fc311-c902-44fb-0f93-08d4bd6e5833 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(48565401081)(300000503095)(300135400095)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506067)(300135500095);SRVR:DM5PR12MB1146; X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1146;3: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 X-MS-TrafficTypeDiagnostic: DM5PR12MB1146: X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1146;25: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 X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1146;31: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 X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1146;20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(133145235818549)(236129657087228)(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(3002001)(93006095)(93001095)(10201501046)(100000703101)(100105400095)(6055026)(6041248)(20161123562025)(20161123564025)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:DM5PR12MB1146;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:DM5PR12MB1146; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTVQUjEyTUIxMTQ2OzQ6UG1oZ3VqdVlrVWpmYVVJR1lpZU55NDl5Q08v?= =?utf-8?B?YWtBWWV1UEl5ZkNEdk9jSWVRSFRpWk1kdnFCb3ZsY3E3TW5nb25mZDNlK3E0?= =?utf-8?B?N2JtN0FFYWFqWmJzM0pqMjJaemxhR2VSZW1PTTYvTE5EelgwbnFWdXU0dWpI?= =?utf-8?B?T25aMngxNjhJTDVYb1l0VTlnMGNZeHErSTlYdGh2bmNuYThtUm5qclhhb0NL?= =?utf-8?B?eUtzM2xWcDVTK1VWU3FMS3VlTXc2M1ZIWVRKZ0F6RXIvZUhRajU1dklMcWs3?= =?utf-8?B?UnRTVEFxb250OTFWbkJZZjZwZVMzQTF3aHd4MklMVnFOUVhCNzdMMmQ3VDU1?= =?utf-8?B?dG9VNWh4ZlV6RVB2S2ZtQjNjOFczS0tnQyszMEtHNXc1bk5tUzExVDdPSTg3?= =?utf-8?B?bEtMT3dnaDA2MjlSZ2U2eXdqTDRaQWx3NGJ6aWdhdGZzUEN4NEdjbGNIRVI2?= =?utf-8?B?VmlHVTRhN3pFY1JQdCt1aHRwYnhEeWpCOWo3SGUweGFXY0d0aE9KbmVPK2gx?= =?utf-8?B?ajFBbWJ4d3F3clVIOUJhNmsrbU1lZjlCWHJVZEdOY1Z3YWlYczQwYmU1eStG?= =?utf-8?B?bms2N0FDZUNiVC9uaXpvQTk4M0N6bnBzeElwem8rV2lsZHB1Q2pSbUZTblQ1?= =?utf-8?B?Yy9SR1J1dUNTejdwZm9tNEFKSjRsb3QweXdyUUdkeUFyTlR5Rmk3UnhlYXRE?= =?utf-8?B?Y1ZrMjZOQUJYdDRkN2pzb25wOWFUR1hORnJ4bzJpTE5hQUdiT1ZBWTREMHJt?= =?utf-8?B?UjBUd3pzcGU1bGlaUDVtdkY5V1ZuWm9DamR5aGdxaHFZYVlRczkyMGQzcGsz?= =?utf-8?B?S25jRko3ZUt1cFEwMU5QMy9ycTBPMHY2UUdnRk9QRUYvTnZGUmtHSklFRGZN?= =?utf-8?B?TGRuZTFtd25kSjFPV2crMmJVMjQycElZV2lCTUJpT0FzMnVPVmNZcGFqNGoz?= =?utf-8?B?REFxOUFxb1NGa05ldTV1V3E0MGhzZk9MYVRPaTJHWGd1bFFOOE03MlNJd0lO?= =?utf-8?B?UzFydjRUbGFFSXJIOVF3alZFZUNNU1g0d1dvZlRNaGdqc211YXc3bmVtdU1E?= =?utf-8?B?NHV1UlF2YStyN29YUlBwaHBUQ0lTN1ZPRlNRcjZ5MVFpMXBUK1hBbDk2VEJO?= =?utf-8?B?RTI5V0pHMEQyRVp5QUE4MW94eFdRRFMzdWNLSWtnNG9aZXlmQk5jdW9wSWZk?= =?utf-8?B?VHhBemlWYVM0cmQ5N2xPOW9pZzhTaFFCdk1YQXhDejdSQXFxS0sxRDJpbmRu?= =?utf-8?B?eUUyc1MzaTF0YXR0aHM2Mmc1UjA5eWFuZmFNdUlkVzRtVmx5RGMvenozeEoy?= =?utf-8?B?NzgyaUJyWFJ2YUpoMHQ1Y1kzRWc5WTg0cGQrVmpSNXNDaUtHUUhCNjZ0UEsy?= =?utf-8?B?NmZ6dGhJc3Z2MlN5ZUlWMzk3SjBVVXg0bUd6UVVjbmlHWkFJcjJ2SmFCZ1d4?= =?utf-8?B?dysrYUtKN0J4SVc4V083dE1VbWkyWGcwOC9Fd01iUTZNMmZuTkJHUEJVem5q?