aboutsummaryrefslogtreecommitdiffstats
path: root/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0054-x86-io-Unroll-string-I-O-when-SEV-is-active.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0054-x86-io-Unroll-string-I-O-when-SEV-is-active.patch')
-rw-r--r--meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0054-x86-io-Unroll-string-I-O-when-SEV-is-active.patch124
1 files changed, 0 insertions, 124 deletions
diff --git a/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0054-x86-io-Unroll-string-I-O-when-SEV-is-active.patch b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0054-x86-io-Unroll-string-I-O-when-SEV-is-active.patch
deleted file mode 100644
index 96d88245..00000000
--- a/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0054-x86-io-Unroll-string-I-O-when-SEV-is-active.patch
+++ /dev/null
@@ -1,124 +0,0 @@
-From 295d8a0fc04f5f07a892766fc646680c124dc423 Mon Sep 17 00:00:00 2001
-From: Sudheesh Mavila <sudheesh.mavila@amd.com>
-Date: Tue, 14 Aug 2018 13:29:25 +0530
-Subject: [PATCH 54/95] x86/io: Unroll string I/O when SEV is active
-
-From 606b21d4a6498c23632a4693c81b7b24feedd038
-Secure Encrypted Virtualization (SEV) does not support string I/O, so
-unroll the string I/O operation into a loop operating on one element at
-a time.
-
-[ tglx: Gave the static key a real name instead of the obscure __sev ]
-
-Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
-Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
-Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
-Reviewed-by: Borislav Petkov <bp@suse.de>
-Tested-by: Borislav Petkov <bp@suse.de>
-Cc: Andy Shevchenko <andriy.shevchenko@linux.intel.com>
-Cc: Arnd Bergmann <arnd@arndb.de>
-Cc: kvm@vger.kernel.org
-Cc: David Laight <David.Laight@ACULAB.COM>
-Cc: Borislav Petkov <bp@alien8.de>
-Link: https://lkml.kernel.org/r/20171020143059.3291-14-brijesh.singh@amd.com
-
-Signed-off-by: Sudheesh Mavila <sudheesh.mavila@amd.com>
----
- arch/x86/include/asm/io.h | 43 +++++++++++++++++++++++++++++++++++++++----
- arch/x86/mm/mem_encrypt.c | 8 ++++++++
- 2 files changed, 47 insertions(+), 4 deletions(-)
-
-diff --git a/arch/x86/include/asm/io.h b/arch/x86/include/asm/io.h
-index 11398d5..93ae8ae 100644
---- a/arch/x86/include/asm/io.h
-+++ b/arch/x86/include/asm/io.h
-@@ -266,6 +266,21 @@ static inline void slow_down_io(void)
-
- #endif
-
-+#ifdef CONFIG_AMD_MEM_ENCRYPT
-+#include <linux/jump_label.h>
-+
-+extern struct static_key_false sev_enable_key;
-+static inline bool sev_key_active(void)
-+{
-+ return static_branch_unlikely(&sev_enable_key);
-+}
-+
-+#else /* !CONFIG_AMD_MEM_ENCRYPT */
-+
-+static inline bool sev_key_active(void) { return false; }
-+
-+#endif /* CONFIG_AMD_MEM_ENCRYPT */
-+
- #define BUILDIO(bwl, bw, type) \
- static inline void out##bwl(unsigned type value, int port) \
- { \
-@@ -296,14 +311,34 @@ static inline unsigned type in##bwl##_p(int port) \
- \
- static inline void outs##bwl(int port, const void *addr, unsigned long count) \
- { \
-- asm volatile("rep; outs" #bwl \
-- : "+S"(addr), "+c"(count) : "d"(port) : "memory"); \
-+ if (sev_key_active()) { \
-+ unsigned type *value = (unsigned type *)addr; \
-+ while (count) { \
-+ out##bwl(*value, port); \
-+ value++; \
-+ count--; \
-+ } \
-+ } else { \
-+ asm volatile("rep; outs" #bwl \
-+ : "+S"(addr), "+c"(count) \
-+ : "d"(port) : "memory"); \
-+ } \
- } \
- \
- static inline void ins##bwl(int port, void *addr, unsigned long count) \
- { \
-- asm volatile("rep; ins" #bwl \
-- : "+D"(addr), "+c"(count) : "d"(port) : "memory"); \
-+ if (sev_key_active()) { \
-+ unsigned type *value = (unsigned type *)addr; \
-+ while (count) { \
-+ *value = in##bwl(port); \
-+ value++; \
-+ count--; \
-+ } \
-+ } else { \
-+ asm volatile("rep; ins" #bwl \
-+ : "+D"(addr), "+c"(count) \
-+ : "d"(port) : "memory"); \
-+ } \
- }
-
- BUILDIO(b, b, char)
-diff --git a/arch/x86/mm/mem_encrypt.c b/arch/x86/mm/mem_encrypt.c
-index 94fc818..81f50fa 100755
---- a/arch/x86/mm/mem_encrypt.c
-+++ b/arch/x86/mm/mem_encrypt.c
-@@ -41,6 +41,8 @@ static char sme_cmdline_off[] __initdata = "off";
- */
- u64 sme_me_mask __section(.data) = 0;
- EXPORT_SYMBOL(sme_me_mask);
-+DEFINE_STATIC_KEY_FALSE(sev_enable_key);
-+EXPORT_SYMBOL_GPL(sev_enable_key);
-
- static bool sev_enabled __section(.data);
-
-@@ -313,6 +315,12 @@ void __init mem_encrypt_init(void)
- if (sev_active())
- dma_ops = &sev_dma_ops;
-
-+ /*
-+ * With SEV, we need to unroll the rep string I/O instructions.
-+ */
-+ if (sev_active())
-+ static_branch_enable(&sev_enable_key);
-+
- pr_info("AMD %s active\n",
- sev_active() ? "Secure Encrypted Virtualization (SEV)"
- : "Secure Memory Encryption (SME)");
---
-2.7.4
-