Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp4936634pxb; Tue, 5 Oct 2021 13:43:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx/91a/T1Xs/SN9avCXQYeyGNMaHiXgMYI9SilR+ehnR4bG6goit/yMg/VbHnS38QJYcQiy X-Received: by 2002:a63:514e:: with SMTP id r14mr17003689pgl.282.1633466583139; Tue, 05 Oct 2021 13:43:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633466583; cv=none; d=google.com; s=arc-20160816; b=A0aPMD2lcaL0i6v0e2GZlU95fbvYub7haO1ykCUfbArjQFjtU645UVigLNrYgkp6/A aF6XUzUZGviZmFOBzCU6I1xnHVMKukNFglVjWe8jsbQ5L2yvA5RDAEp7UGCSa14X53XR ud2R+VEIYTiZgG3dv2t+40LNfeRRzxf7OBEQHSeqSXJbobPU6EqGn72kz0IM/XeKcoF4 jheneEx5XztvDKua3qaNJ1KMDknjNyp/J5uUR4jr4UbKLmyk1wZzPkFE8Ybf23dKAcJA GK4VVh5cYe7ryxq+kNUjX4ioyZt3KYnDeZ3O2XAq3MjCoAtejfB02iKOHrEKfSZZ6H7X Ir0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=8hmbLoSRi6OnB0SEUvE1O6EvAEKVnNKpmEn6dEXgtOQ=; b=H4GG+JhoIVg5AkphtZRJpwcKpG8yAV+kHCV1bM87aTDzcnAwDdyBaQaCmzCl1lFzUl LPzpvCdSKLF4JbpeiYtLMtalsQWFTqQSAkae1w5Z61AYw4K+a3drHKt8BPV9e48qw8/O w6l595Gxu0re2nGzEAEFIXVp4s3sk0M6e84uColcSZbGAxi4OHxVvHySLcysmE51enNT I9sFlqF7ZenQ5SFVnzXaciK1wnMj+hzb8XBWFaw92fUczWd06+jtKYE1BD1WeI41q8IB iADcYSyb+VRmc6fX4NkTa3m9PGYd0r1gyNR0XL7lAIeGoxXZ03VLZmTjK35NWlo+Tk7C RPrg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u10si21385071pgp.253.2021.10.05.13.42.50; Tue, 05 Oct 2021 13:43:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236032AbhJEUnx (ORCPT + 99 others); Tue, 5 Oct 2021 16:43:53 -0400 Received: from mga07.intel.com ([134.134.136.100]:11157 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234130AbhJEUnt (ORCPT ); Tue, 5 Oct 2021 16:43:49 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10128"; a="289354591" X-IronPort-AV: E=Sophos;i="5.85,349,1624345200"; d="scan'208";a="289354591" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Oct 2021 13:41:58 -0700 X-IronPort-AV: E=Sophos;i="5.85,349,1624345200"; d="scan'208";a="523979464" Received: from alyee-mobl.amr.corp.intel.com (HELO skuppusw-desk1.amr.corp.intel.com) ([10.254.5.222]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Oct 2021 13:41:58 -0700 From: Kuppuswamy Sathyanarayanan To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, Paolo Bonzini , David Hildenbrand , Andrea Arcangeli , Josh Poimboeuf , "H . Peter Anvin" Cc: Dave Hansen , Tony Luck , Dan Williams , Andi Kleen , Kirill Shutemov , Sean Christopherson , Kuppuswamy Sathyanarayanan , linux-kernel@vger.kernel.org Subject: [PATCH v7 02/10] x86/tdx: Add early_is_tdx_guest() interface Date: Tue, 5 Oct 2021 13:41:28 -0700 Message-Id: <20211005204136.1812078-3-sathyanarayanan.kuppuswamy@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20211005204136.1812078-1-sathyanarayanan.kuppuswamy@linux.intel.com> References: <20211005204136.1812078-1-sathyanarayanan.kuppuswamy@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add helper function to detect TDX feature support. It will be used to protect TDX specific code in decompression code (for example to add TDX specific I/O fixes in decompression code). Reviewed-by: Tony Luck Signed-off-by: Kuppuswamy Sathyanarayanan --- Changes since v6: * None Changes since v5: * None Changes since v4: * None Changes since v3: * None Changes since v2: * Fixed string order issue in cpuid_count() call. Changes since v1: * Modified cpuid_has_tdx_guest() to use cpuid_count() instead of native_cpuid(). * Reused cpuid_count() from cpuflags.c. * Added a new function cpuid_eax(). * Renamed native_cpuid_has_tdx_guest() as early_cpuid_has_tdx_guest(). arch/x86/boot/compressed/Makefile | 1 + arch/x86/boot/compressed/tdx.c | 31 +++++++++++++++++++++++++++++++ arch/x86/boot/cpuflags.c | 12 ++++++++++-- arch/x86/boot/cpuflags.h | 2 ++ 4 files changed, 44 insertions(+), 2 deletions(-) create mode 100644 arch/x86/boot/compressed/tdx.c diff --git a/arch/x86/boot/compressed/Makefile b/arch/x86/boot/compressed/Makefile index 431bf7f846c3..22a2a6cc2ab4 100644 --- a/arch/x86/boot/compressed/Makefile +++ b/arch/x86/boot/compressed/Makefile @@ -98,6 +98,7 @@ ifdef CONFIG_X86_64 endif vmlinux-objs-$(CONFIG_ACPI) += $(obj)/acpi.o +vmlinux-objs-$(CONFIG_INTEL_TDX_GUEST) += $(obj)/tdx.o vmlinux-objs-$(CONFIG_EFI_MIXED) += $(obj)/efi_thunk_$(BITS).o efi-obj-$(CONFIG_EFI_STUB) = $(objtree)/drivers/firmware/efi/libstub/lib.a diff --git a/arch/x86/boot/compressed/tdx.c b/arch/x86/boot/compressed/tdx.c new file mode 100644 index 000000000000..ecb3b42992e0 --- /dev/null +++ b/arch/x86/boot/compressed/tdx.c @@ -0,0 +1,31 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * tdx.c - Early boot code for TDX + */ + +#include "../cpuflags.h" +#include "../string.h" + +#define TDX_CPUID_LEAF_ID 0x21 + +static int tdx_guest = -1; + +static inline bool early_cpuid_has_tdx_guest(void) +{ + u32 eax = TDX_CPUID_LEAF_ID, sig[3] = {0}; + + if (cpuid_eax(0) < TDX_CPUID_LEAF_ID) + return false; + + cpuid_count(TDX_CPUID_LEAF_ID, 0, &eax, &sig[0], &sig[2], &sig[1]); + + return !memcmp("IntelTDX ", sig, 12); +} + +bool early_is_tdx_guest(void) +{ + if (tdx_guest < 0) + tdx_guest = early_cpuid_has_tdx_guest(); + + return !!tdx_guest; +} diff --git a/arch/x86/boot/cpuflags.c b/arch/x86/boot/cpuflags.c index a0b75f73dc63..102613a092aa 100644 --- a/arch/x86/boot/cpuflags.c +++ b/arch/x86/boot/cpuflags.c @@ -71,8 +71,7 @@ int has_eflag(unsigned long mask) # define EBX_REG "=b" #endif -static inline void cpuid_count(u32 id, u32 count, - u32 *a, u32 *b, u32 *c, u32 *d) +void cpuid_count(u32 id, u32 count, u32 *a, u32 *b, u32 *c, u32 *d) { asm volatile(".ifnc %%ebx,%3 ; movl %%ebx,%3 ; .endif \n\t" "cpuid \n\t" @@ -82,6 +81,15 @@ static inline void cpuid_count(u32 id, u32 count, ); } +u32 cpuid_eax(u32 id) +{ + u32 eax, ebx, ecx, edx; + + cpuid_count(id, 0, &eax, &ebx, &ecx, &edx); + + return eax; +} + #define cpuid(id, a, b, c, d) cpuid_count(id, 0, a, b, c, d) void get_cpuflags(void) diff --git a/arch/x86/boot/cpuflags.h b/arch/x86/boot/cpuflags.h index 2e20814d3ce3..5a72233eb8fd 100644 --- a/arch/x86/boot/cpuflags.h +++ b/arch/x86/boot/cpuflags.h @@ -17,5 +17,7 @@ extern u32 cpu_vendor[3]; int has_eflag(unsigned long mask); void get_cpuflags(void); +void cpuid_count(u32 id, u32 count, u32 *a, u32 *b, u32 *c, u32 *d); +u32 cpuid_eax(u32 id); #endif -- 2.25.1