= =?utf-8?B?YzZhY3hkYm5ERGNuZWdpY0kwaFIzWHQ1TWJLRUxCVGxOWWc5NTA1eTNZeDgz?= =?utf-8?B?VUtCaHRMYlA4STNqK1Q4akxScjZqMWRTUmdPSXVrbXdWSXZPRy9LZUVncU9U?= =?utf-8?B?Rk5hWUZpQlNmZlEvdjFlNjdUVm9aTVROY3lhc3ZnYlVscmxhM0ZIZURUY2N5?= =?utf-8?Q?GktaLmMPvq/lRptltI/XVrIY0gUCb8cho3tCo1?= X-Forefront-PRVS: 0351D213B3 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6009001)(39850400002)(39400400002)(39410400002)(39450400003)(39860400002)(39840400002)(53416004)(5660300001)(1076002)(2906002)(33646002)(8676002)(97746001)(81166006)(42186005)(50466002)(86362001)(7736002)(103116003)(230700001)(6116002)(3846002)(305945005)(7406005)(7416002)(53936002)(6666003)(54906002)(9686003)(38730400002)(6506006)(55016002)(23676002)(25786009)(110136004)(2950100002)(47776003)(66066001)(83506001)(189998001)(478600001)(72206003)(4326008)(4001350100001)(54356999)(50986999)(76176999)(921003)(1121003);DIR:OUT;SFP:1101;SCL:1;SRVR:DM5PR12MB1146;H:tlendack-t1.amdoffice.net;FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTVQUjEyTUIxMTQ2OzIzOjVvaGF2amlsb3loVHowbS9GeENFQWVPYm1q?= =?utf-8?B?aUtZYmpKVDY2U3l3cnJZU0I4cGgyZDQyd0JGL1NQRDNVVnJPZlBKYnVFTW5m?= =?utf-8?B?MFJMeVVIU3MweWxzOWNlZkYxOWJuTWNzMmVBTFNIRldVRVFOUHdUQktLNVZ6?= =?utf-8?B?YnhtSlA4UUQ0NkhJanNsNnFhL0VmNDYwSFZESDhrUTlKN3Iva21jeXczUHdW?= =?utf-8?B?d0JkTEpRVU4yY1JjclN4eDlvdFQvdHFLV21hMWhlSWcrNERBVzJJV0R1K0Zj?= =?utf-8?B?UG9QZTAyMDNiOXBSR2tPd1g4RTFveWFweGpiT0tVcGZsNG0zV0tiNUsyNE1V?= =?utf-8?B?SGl2dy9vUUx3K29TVldiVGowd3NIV3o0bXJVTWNZR2ZrNkJubjgwbDdndnZK?= =?utf-8?B?cnhadGFnYUFpYmZKN0FlSHhTcTdZTnBOcC9JTW9hMjNxQ01pcFV0R3o0UmFK?= =?utf-8?B?U2Y0ZjBWcktZMEt1NjhIaDJaZXR0a1Fjb2ZBYlZjLzJXVEUyMGNwMlNiRVZW?= =?utf-8?B?RXpwaTJFa01GQnhpRDE5V3IyNlZkb2FacHVkY2ZlRFIzamdKaGtUREFpK3Ax?= =?utf-8?B?Ky9RWEhraGxzQUE1RldRUGhGaXFteExGMFFjK1VESmpwaStTOEZDd2pjT3Ix?= =?utf-8?B?dVlOeUtOTE1BYjVOR3d3V1dYN1Zsb21teU80QlN4SWVOZ0R1Z3JBUkU4SkFM?= =?utf-8?B?MTNsRzhPajlmVnVMc3grTkttc1Y0WHUwSmF0aG94UFFENUdGbUR0Qkc2Nzdn?= =?utf-8?B?WHNrdjVKT2JURWtNTVlkTkU2ZGVjTFBGSENBTjZ0NjgweUFZNUg5MlErQzIz?= =?utf-8?B?S0t1Zy9HWHhwZTI4c3ZyN3hSc0xDcEtFa21XOFRxSTEvZnk4a1NpNkNwSTJF?= =?utf-8?B?QnptTk9MZXNqcE1ob3ZuTExMMTBrWFExa0o2WEdKdWgwd1RiR25tanFXR3VE?= =?utf-8?B?OGpoMXBXY2hFZXFiQThjY05LcGw1L0Vyc0h2V3AyekQrTUFJT0VXcmxYUjJk?= =?utf-8?B?NGQrQ1ZkUk1kTVM3K0gxdGRPbENObkFOVStra1B6WnVUUEZjQWpBWnVQZHRj?= =?utf-8?B?MHZ4QXBBQ0s4NnZ4ZWkwOHk2VVEzK09CRytlM0NNOFYwSjR5U2R3YTFFTUJ1?= =?utf-8?B?MDgwTU9iN3pveHM3cUdhemdwZyswN3dhVktLc09oRG1zVUFkLzZ5VUdZS29i?= =?utf-8?B?elVpRFZjalllSzFrSFJEL0toZ1dpNDlsZTFLSzRoTUdYVGl6UzJJRnM1ZUJO?= =?utf-8?B?aG9COTQ3UzE5MG9YRlJBdm5KTlhYbnNYNnlrL3ViU3VNSmFlcnp6bEJ5ajBQ?= =?utf-8?B?QjJ6WjUwc25hU055eDhLVEhUVHc0MVdhZitQamtmRWM1OE5vN1Yvc29FWEpH?= =?utf-8?B?cW1wVk5oMmptaUxrWWNXdVBtUmpZSk9TcjhjR0NQb1g1NHhJNGlqQ3FXRnlL?= =?utf-8?B?OTFKTGRpN2tTcndRUHozVlpSVzR2ZHRYaTlXaUdaR1pKYjhqZkhiVEhhZi9q?= =?utf-8?B?MENLUk81TnVCd3FsdWFTaW5jbkdZa094cWorWW5KSWVoRFFxS3VoQjNjZWJS?