Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp2668352rdb; Fri, 22 Sep 2023 05:32:45 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGpv2dZeNgsgP1CYgcZiIE+HdAnuha2+EpalNX0G29A+Cq4DOT540Qlh6kU2NZL+nORkwfD X-Received: by 2002:a17:902:b781:b0:1b8:1bac:3782 with SMTP id e1-20020a170902b78100b001b81bac3782mr7261488pls.6.1695385965454; Fri, 22 Sep 2023 05:32:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695385965; cv=none; d=google.com; s=arc-20160816; b=DxK6HAUy3ZyfnlQuG+Y/CA9VKwFt4vxVO66tfebWliEIryqGn+5EIauNBDNSNLJUmI VO81tmpsiFUU3HVS4Sd06rif3hPUMnijdEteoM4kMlM7bee8M9YXxuvxhV/YojgHzt5e 4xLpN+TxouBHjrcvmeUJCTcBTOpW/QpaXRdSlbLHSIAs8+PnBms+umlvXX5D0lMK0veE DMCp0Frbv+z7MIz4lMd9Kkn8Y9V5dV+jDz4+tOYgbZwWE2sUpku/BbLnxv2ZXo8+kZ1H TxQ3JGLSFBx84Nxtm3L2Ip5IeiPf5L7H/nNuwpsvPVqwbvk79qfHeRXGGcKdwIcW9R8l I8hQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:robot-unsubscribe :robot-id:message-id:mime-version:references:in-reply-to:cc:subject :to:reply-to:sender:from:dkim-signature:dkim-signature:date; bh=DdaSzg2HylZVoxLdcrNA6goIyqAM9SSlosMciSb6/Ms=; fh=FGDp9ME18jOTkFqBHweWzk1nwtAN0qi+1SpbFeu5oNY=; b=RC9BR77CS7qk2iQTFVVdZcyTM9bxltKq683JOpmeKWZSphbyx8Ttw0Y5/nKSSy9AfQ IrBsQ7byXZ+wZYC/ug2a2aDZg83FUQM7FrI6lh+XgA9//i8newXoxSWzOVARkfkpIpAs FSHClTxv8+hykz+PGSsFoRu69IxOlK/52b1oyUoGsa88mfXIfA/aXcN89JtbnLdX9+wp nONHjpCgoSy9S/P507zK8+k43DklZ5jcrffNMeBFvvAgo+qLEanjEAvLPtt32UjKBy9T yEuU4KRugRG/C/2OjCvRoQJzvmmZHFkKud4er7xM6Ec/FRfZ5DJj0uniBf0t7AVnqeZt diBg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=LGSJFX6Z; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b="nK/OoKjp"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id n11-20020a170902e54b00b001c5d1016b37si3860707plf.587.2023.09.22.05.32.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Sep 2023 05:32:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=LGSJFX6Z; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b="nK/OoKjp"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 859DA83B7B4E; Fri, 22 Sep 2023 02:44:08 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231223AbjIVJoI (ORCPT + 99 others); Fri, 22 Sep 2023 05:44:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33030 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230071AbjIVJoG (ORCPT ); Fri, 22 Sep 2023 05:44:06 -0400 Received: from galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5C7D2CE; Fri, 22 Sep 2023 02:44:00 -0700 (PDT) Date: Fri, 22 Sep 2023 09:43:58 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1695375839; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=DdaSzg2HylZVoxLdcrNA6goIyqAM9SSlosMciSb6/Ms=; b=LGSJFX6Zrk1mM8jaq/HlxfPOgMA5Lnk9PcU7t8SpptFjqbmx9YYIFqXnI57+F5yZyddWLb msqwmaKpaVHmpTRZfKEwJBacyYrME/N7XB3ywLZY0SrwDHgS8C9SiBoSCQIUdA9GZPOMnV edcuUCcJXsc0Pmup0zCVTiG/M2Jevse55aTSSuryILD8m+SqRr0hf8firf8nATOTpz3d34 