From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 396A7C4332F for ; Tue, 7 Nov 2023 22:09:47 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BB2578D0092; Tue, 7 Nov 2023 17:09:46 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id B62708D008C; Tue, 7 Nov 2023 17:09:46 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A02B18D0092; Tue, 7 Nov 2023 17:09:46 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 8EFC28D008C for ; Tue, 7 Nov 2023 17:09:46 -0500 (EST) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 5D46B140BCA for ; Tue, 7 Nov 2023 22:09:46 +0000 (UTC) X-FDA: 81432551172.08.316B94F Received: from mail.alien8.de (mail.alien8.de [65.109.113.108]) by imf27.hostedemail.com (Postfix) with ESMTP id 4056640014 for ; Tue, 7 Nov 2023 22:09:43 +0000 (UTC) Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=alien8.de header.s=alien8 header.b=kazyfy9M; dmarc=pass (policy=none) header.from=alien8.de; spf=pass (imf27.hostedemail.com: domain of bp@alien8.de designates 65.109.113.108 as permitted sender) smtp.mailfrom=bp@alien8.de ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1699394984; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=lOT/q2YMdfMaABo1869FPWc3E5BoFcxVu/riUnoyNfE=; b=urphLb2Pe5aL6PIDlVcw3OxXA50V+nnkXb+galpD5F+LaVG9YRY1aUlrBssLQzou8T9O5e FjQYDAQZeJliu7b+gXBQLJtEvl8o++11Qf4v5gEw8Yya0841cB//IRy2zX+IQbGq/34NU8 XwYhCSHVMxX1qx1R1xj4Kk2J2I5bGxQ= ARC-Authentication-Results: i=1; imf27.hostedemail.com; dkim=pass header.d=alien8.de header.s=alien8 header.b=kazyfy9M; dmarc=pass (policy=none) header.from=alien8.de; spf=pass (imf27.hostedemail.com: domain of bp@alien8.de designates 65.109.113.108 as permitted sender) smtp.mailfrom=bp@alien8.de ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1699394984; a=rsa-sha256; cv=none; b=JWwSr6YJrnZaeBLKdBXN3C3vbuk5E6+uZsbuq7u8/v6GgW8VefJITiDbrC6i7i6Liz+Fba VN4eLDPUsGv/XO8jTqhlgK1i7+Bnj39PCBO+FM3noV2y4t2kHj6NVCXrSy+Sp38QXsQ9h8 3E08020qL/64RNroQFE4/rsoXzIvv1w= Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTP id B818940E0192; Tue, 7 Nov 2023 22:09:40 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at mail.alien8.de Received: from mail.alien8.de ([127.0.0.1]) by localhost (mail.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id MbibT-UAAQK9; Tue, 7 Nov 2023 22:09:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=alien8; t=1699394978; bh=lOT/q2YMdfMaABo1869FPWc3E5BoFcxVu/riUnoyNfE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=kazyfy9MvcfPtPI2fIHIuAgO8cNbKnOJerf7UFZ/vmwZ29AYomlihQKkFnCazWCGE YnYFf2u+olFhHZl0nOc+C04jfE4t4ELuytMz89ibcTlyzbxSesC2ikJPfhOrC9SMfH NE3mWDHSg5XeYHz2Zbj6kgduVhP0L++xlw3A21u0vAVVfwkAcdoTtBePO1fv9iFA8U hO86aq6Y6f/3aLrVVaPX7CcMEUaOcp5uhcV1ImIwXDskHjLaARwQh+2WluChaABDrX xc7Nf/k1xM2aPa8QYnQ2Lv68Asnz5tCVW+cBvrO+TuqbnR2TRHsjM6bG74aTSNO1ta DfjNwkQecY8Rei72kk5mtZweOCD/p2gZLMRSioP68LcYUxfDA+zWhNx3jtPU7zZWTm 8cgb+STwIH65xamLBIGqLS679KW+fIGgv1+0j9tqMZFHMRFtL70r5NdbUMx7VfvvUf YWcnYEPnH/uhjvMHdDBC36OEsVmm0Unt5Zup1Q3okckHBj4W0h2ShoC5ZJmo53tpFU VTp/UWmukqbi4EkmCBYupQg4lwmzfl1AJDNE9De28cSLOmzUjhdZB39PFgGn/5qKqQ SeS3sEMDv5G5hFV8jy96ohxCIdkFggvbyOWpxz9cUPmGv5ddsWN0RecxElZR+UNYgp SAWqknNy5TXbnANuc6EsHRq4= Received: from zn.tnic (pd95304da.dip0.t-ipconnect.de [217.83.4.218]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id F14EB40E0191; Tue, 7 Nov 2023 22:08:57 +0000 (UTC) Date: Tue, 7 Nov 2023 23:08:52 +0100 From: Borislav Petkov To: "Kalra, Ashish" Cc: Michael Roth , kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, marcorr@google.