= =?utf-8?B?bG82MHB1bStkMUt2OHNqYlE1STZ3RDE1U3FDZ0pQU25uSS8rbWwvSCtuN3Z2?= =?utf-8?B?dk5Ib0FNTW5oaXlYYXJLSHZTNCtxeFlkaEwxK1pBVGllWnBOa1lLK2M4U2Z0?= =?utf-8?Q?e5kYK4admuZ29BEaT8=3D?= X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTVQUjEyTUIxMTQ2OzY6eXlHVVJJRDg3UExFVlcwYTdTa1lMRkxjOUlF?= =?utf-8?B?Vm9uVzByUGJkbENxRzBVdUlSSXFtSTZtMmRPVDVBYU5lYnNBRU9wWkFoRVFJ?= =?utf-8?B?dW5xT3RGUDQrWCt5VGxEYVdFVVVPSGk1NHVmbzNkdmc4MEhqV2F4OThEQVUr?= =?utf-8?B?VXZOcjJucU45N3UyWlMydVk4UmlVNTc5K3NTcDBkRm5idHl0emdSYnJyK0lo?= =?utf-8?B?bk1xRjRSQ3VMT2RLeE5JVzU4LzRSSk5iQWorMG02OXBTSXIycmY0QWpKT3FP?= =?utf-8?B?enlFeXRtc1ZQa2NuaGx6Z3Fob3ZNYmxLcmRGQ3BqWi8vWnlZSTBISDJDc0RU?= =?utf-8?B?Y3liRGtIMFF1Qklsa0tCWkdTa3NHVm84SzhlTzdrRW1UZXptQjAwa255Y0JT?= =?utf-8?B?KzRWNkhiWElGWklpdmMrYlZwSVpWN1o1QlZZSUVrK2dEZEpCS1p6WTl5Qzd0?= =?utf-8?B?UTlLbUNKRzFsVXZybCtmV3VhTmlvYTBSRUJzOFBBWXVjMFhRVVpuY3N4VFlD?= =?utf-8?B?MzF2MEJqb3VPV3hwYkdmaVVYWjRkclM0M2dnRUxUcGd6di9UbmUwYmhyZmdI?= =?utf-8?B?amdocnBrQUJ0OEdubTRpOCs5R25MMVdNRUgzdFBZdW5Va1JBbGJFQXJoWU1D?= =?utf-8?B?cUJRNDlSQXVYTXNaUC9lM25LZFBvWHJPb3NXMFI1Q1ZFUUFXSEo1RTRVSW1Z?= =?utf-8?B?a3RtMXI2S2tPaHFCWi9xakFrRk9pb0F1TkxOVWxDWUthUG82clBXY2NpSHJB?= =?utf-8?B?cGdLa09NZDBVWlBXZ3NzelYvanMxeEE3UzhjeVlMZDlOdUFJNXBNMkgra3FU?= =?utf-8?B?bFVFZVkwdER1YnNwTFYyMElGeWZ6VHdFUTRNY3RTaUxwdXhSNkVmZmtKdDd3?= =?utf-8?B?cDByQndtajdlN2JPUGF3aGdHbWpXY1Q5MTVwaE12My9CbXIxYjJ4U2pDMno4?= =?utf-8?B?cjRiYi9jN0JlZUtyUWQ0K0hWTkxLak81QXFIUFR3Um5uVGlxUythTWZFVDJP?= =?utf-8?B?Q0xycDFOemJaU3dudTdLekRFbk1HYkFmcmxTMUk2dkdUaEQrak9uYzN2NUpT?= =?utf-8?B?cWxUVyt3Y1NsVE10VGF5Q2I5aWM4TG5TWHlZZFo5TkNvT2ZtNC9wS1FIeHRl?= =?utf-8?B?blNyTVBHOVp4Qmo1ODlaVS9pdFMvcjZhcHFDZ1hYbERvb1FIMUhVMnVHQy9F?= =?utf-8?B?ZlRiN3V3eEhHK2IwYysyMmxlUFZ2bEoxWDV1dGJLaHRLUWJiN1BqTGg4TFky?= =?utf-8?B?OEE2ZFZCbW8yTGpEUklwTG9iZHBGa1ZRbkIwOVZ5TXJKblNhZUMzRURYS1VM?= =?utf-8?B?WmEwUFRxcTJxQ1hvM3p1a0tKemk0MGFCb21RNDBZcWFpaUpkQU04emFVVEI4?= =?utf-8?Q?ZooxwrT?= X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1146;5: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;24:h0z1j//sDO1Nzdi9nNiU7B/1Jls4nodBmM5PmguUaFSE0NS/RC+ZoEX/qJdNbUY0Yn+5TAE/n42eIBhfP6NGN8Fu388WvLrMqnlfSyTzeMA= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1146;7: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 X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1146;20:cyljVUY6VgxMNpbkxJJ78O+ogcqFCdmwW9bv63HZNO30kpyV8iwF/p97QNkwBMTedutWqJMHVjP2AbGwIIZW1Fdrmexz/vnIOddKSpcSKeouieIKUkVRyngNNq2WSHxrZN31n3TG7vXQfOJqgaV0glTBkQvc6LDC4c3vVIQIzGkfWsfkX5EkLryXlYKKaXxKQkNLWHdEKdpgqVfApFHhixoUXDHoFYLv6h7dRygT2vDA6zk2WQNNsGMnz/PLRVc1 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jun 2017 15:08:16.2082 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB1146 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When System Memory Encryption (SME) is enabled, the physical address space is reduced. Adjust the x86_phys_bits value to reflect this reduction. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- arch/x86/kernel/cpu/amd.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c index c47ceee..5bdcbd4 100644 --- a/arch/x86/kernel/cpu/amd.c +++ b/arch/x86/kernel/cpu/amd.c @@ -613,15 +613,19 @@ static void early_init_amd(struct cpuinfo_x86 *c) set_cpu_bug(c, X86_BUG_AMD_E400); /* - * BIOS support is required for SME. If BIOS has not enabled SME - * then don't advertise the feature (set in scattered.c) + * BIOS support is required for SME. If BIOS has enabld SME then + * adjust x86_phys_bits by the SME physical address space reduction + * value. If BIOS has not enabled SME then don't advertise the + * feature (set in scattered.c). */ if (cpu_has(c, X86_FEATURE_SME)) { u64 msr; /* Check if SME is enabled */ rdmsrl(MSR_K8_SYSCFG, msr); - if (!(msr & MSR_K8_SYSCFG_MEM_ENCRYPT)) + if (msr & MSR_K8_SYSCFG_MEM_ENCRYPT) + c->x86_phys_bits -= (cpuid_ebx(0x8000001f) >> 6) & 0x3f; + else clear_cpu_cap(c, X86_FEATURE_SME); } } From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Lendacky Subject: [PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size Date: Tue, 27 Jun 2017 10:08:13 -0500 Message-ID: <20170627150813.17428.17375.stgit@tlendack-t1.amdoffice.net> References: <20170627150718.17428.81813.stgit@tlendack-t1.amdoffice.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20170627150718.17428.81813.stgit-qCXWGYdRb2BnqfbPTmsdiZQ+2ll4COg0XqFh9Ls21Oc@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Errors-To: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org To: linux-arch-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, linux-doc-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, x86-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org, kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org, linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, kasan-dev-/JYPxA39Uh5TLH3MbocFFw@public.gmane.org, xen-devel-GuqFBffKawuEi8DpZVb4nw@public.gmane.org, linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org, iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Cc: Brijesh Singh , Toshimitsu Kani , "Michael S. Tsirkin" , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Boris Ostrovsky , Jonathan Corbet , Radim =?utf-8?b?S3LEjW3DocWZ?= , Larry Woodman , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , Juergen Gross , Paolo Bonzini List-Id: linux-efi@vger.kernel.org When System Memory Encryption (SME) is enabled, the physical address space is reduced. Adjust the x86_phys_bits value to reflect this reduction. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- arch/x86/kernel/cpu/amd.