KqfA7FHYKE9ygWwMeYOAOfeF4ksg7FFUxnMxoZcMKsse7+yLQiWhkZN8YXvHn1nwFXSg01 QNlItQ7HSYj5+YWj7caU7z/6wahBDbv/meMLYVwQMqxw2A+en+3tqeVP4CZuHQ== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1695375839; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=DdaSzg2HylZVoxLdcrNA6goIyqAM9SSlosMciSb6/Ms=; b=nK/OoKjpdDzbbZAu5PNMVu91V5nbypBN2uzBzzZHOGPysbbSh5w4PoZ22YuhZdCwloJ0G2 SHKlK7H4PmH2Q6Aw== From: "tip-bot2 for Paolo Bonzini" Sender: tip-bot2@linutronix.de Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/cpu] x86/cpu: Clear SVM feature if disabled by BIOS Cc: Paolo Bonzini , "Borislav Petkov (AMD)" , x86@kernel.org, linux-kernel@vger.kernel.org In-Reply-To: <20230921114940.957141-1-pbonzini@redhat.com> References: <20230921114940.957141-1-pbonzini@redhat.com> MIME-Version: 1.0 Message-ID: <169537583818.27769.18320521458994415527.tip-bot2@tip-bot2> Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Fri, 22 Sep 2023 02:44:08 -0700 (PDT) The following commit has been merged into the x86/cpu branch of tip: Commit-ID: 7deda2ce5b33edc6d689e429e3fe75382468b030 Gitweb: https://git.kernel.org/tip/7deda2ce5b33edc6d689e429e3fe75382468b030 Author: Paolo Bonzini AuthorDate: Thu, 21 Sep 2023 07:49:40 -04:00 Committer: Borislav Petkov (AMD) CommitterDate: Fri, 22 Sep 2023 10:55:26 +02:00 x86/cpu: Clear SVM feature if disabled by BIOS When SVM is disabled by BIOS, one cannot use KVM but the SVM feature is still shown in the output of /proc/cpuinfo. On Intel machines, VMX is cleared by init_ia32_feat_ctl(), so do the same on AMD and Hygon processors. Signed-off-by: Paolo Bonzini Signed-off-by: Borislav Petkov (AMD) Link: https://lore.kernel.org/r/20230921114940.957141-1-pbonzini@redhat.com --- arch/x86/include/asm/msr-index.h | 6 +++++- arch/x86/include/asm/svm.h | 6 ------ arch/x86/kernel/cpu/amd.c | 10 ++++++++++ arch/x86/kernel/cpu/hygon.c | 10 ++++++++++ arch/x86/kvm/svm/svm.c | 8 -------- 5 files changed, 25 insertions(+), 15 deletions(-) diff --git a/arch/x86/include/asm/msr-index.h b/arch/x86/include/asm/msr-index.h index 1d11135..6a6b0f7 100644 --- a/arch/x86/include/asm/msr-index.h +++ b/arch/x86/include/asm/msr-index.h @@ -1112,12 +1112,16 @@ #define MSR_IA32_VMX_MISC_INTEL_PT (1ULL << 14) #define MSR_IA32_VMX_MISC_VMWRITE_SHADOW_RO_FIELDS (1ULL << 29) #define MSR_IA32_VMX_MISC_PREEMPTION_TIMER_SCALE 0x1F -/* AMD-V MSRs */ +/* AMD-V MSRs */ #define MSR_VM_CR 0xc0010114 #define MSR_VM_IGNNE 0xc0010115 #define MSR_VM_HSAVE_PA 0xc0010117 +#define SVM_VM_CR_VALID_MASK 0x001fULL +#define SVM_VM_CR_SVM_LOCK_MASK 0x0008ULL +#define SVM_VM_CR_SVM_DIS_MASK 0x0010ULL + /* Hardware Feedback Interface */ #define MSR_IA32_HW_FEEDBACK_PTR 0x17d0 #define MSR_IA32_HW_FEEDBACK_CONFIG 0x17d1 diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h index 19bf955..fb8366a 100644 --- a/arch/x86/include/asm/svm.h +++ b/arch/x86/include/asm/svm.h @@ -229,10 +229,6 @@ struct __attribute__ ((__packed__)) vmcb_control_area { #define SVM_IOIO_SIZE_MASK (7 << SVM_IOIO_SIZE_SHIFT) #define SVM_IOIO_ASIZE_MASK (7 << SVM_IOIO_ASIZE_SHIFT) -#define SVM_VM_CR_VALID_MASK 0x001fULL -#define SVM_VM_CR_SVM_LOCK_MASK 0x0008ULL -#define SVM_VM_CR_SVM_DIS_MASK 0x0010ULL - #define SVM_NESTED_CTL_NP_ENABLE BIT(0) #define SVM_NESTED_CTL_SEV_ENABLE BIT(1) #define SVM_NESTED_CTL_SEV_ES_ENABLE BIT(2) @@ -571,8 +567,6 @@ struct vmcb { #define SVM_CPUID_FUNC 0x8000000a -#define SVM_VM_CR_SVM_DISABLE 4 - #define SVM_SELECTOR_S_SHIFT 4 #define SVM_SELECTOR_DPL_SHIFT 5 #define SVM_SELECTOR_P_SHIFT 7 diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c index dd8379d..1011ce2 100644 --- a/arch/x86/kernel/cpu/amd.c +++ b/arch/x86/kernel/cpu/amd.c @@ -1031,6 +1031,8 @@ static void zenbleed_check(struct cpuinfo_x86 *c) static void init_amd(struct cpuinfo_x86 *c) { + u64 vm_cr; + early_init_amd(c); /* @@ -1082,6 +1084,14 @@ static void init_amd(struct cpuinfo_x86 *c) init_amd_cacheinfo(c); + if (cpu_has(c, X86_FEATURE_SVM)) { + rdmsrl(MSR_VM_CR, vm_cr); + if (vm_cr & SVM_VM_CR_SVM_DIS_MASK) { + pr_notice_once("SVM disabled (by BIOS) in MSR_VM_CR\n"); + clear_cpu_cap(c, X86_FEATURE_SVM); + } + } + if (!cpu_has(c, X86_FEATURE_LFENCE_RDTSC) && cpu_has(c, X86_FEATURE_XMM2)) { /* * Use LFENCE for execution serialization. On families which diff --git a/arch/x86/kernel/cpu/hygon.c b/arch/x86/kernel/cpu/hygon.c index defdc59..16f3463 100644 --- a/arch/x86/kernel/cpu/hygon.c +++ b/arch/x86/kernel/cpu/hygon.c @@ -290,6 +290,8 @@ static void early_init_hygon(struct cpuinfo_x86 *c) static void init_hygon(struct cpuinfo_x86 *c) { + u64 vm_cr; + early_init_hygon(c); /* @@ -320,6 +322,14 @@ static void init_hygon(struct cpuinfo_x86 *c) init_hygon_cacheinfo(c); + if (cpu_has(c, X86_FEATURE_SVM)) { + rdmsrl(MSR_VM_CR, vm_cr); + if (vm_cr & SVM_VM_CR_SVM_DIS_MASK) { + pr_notice_once("SVM disabled (by BIOS) in MSR_VM_CR\n"); + clear_cpu_cap(c, X86_FEATURE_SVM); + } + } + if (cpu_has(c, X86_FEATURE_XMM2)) { /* * Use LFENCE for execution serialization. On families which diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index f283eb4..7b91efb 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -531,8 +531,6 @@ static bool __kvm_is_svm_supported(void) int cpu = smp_processor_id(); struct cpuinfo_x86 *c = &cpu_data(cpu); - u64 vm_cr; - if (c->x86_vendor != X86_VENDOR_AMD && c->x86_vendor != X86_VENDOR_HYGON) { pr_err("CPU %d isn't AMD or Hygon\n", cpu); @@ -549,12 +547,6 @@ static bool __kvm_is_svm_supported(void) return false; } - rdmsrl(MSR_VM_CR, vm_cr); - if (vm_cr & (1 << SVM_VM_CR_SVM_DISABLE)) { - pr_err("SVM disabled (by BIOS) in MSR_VM_CR on CPU %d\n", cpu); - return false; - } - return true; }