Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp2608579rdg; Mon, 16 Oct 2023 09:16:15 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHNJbjDGxifVwak4E0Jj0/zphoJNtWxxDe0zvv0odTfIPhT/pUgpvrzIJl/R45TiaJ1WXyZ X-Received: by 2002:a17:90b:240b:b0:27d:247b:2c3c with SMTP id nr11-20020a17090b240b00b0027d247b2c3cmr9598962pjb.23.1697472975333; Mon, 16 Oct 2023 09:16:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697472975; cv=none; d=google.com; s=arc-20160816; b=fbzKNwYL83+eBZWvbNoism6tjnaJbW48kSC3avFQSMXbLhs78FCCXJQJVuDr/ZH8At xYtsojRz7vbC6toVCM5zBMK4M4Yw9sYjEIkBQOpbkrGWD/H1ZOVnk40thLqNoldB6oCH WM7ORJ17YOHUVc/U/HE5HkHipdLuMGFAwDq77RqxyyQFU8vlPSKHxuO/Cnnm3cAEjMIl mXPbSU4nJHjamAo8JgoHyaQUzUAefPC2EHxnglxbsonp2vRozUpyRX2AXY4O6PF85HEK CkZsY+GQvZW+SmxEWmtnNkNctq4XBPqT3qW4wX1IAMprmxc9q2GZIaiHp4fH/Y4lg8MP C+CA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:organization:message-id:date :references:subject:cc:to:from:dkim-signature; bh=JxuUUIMo7UCoIlCQTnFjIYpwFwxdMJEB05FIhOEn45s=; fh=Rqxw4xKVzekG20kOFwRSxDMMM4AbmJ82gPuuarJQc4A=; b=T0qbs7N/LTG33sxfVEevlBLUY3gJs6Fx+s3yWG8C9NHuf0D7PltTP/gjTuE/gZJLDo mBqWHDl9xqMpVupf7xEzogjU7vPsSibXT7WB1/NMt3b/cQmGZS5NM9kGmGYyyl69145x MjMDbQzlaCe+cbtWgNcDYG9JdQcn9Pap/qshRt157if5fhT4soK6mJNvNoeYYEF29KVi 99pkvMrIrbrEmrZtAmUqH3exmWySoBc+BMGRsECTx7jRIcTgiB+K66qWWJNoM13lE4Ac 8V04VoZPzhsvasSSKy84AbH3lHcYz3Teq50+FkDwcucjUjYLiqx8GAxIjqWfyZClmFpv EjyQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=aertb7TZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id i11-20020a17090acf8b00b0027ced9acac0si6373371pju.2.2023.10.16.09.16.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Oct 2023 09:16:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=aertb7TZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id AD0DE805A5C2; Mon, 16 Oct 2023 09:16:12 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232392AbjJPQQB (ORCPT + 99 others); Mon, 16 Oct 2023 12:16:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52518 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232046AbjJPQQA (ORCPT ); Mon, 16 Oct 2023 12:16:00 -0400 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.24]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D25A2AB for ; Mon, 16 Oct 2023 09:15:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1697472958; x=1729008958; h=from:to:cc:subject:references:date:message-id: mime-version; bh=IL0j6fa/J+Pdym4pycSDPbJG2TE8cr/bjuyQ4VByXSg=; b=aertb7TZB01MXZe+7uNFmB4Oj3CCXhm6Lg+dDVWO3zviuDkGiLsiOhCM TotXf4wAWRyjNwJq7XhBeYUE7SpWXYVVTtN16NFqn7A8XvSiVF8/v1f2v FZ/1sCjT8nfxTOEzpgQxivajmcs+sAcpEvm92CIZ5Wvr5Qo4fS49kq/VB MWOH8HBp++/x1QrTwrA/88TkJ/nskoCMNR1h3MIBafFafo2xOE7yzCwfM br6XMrriDBYHRUqYNX6d5sDqXWjtwyfV7d31Zp4H160/QdIGOdOpMI8R2 LXXMCcq4QRQWrdGMNLDtaCMijNrloP6dUOBi4YH6eT4LW9C/vPUjG4oiP Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10865"; a="388429716" X-IronPort-AV: E=Sophos;i="6.03,229,1694761200"; d="scan'208";a="388429716" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Oct 2023 09:14:39 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10865"; a="755742516" X-IronPort-AV: E=Sophos;i="6.03,229,1694761200"; d="scan'208";a="755742516" Received: from kmwinsor-mobl1.amr.corp.intel.com (HELO jcompost-mobl.amr.corp.intel.com) ([10.213.181.210]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Oct 2023 09:14:36 -0700 From: "Compostella, Jeremy" To: Cc: "Huang, Kai" , "mingo@kernel.org" , "Li, Xin3" , "linux-kernel@vger.kernel.org" , "x86@kernel.org" , "bp@alien8.de" Subject: Re: [PATCH v3 1/2] x86/cpu/intel: Fix MTRR verification for TME enabled platforms References: <87a5t6ylpc.fsf@jcompost-mobl.amr.corp.intel.com> <00392c722e65c8d0da40384eecf8955be4875969.camel@intel.com> <20231002224752.33qa2lq7q2w4nqws@box> <65d26d679843e26fd5e6252a08391f87243a49c9.camel@intel.com> <20231003070659.hsjvnoc53agvms6c@box.shutemov.name> <87edhyyvkp.fsf@jcompost-mobl.amr.corp.intel.com> <20231014210125.iexeacn6p4naw5qz@box.shutemov.name> Date: Mon, 16 Oct 2023 09:14:35 -0700 Message-ID: <87a5sizgr8.fsf@jcompost-mobl.amr.corp.intel.com> Organization: Intel Corporation - 2200 Mission College Blvd. Santa Clara, CA 95052. USA MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="=-=-=" X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Mon, 16 Oct 2023 09:16:12 -0700 (PDT) --=-=-= Content-Type: text/plain Content-Disposition: inline writes: > On Fri, Oct 13, 2023 at 04:03:02PM -0700, Compostella, Jeremy wrote: >> "kirill.shutemov@linux.intel.com" writes: >> > On Tue, Oct 03, 2023 at 02:06:52AM +0000, Huang, Kai wrote: >> >> On Tue, 2023-10-03 at 01:47 +0300, kirill.shutemov@linux.intel.com wrote: >> >> > On Fri, Sep 29, 2023 at 09:14:00AM +0000, Huang, Kai wrote: >> >> > > On Thu, 2023-09-28 at 15:30 -0700, Compostella, Jeremy wrote: >> >> > > > On TME enabled platform, BIOS publishes MTRR taking into account Total >> >> > > > Memory Encryption (TME) reserved bits. >> >> > > > >> >> > > > generic_get_mtrr() performs a sanity check of the MTRRs relying on the >> >> > > > `phys_hi_rsvd' variable which is set using the cpuinfo_x86 structure >> >> > > > `x86_phys_bits' field. But at the time the generic_get_mtrr() >> >> > > > function is ran the `x86_phys_bits' has not been updated by >> >> > > > detect_tme() when TME is enabled. >> >> > > > >> >> > > > Since the x86_phys_bits does not reflect yet the real maximal physical >> >> > > > address size yet generic_get_mtrr() complains by logging the following >> >> > > > messages. >> >> > > > >> >> > > > mtrr: your BIOS has configured an incorrect mask, fixing it. >> >> > > > mtrr: your BIOS has configured an incorrect mask, fixing it. >> >> > > > [...] >> >> > > > >> >> > > > In such a situation, generic_get_mtrr() returns an incorrect size but >> >> > > > no side effect were observed during our testing. >> >> > > > >> >> > > > For `x86_phys_bits' to be updated before generic_get_mtrr() runs, >> >> > > > move the detect_tme() call from init_intel() to early_init_intel(). >> >> > > >> >> > > Hi, >> >> > > >> >> > > This move looks good to me, but +Kirill who is the author of detect_tme() for >> >> > > further comments. >> >> > > >> >> > > Also I am not sure whether it's worth to consider to move this to >> >> > > get_cpu_address_sizes(), which calculates the virtual/physical address sizes. >> >> > > Thus it seems anything that can impact physical address size >> >> > > could be put there. >> >> > >> >> > Actually, I am not sure how this patch works. AFAICS after the patch we >> >> > have the following callchain: >> >> > >> >> > early_identify_cpu() >> >> > this_cpu->c_early_init() (which is early_init_init()) >> >> > detect_tme() >> >> > c->x86_phys_bits -= keyid_bits; >> >> > get_cpu_address_sizes(c); >> >> > c->x86_phys_bits = eax & 0xff; >> >> > >> >> > Looks like get_cpu_address_sizes() would override what detect_tme() does. >> >> >> >> After this patch, early_identify_cpu() calls get_cpu_address_sizes() first and >> >> then calls c_early_init(), which calls detect_tme(). >> >> >> >> So looks no override. No? >> >> No override indeed as get_cpu_address_sizes() is always called before >> early_init_intel or init_intel(). >> >> - init/main.c::start_kernel() >> - arch/x86/kernel/setup.c::setup_arch() >> - arch/x86/kernel/cpu/common.c::early_cpu_init() >> - early_identify_cpu() >> - get_cpu_address_sizes(c) >> c->x86_phys_bits = eax & 0xff; >> - arch/x86/kernel/cpu/intel.c::early_init_intel() >> - detect_tme() >> c->x86_phys_bits -= keyid_bits; > > Hmm.. Do I read it wrong: > > static void __init early_identify_cpu(struct cpuinfo_x86 *c) > { > ... > /* cyrix could have cpuid enabled via c_identify()*/ > if (have_cpuid_p()) { > ... > // Here we call early_intel_init() > if (this_cpu->c_early_init) > this_cpu->c_early_init(c); > ... > } > > get_cpu_address_sizes(c); > ... > } > > ? > > As far as I see get_cpu_address_sizes() called after early_intel_init(). On `58720809f527 v6.6-rc6 6.6-rc6 2de3c93ef41b' is what I have: ,---- | 1599 /* cyrix could have cpuid enabled via c_identify()*/ | 1600 if (have_cpuid_p()) { | 1601 cpu_detect(c); | 1602 get_cpu_vendor(c); | 1603 get_cpu_cap(c); | 1604 get_cpu_address_sizes(c); <= called first | 1605 setup_force_cpu_cap(X86_FEATURE_CPUID); | 1606 cpu_parse_early_param(); | 1607 | 1608 if (this_cpu->c_early_init) | 1609 this_cpu->c_early_init(c); | 1610 | 1611 c->cpu_index = 0; | 1612 filter_cpuid_features(c, false); | 1613 | 1614 if (this_cpu->c_bsp_init) | 1615 this_cpu->c_bsp_init(c); | 1616 } else { | 1617 setup_clear_cpu_cap(X86_FEATURE_CPUID); | 1618 } `---- Listing 1: arch/x86/kernel/cpu/common.c => get_cpu_address_sizes() is called first which is also conform to my experiments and instrumentation. -- Jeremy One Emacs to rule them all --=-=-=--