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c index c47ceee..5bdcbd4 100644 --- a/arch/x86/kernel/cpu/amd.c +++ b/arch/x86/kernel/cpu/amd.c @@ -613,15 +613,19 @@ static void early_init_amd(struct cpuinfo_x86 *c) set_cpu_bug(c, X86_BUG_AMD_E400); /* - * BIOS support is required for SME. If BIOS has not enabled SME - * then don't advertise the feature (set in scattered.c) + * BIOS support is required for SME. If BIOS has enabld SME then + * adjust x86_phys_bits by the SME physical address space reduction + * value. If BIOS has not enabled SME then don't advertise the + * feature (set in scattered.c). */ if (cpu_has(c, X86_FEATURE_SME)) { u64 msr; /* Check if SME is enabled */ rdmsrl(MSR_K8_SYSCFG, msr); - if (!(msr & MSR_K8_SYSCFG_MEM_ENCRYPT)) + if (msr & MSR_K8_SYSCFG_MEM_ENCRYPT) + c->x86_phys_bits -= (cpuid_ebx(0x8000001f) >> 6) & 0x3f; + else clear_cpu_cap(c, X86_FEATURE_SME); } } From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pg0-f71.google.com (mail-pg0-f71.google.com [74.125.83.71]) by kanga.kvack.org (Postfix) with ESMTP id 0F8936B03B6 for ; Tue, 27 Jun 2017 11:08:25 -0400 (EDT) Received: by mail-pg0-f71.google.com with SMTP id 76so29850592pgh.11 for ; Tue, 27 Jun 2017 08:08:25 -0700 (PDT) Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0051.outbound.protection.outlook.com. [104.47.42.51]) by mx.google.com with ESMTPS id v12si2038721pgb.135.2017.06.27.08.08.24 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 27 Jun 2017 08:08:24 -0700 (PDT) From: Tom Lendacky Subject: [PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size Date: Tue, 27 Jun 2017 10:08:13 -0500 Message-ID: <20170627150813.17428.17375.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20170627150718.17428.81813.stgit@tlendack-t1.amdoffice.net> References: <20170627150718.17428.81813.stgit@tlendack-t1.amdoffice.net> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, xen-devel@lists.xen.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Cc: Brijesh Singh , Toshimitsu Kani , Radim =?utf-8?b?S3LEjW3DocWZ?= , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Larry Woodman , Jonathan Corbet , Joerg Roedel , "Michael S. Tsirkin" , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Konrad Rzeszutek Wilk , Borislav Petkov , Andy Lutomirski , Boris Ostrovsky , Dmitry Vyukov , Juergen Gross , Thomas Gleixner , Paolo Bonzini When System Memory Encryption (SME) is enabled, the physical address space is reduced. Adjust the x86_phys_bits value to reflect this reduction. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- arch/x86/kernel/cpu/amd.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c index c47ceee..5bdcbd4 100644 --- a/arch/x86/kernel/cpu/amd.c +++ b/arch/x86/kernel/cpu/amd.c @@ -613,15 +613,19 @@ static void early_init_amd(struct cpuinfo_x86 *c) set_cpu_bug(c, X86_BUG_AMD_E400); /* - * BIOS support is required for SME. If BIOS has not enabled SME - * then don't advertise the feature (set in scattered.c) + * BIOS support is required for SME. If BIOS has enabld SME then + * adjust x86_phys_bits by the SME physical address space reduction + * value. If BIOS has not enabled SME then don't advertise the + * feature (set in scattered.c). */ if (cpu_has(c, X86_FEATURE_SME)) { u64 msr; /* Check if SME is enabled */ rdmsrl(MSR_K8_SYSCFG, msr); - if (!