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, jarkko@kernel.org, nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com, zhi.a.wang@intel.com, Brijesh Singh Subject: Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support Message-ID: <20231107220852.GGZUq1dHJ2q9LYV2oG@fat_crate.local> References: <20231016132819.1002933-1-michael.roth@amd.com> <20231016132819.1002933-7-michael.roth@amd.com> <20231107163142.GAZUpmbt/i3himIf+E@fat_crate.local> <4a2016d6-dc1f-ff68-9827-0b72b7c8eac2@amd.com> <20231107191931.GCZUqNwxP8JcSbjZ0/@fat_crate.local> <20231107202757.GEZUqdzYyzVBHTBhZX@fat_crate.local> <250f5513-91c0-d0b5-cb59-439e26ba16dc@amd.com> <20231107212740.GFZUqrzK7yzy41dRKp@fat_crate.local> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20231107212740.GFZUqrzK7yzy41dRKp@fat_crate.local> X-Rspamd-Queue-Id: 4056640014 X-Rspam-User: X-Rspamd-Server: rspam04 X-Stat-Signature: mtpmtmxiuc6ty4kgpigehdyt5gr3joc9 X-HE-Tag: 1699394983-610954 X-HE-Meta: U2FsdGVkX1+22drMeD2WUA/wJaV4t3MJh8diVBeUcvrdOO/fS0H0njBcRfzVG7TUtq4Gaa30OUPO6nuT1rIcYqseL/IrJ30cuZy394gerjge3fMzXKZXLlEGkMAewE5LIC3gzEK+3NQVf46tMk7HaA+5mJvvj1UZlC4739P3sa9r0h2klHPFDAC1Z4r7f5zBa8GWYcJ7rbIJuMiAdx4gJgdDmoKwihcxi+o4XqJ2o3Uh6WON37VCR1nME9FS1t+o50bCR4E8O2F5j8ZXrgBp8R30I8ce2WWg71r2M4gKWpywsKyiQ8YUkLAzGw0trVMWQZ/lvKKC7bJeX7R0Hbas2+gql5LoGRQGJAc2lvYC1P5fOMN/S2Jd2dBw03XopcWwAGExq6G1EOTbPy+D32tam5Tzt63TtxD4eSkVlBkiasROgfoRDWkwf1lX3AO/IhbXjbxGb7HbRVkL6hz0RlUNQax7hlMT35sdS5fZT8C1a4fDEI9nvYiGS+b5MeONz/Dgz5D3BQhJyMeXkwsJJ5TNH1NQWyn0hewD4Sn4ZNlwUcPFNYeT1NTePvg5frRsAkGakGBcND/eLm1RPpRqaN2AlDQ9ROKN7DzcuR9l3D/DR4zEvgGerkkSSKR/ilaQH/1cZ/rRC3jfvwn7yTWcy5dPCxXfHiNzfMb+JW5qB6zsSMrV7/YAhC0DuTa6FbNu96Y11CqCliUkxE5Htg9ZZIt0jvLh9aY0VjLfx2b/d35PknvH+iwAYZWEC2qqUfvfwuzpo5sZT2eCbTvk0jmfRJ2hna0LYQRAU7LVcYZhiWMgayO8v7JGDqWPeR1H0u82D7v1m1sabb509e3QlkSQKLu9CxMhy5FZjpI/Q1nBw8Li6lyhzUfcK7kbD4hR3NHftqFT/tmsPG/PUoJ+Jwiy4dRQCHDox9iyTgOkgSjSjXUYbGi5ueyV/YNTX7e42tfx3+sw42fqo357aKpun1BsmG6 vmQNykqY wozMw2zt1r958siuSi+nCLu3xMjJyuG67ub5bz1Imh9hY/TnelaBu4kgHGt4r5wmOZ30TbLcg4cIld/BBPGm1v7fdzpQgDNGKZo9kmVmOCNjKQa6jiuIFHa792Z/sAMmgRwgxOZAefYl1PxVzT18+98FZciHLxSncSao99v+E3jDT+wDt2LK25zUZvoJPipehwVtKb+Uw85hfGY8= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Ontop. Only build-tested. --- diff --git a/arch/x86/include/asm/iommu.h b/arch/x86/include/asm/iommu.h index 2fd52b65deac..3be2451e7bc8 100644 --- a/arch/x86/include/asm/iommu.h +++ b/arch/x86/include/asm/iommu.h @@ -10,6 +10,7 @@ extern int force_iommu, no_iommu; extern int iommu_detected; extern int iommu_merge; extern int panic_on_overflow; +extern bool amd_iommu_snp_en; #ifdef CONFIG_SWIOTLB extern bool x86_swiotlb_enable; diff --git a/arch/x86/virt/svm/sev.c b/arch/x86/virt/svm/sev.c index 8b9ed72489e4..9237c327ad6d 100644 --- a/arch/x86/virt/svm/sev.c +++ b/arch/x86/virt/svm/sev.c @@ -196,23 +196,15 @@ static __init int __snp_rmptable_init(void) static int __init snp_rmptable_init(void) { - int family, model; - - if (!cpu_feature_enabled(X86_FEATURE_SEV_SNP)) + if (!amd_iommu_snp_en) return 0; - family = boot_cpu_data.x86; - model = boot_cpu_data.x86_model; - /* * RMP table entry format is not architectural and it can vary by processor and * is defined by the per-processor PPR. Restrict SNP support on the known CPU * model and family for which the RMP table entry format is currently defined for. */ - if (family != 0x19 || model > 0xaf) - goto nosnp; - - if (amd_iommu_snp_enable()) + if (boot_cpu_data.x86 != 0x19 || boot_cpu_data.x86_model > 0xaf) goto nosnp; if (__snp_rmptable_init()) @@ -228,12 +220,10 @@ static