On Mon, Jul 24, 2017 at 02:07:42PM -0500, Brijesh Singh wrote:
> From: Tom Lendacky <thomas.lenda...@amd.com>
> 
> Update the CPU features to include identifying and reporting on the
> Secure Encrypted Virtualization (SEV) feature.  SME is identified by
> CPUID 0x8000001f, but requires BIOS support to enable it (set bit 23 of
> MSR_K8_SYSCFG and set bit 0 of MSR_K7_HWCR).  Only show the SEV feature
> as available if reported by CPUID and enabled by BIOS.
> 
> Signed-off-by: Tom Lendacky <thomas.lenda...@amd.com>
> Signed-off-by: Brijesh Singh <brijesh.si...@amd.com>
> ---
>  arch/x86/include/asm/cpufeatures.h |  1 +
>  arch/x86/include/asm/msr-index.h   |  2 ++
>  arch/x86/kernel/cpu/amd.c          | 30 +++++++++++++++++++++++++-----
>  arch/x86/kernel/cpu/scattered.c    |  1 +
>  4 files changed, 29 insertions(+), 5 deletions(-)

...

> @@ -637,6 +642,21 @@ static void early_init_amd(struct cpuinfo_x86 *c)
>                       clear_cpu_cap(c, X86_FEATURE_SME);
>               }
>       }
> +
> +     if (cpu_has(c, X86_FEATURE_SEV)) {
> +             if (IS_ENABLED(CONFIG_X86_32)) {
> +                     clear_cpu_cap(c, X86_FEATURE_SEV);
> +             } else {
> +                     u64 syscfg, hwcr;
> +
> +                     /* Check if SEV is enabled */
> +                     rdmsrl(MSR_K8_SYSCFG, syscfg);
> +                     rdmsrl(MSR_K7_HWCR, hwcr);
> +                     if (!(syscfg & MSR_K8_SYSCFG_MEM_ENCRYPT) ||
> +                         !(hwcr & MSR_K7_HWCR_SMMLOCK))
> +                             clear_cpu_cap(c, X86_FEATURE_SEV);
> +             }
> +     }

Let's simplify this and read the MSRs only once. Diff ontop. Please
check if I'm missing a case:

---
diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c
index c413f04bdd41..79af07731ab1 100644
--- a/arch/x86/kernel/cpu/amd.c
+++ b/arch/x86/kernel/cpu/amd.c
@@ -546,6 +546,48 @@ static void bsp_init_amd(struct cpuinfo_x86 *c)
        }
 }
 
+static void early_detect_mem_enc(struct cpuinfo_x86 *c)
+{
+       u64 syscfg, hwcr;
+
+       /*
+        * BIOS support is required for SME and SEV.
+        *   For SME: If BIOS has enabled SME then adjust x86_phys_bits by
+        *            the SME physical address space reduction value.
+        *            If BIOS has not enabled SME then don't advertise the
+        *            SME feature (set in scattered.c).
+        *   For SEV: If BIOS has not enabled SEV then don't advertise the
+        *            SEV feature (set in scattered.c).
+        *
+        *   In all cases, since support for SME and SEV requires long mode,
+        *   don't advertise the feature under CONFIG_X86_32.
+        */
+       if (cpu_has(c, X86_FEATURE_SME) ||
+           cpu_has(c, X86_FEATURE_SEV)) {
+
+               if (IS_ENABLED(CONFIG_X86_32))
+                       goto clear;
+
+               /* Check if SME is enabled */
+               rdmsrl(MSR_K8_SYSCFG, syscfg);
+               if (!(syscfg & MSR_K8_SYSCFG_MEM_ENCRYPT))
+                       goto clear;
+
+               c->x86_phys_bits -= (cpuid_ebx(0x8000001f) >> 6) & 0x3f;
+
+               /* Check if SEV is enabled */
+               rdmsrl(MSR_K7_HWCR, hwcr);
+               if (!(hwcr & MSR_K7_HWCR_SMMLOCK))
+                       goto clear_sev;
+
+               return;
+clear:
+               clear_cpu_cap(c, X86_FEATURE_SME);
+clear_sev:
+               clear_cpu_cap(c, X86_FEATURE_SEV);
+       }
+}
+
 static void early_init_amd(struct cpuinfo_x86 *c)
 {
        u32 dummy;
@@ -617,46 +659,8 @@ static void early_init_amd(struct cpuinfo_x86 *c)
        if (cpu_has_amd_erratum(c, amd_erratum_400))
                set_cpu_bug(c, X86_BUG_AMD_E400);
 
-       /*
-        * BIOS support is required for SME and SEV.
-        *   For SME: If BIOS has enabled SME then adjust x86_phys_bits by
-        *            the SME physical address space reduction value.
-        *            If BIOS has not enabled SME then don't advertise the
-        *            SME feature (set in scattered.c).
-        *   For SEV: If BIOS has not enabled SEV then don't advertise the
-        *            SEV feature (set in scattered.c).
-        *
-        *   In all cases, since support for SME and SEV requires long mode,
-        *   don't advertise the feature under CONFIG_X86_32.
-        */
-       if (cpu_has(c, X86_FEATURE_SME)) {
-               u64 msr;
-
-               /* Check if SME is enabled */
-               rdmsrl(MSR_K8_SYSCFG, msr);
-               if (msr & MSR_K8_SYSCFG_MEM_ENCRYPT) {
-                       c->x86_phys_bits -= (cpuid_ebx(0x8000001f) >> 6) & 0x3f;
-                       if (IS_ENABLED(CONFIG_X86_32))
-                               clear_cpu_cap(c, X86_FEATURE_SME);
-               } else {
-                       clear_cpu_cap(c, X86_FEATURE_SME);
-               }
-       }
+       early_detect_mem_enc(c);
 
-       if (cpu_has(c, X86_FEATURE_SEV)) {
-               if (IS_ENABLED(CONFIG_X86_32)) {
-                       clear_cpu_cap(c, X86_FEATURE_SEV);
-               } else {
-                       u64 syscfg, hwcr;
-
-                       /* Check if SEV is enabled */
-                       rdmsrl(MSR_K8_SYSCFG, syscfg);
-                       rdmsrl(MSR_K7_HWCR, hwcr);
-                       if (!(syscfg & MSR_K8_SYSCFG_MEM_ENCRYPT) ||
-                           !(hwcr & MSR_K7_HWCR_SMMLOCK))
-                               clear_cpu_cap(c, X86_FEATURE_SEV);
-               }
-       }
 }
 
 static void init_amd_k8(struct cpuinfo_x86 *c)

-- 
Regards/Gruss,
    Boris.

SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284 
(AG Nürnberg)
-- 
--
To unsubscribe from this list: send the line "unsubscribe linux-efi" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to