(msr & MSR_K8_SYSCFG_MEM_ENCRYPT)) + if (msr & MSR_K8_SYSCFG_MEM_ENCRYPT) + c->x86_phys_bits -= (cpuid_ebx(0x8000001f) >> 6) & 0x3f; + else clear_cpu_cap(c, X86_FEATURE_SME); } } -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from mail-by2nam03on0083.outbound.protection.outlook.com ([104.47.42.83] helo=NAM03-BY2-obe.outbound.protection.outlook.com) by bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux)) id 1dPs6e-0006x5-Cc for kexec@lists.infradead.org; Tue, 27 Jun 2017 15:08:48 +0000 From: Tom Lendacky Subject: [PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size Date: Tue, 27 Jun 2017 10:08:13 -0500 Message-ID: <20170627150813.17428.17375.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20170627150718.17428.81813.stgit@tlendack-t1.amdoffice.net> References: <20170627150718.17428.81813.stgit@tlendack-t1.amdoffice.net> MIME-Version: 1.0 List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "kexec" Errors-To: kexec-bounces+dwmw2=infradead.org@lists.infradead.org To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, xen-devel@lists.xen.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Cc: Brijesh Singh , Toshimitsu Kani , "Michael S. Tsirkin" , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Boris Ostrovsky , Jonathan Corbet , Joerg Roedel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Larry Woodman , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Konrad Rzeszutek Wilk , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , Juergen Gross , Paolo Bonzini When System Memory Encryption (SME) is enabled, the physical address space is reduced. Adjust the x86_phys_bits value to reflect this reduction. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- arch/x86/kernel/cpu/amd.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c index c47ceee..5bdcbd4 100644 --- a/arch/x86/kernel/cpu/amd.c +++ b/arch/x86/kernel/cpu/amd.c @@ -613,15 +613,19 @@ static void early_init_amd(struct cpuinfo_x86 *c) set_cpu_bug(c, X86_BUG_AMD_E400); /* - * BIOS support is required for SME. If BIOS has not enabled SME - * then don't advertise the feature (set in scattered.c) + * BIOS support is required for SME. If BIOS has enabld SME then + * adjust x86_phys_bits by the SME physical address space reduction + * value. If BIOS has not enabled SME then don't advertise the + * feature (set in scattered.c). */ if (cpu_has(c, X86_FEATURE_SME)) { u64 msr; /* Check if SME is enabled */ rdmsrl(MSR_K8_SYSCFG, msr); - if (!(msr & MSR_K8_SYSCFG_MEM_ENCRYPT)) + if (msr & MSR_K8_SYSCFG_MEM_ENCRYPT) + c->x86_phys_bits -= (cpuid_ebx(0x8000001f) >> 6) & 0x3f; + else clear_cpu_cap(c, X86_FEATURE_SME); } } _______________________________________________ kexec mailing list kexec@lists.infradead.org http://lists.infradead.org/mailman/listinfo/kexec