int __init snp_rmptable_init(void) } /* - * This must be called after the PCI subsystem. This is because amd_iommu_snp_enable() - * is called to ensure the IOMMU supports the SEV-SNP feature, which can only be - * called after subsys_initcall(). + * This must be called after the IOMMU has been initialized. * * NOTE: IOMMU is enforced by SNP to ensure that hypervisor cannot program DMA * directly into guest private memory. In case of SNP, the IOMMU ensures that * the page(s) used for DMA are hypervisor owned. */ -fs_initcall(snp_rmptable_init); +device_initcall(snp_rmptable_init); diff --git a/drivers/iommu/amd/amd_iommu.h b/drivers/iommu/amd/amd_iommu.h index e2857109e966..353d68b25fe2 100644 --- a/drivers/iommu/amd/amd_iommu.h +++ b/drivers/iommu/amd/amd_iommu.h @@ -148,6 +148,4 @@ struct dev_table_entry *get_dev_table(struct amd_iommu *iommu); extern u64 amd_iommu_efr; extern u64 amd_iommu_efr2; - -extern bool amd_iommu_snp_en; #endif diff --git a/drivers/iommu/amd/init.c b/drivers/iommu/amd/init.c index 1c9924de607a..9e72cd8413bb 100644 --- a/drivers/iommu/amd/init.c +++ b/drivers/iommu/amd/init.c @@ -3255,6 +3255,35 @@ static bool __init detect_ivrs(void) return true; } +#ifdef CONFIG_KVM_AMD_SEV +static void iommu_snp_enable(void) +{ + if (!cpu_feature_enabled(X86_FEATURE_SEV_SNP)) + return; + + /* + * The SNP support requires that IOMMU must be enabled, and is + * not configured in the passthrough mode. + */ + if (no_iommu || iommu_default_passthrough()) { + pr_err("SNP: IOMMU is disabled or configured in passthrough mode, SNP cannot be supported"); + return; + } + + amd_iommu_snp_en = check_feature_on_all_iommus(FEATURE_SNP); + if (!amd_iommu_snp_en) + return; + + pr_info("SNP enabled\n"); + + /* Enforce IOMMU v1 pagetable when SNP is enabled. */ + if (amd_iommu_pgtable != AMD_IOMMU_V1) { + pr_warn("Force to using AMD IOMMU v1 page table due to SNP\n"); + amd_iommu_pgtable = AMD_IOMMU_V1; + } +} +#endif + /**************************************************************************** * * AMD IOMMU Initialization State Machine @@ -3290,6 +3319,7 @@ static int __init state_next(void) break; case IOMMU_ENABLED: register_syscore_ops(&amd_iommu_syscore_ops); + iommu_snp_enable(); ret = amd_iommu_init_pci(); init_state = ret ? IOMMU_INIT_ERROR : IOMMU_PCI_INIT; break; @@ -3802,40 +3832,4 @@ int amd_iommu_pc_set_reg(struct amd_iommu *iommu, u8 bank, u8 cntr, u8 fxn, u64 return iommu_pc_get_set_reg(iommu, bank, cntr, fxn, value, true); } -#ifdef CONFIG_KVM_AMD_SEV -int amd_iommu_snp_enable(void) -{ - /* - * The SNP support requires that IOMMU must be enabled, and is - * not configured in the passthrough mode. - */ - if (no_iommu || iommu_default_passthrough()) { - pr_err("SNP: IOMMU is disabled or configured in passthrough mode, SNP cannot be supported"); - return -EINVAL; - } - - /* - * Prevent enabling SNP after IOMMU_ENABLED state because this process - * affect how IOMMU driver sets up data structures and configures - * IOMMU hardware. - */ - if (init_state > IOMMU_ENABLED) { - pr_err("SNP: Too late to enable SNP for IOMMU.\n"); - return -EINVAL; - } - - amd_iommu_snp_en = check_feature_on_all_iommus(FEATURE_SNP); - if (!amd_iommu_snp_en) - return -EINVAL; - - pr_info("SNP enabled\n"); - - /* Enforce IOMMU v1 pagetable when SNP is enabled. */ - if (amd_iommu_pgtable != AMD_IOMMU_V1) { - pr_warn("Force to using AMD IOMMU v1 page table due to SNP\n"); - amd_iommu_pgtable = AMD_IOMMU_V1; - } - return 0; -} -#endif -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette