Re: [PATCH v3 1/2] x86/cpu/intel: Fix MTRR verification for TME enabled platforms
From: Huang, Kai
Date: Fri Sep 29 2023 - 05:14:08 EST
On Thu, 2023-09-28 at 15:30 -0700, Compostella, Jeremy wrote:
> On TME enabled platform, BIOS publishes MTRR taking into account Total
> Memory Encryption (TME) reserved bits.
>
> generic_get_mtrr() performs a sanity check of the MTRRs relying on the
> `phys_hi_rsvd' variable which is set using the cpuinfo_x86 structure
> `x86_phys_bits' field. But at the time the generic_get_mtrr()
> function is ran the `x86_phys_bits' has not been updated by
> detect_tme() when TME is enabled.
>
> Since the x86_phys_bits does not reflect yet the real maximal physical
> address size yet generic_get_mtrr() complains by logging the following
> messages.
>
> mtrr: your BIOS has configured an incorrect mask, fixing it.
> mtrr: your BIOS has configured an incorrect mask, fixing it.
> [...]
>
> In such a situation, generic_get_mtrr() returns an incorrect size but
> no side effect were observed during our testing.
>
> For `x86_phys_bits' to be updated before generic_get_mtrr() runs,
> move the detect_tme() call from init_intel() to early_init_intel().
Hi,
This move looks good to me, but +Kirill who is the author of detect_tme() for
further comments.
Also I am not sure whether it's worth to consider to move this to
get_cpu_address_sizes(), which calculates the virtual/physical address sizes.
Thus it seems anything that can impact physical address size could be put there.
Perhaps can be done in the future if ever needed.
>
> Change for v3:
> Take review commit message comments into account.
>
> Change for v2:
> Add a comment in the code explaining why detect_tme() needs to called
> in early_init_intel().
You can put version history to
<Your SoB>
---
version history
---
...
then it will be stripped away when the patch is applied.
Also, for related multiple patches please use --cover-letter --thread to make it
a series. You can also use --base=auto to include the base commit id to the
patch.