From patchwork Fri Jun 16 18:49:58 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tom Lendacky X-Patchwork-Id: 9793205 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 7E1CE60325 for ; Fri, 16 Jun 2017 18:52:43 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 717562865B for ; Fri, 16 Jun 2017 18:52:43 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 65B9928671; Fri, 16 Jun 2017 18:52:43 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id C43402865B for ; Fri, 16 Jun 2017 18:52:42 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dLwJu-000150-Ir; Fri, 16 Jun 2017 18:50:10 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dLwJt-00014e-3X for xen-devel@lists.xen.org; Fri, 16 Jun 2017 18:50:09 +0000 Received: from [193.109.254.147] by server-11.bemta-6.messagelabs.com id 29/C9-03587-06824495; Fri, 16 Jun 2017 18:50:08 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA1VSfUgTYRjvvbvdTnHytik+Li2dmmZtmUIURIg KmVCEVmB/lLe8vME+5G7WsoJhy8yM+dGHjgwxs++i+sMorBAkW+ubchhZhEgEErZIlmLdeZb2 /vV7nt/H8z7wMKS2htYznMvJCXbWaqAjKX5lcrZxZ0ZBaVbX05w1XePnqVxU2H9/ktiCdqgsd rPDVabiX7Tvq5xKd9W4r6nd6FZyPYpkKOwh4eQpt0ouEG5BcH2wmZQLLa4l4Ei4la5HEQyNV8 C7sR+EjHW4CN6dGUYyjsEdBHw+jWUDicdoePA8MGMgcAJ0dF4gZUzhNLgx+EktYw0uBO/IK6o eMUwE3ghHhim5rZXaR8MTMzgWL4bLbzwqRb4QnrSNzMhJvAxu3lspt0m8BHrGzs6kA06CnokJ Wv4C4FoEx9+GVEpmKvhCL9WKKBH6n52lFJwJnRfDtII3QTDUTcj5gFPA79mstA/B5VafWslsU kN74yipFN00BO8EZkOtEP7gVynmQvC0H1Q0ARUM1U3Mut9jaOqbRoohAR6F62bNN1Xw21/diJ b75i3qm1vUN2/RDkReQekiJ+zlBGOOySxYKninjbVYjauyVptsnCiyFZyVNYum3Q7bbSQdxAL p3UV103l9KJ4hDLGabyP5pdpos6N8P8+K/C6hysqJfSidYXBnf02JnrI77JwBNAeWFpRqFwpc BefaY7FKB/ZXCUyUIUZTnirRGrGStYmWCoXyo2R9nOaR7MMywVfZ/9n+nuZrlKjXaZD0J21UJ SfYLM7/+a8ojkEGnaY4XUqJstid/9K/SoMJaXDxy1x5sJOdo/RuhAbOjd5pWSds2tCb8Tw/NF kaevihcF9P9Y6hBcOHA+pfuqvRfUltZdtelxifTu055y7zRpp6TfTW9T+DwvbE83lef35W9Jf iJS182kCEdXVcsKz5RE6sl3BlvP++y1wU//jBeNOiBu+liMAx3pFSN9Lm4dc29NKdo8FJnPSx KttAiTy7KpMURPYPuzW6CpUDAAA= X-Env-Sender: Thomas.Lendacky@amd.com X-Msg-Ref: server-8.tower-27.messagelabs.com!1497639005!97800094!1 X-Originating-IP: [104.47.33.50] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.19; banners=-,-,- X-VirusChecked: Checked Received: (qmail 31678 invoked from network); 16 Jun 2017 18:50:06 -0000 Received: from mail-bn3nam01on0050.outbound.protection.outlook.com (HELO NAM01-BN3-obe.outbound.protection.outlook.com) (104.47.33.50) by server-8.tower-27.messagelabs.com with AES256-SHA256 encrypted SMTP; 16 Jun 2017 18:50:06 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=fS99r1bRt+7Tpk6AZREkggB0nGfHqnD4+DDwr3scHGA=; b=fnP5JeB+cbd7FBlxuKUZ0bEK1Wfg06vP/GesWvn04VmXtvgOoT8nLu/33zeTZPHqQc/Y8LmNvCsQPC3bW9F0KuJmuKvT5slPKvFJoWWojI54iNLq5PTYw9Z37HJUinH+N8eXCSvYMLXuTMECjgVllghoYbVDvPqHV4sNjowWsIY= Received: from tlendack-t1.amdoffice.net (165.204.77.1) by CY4PR12MB1141.namprd12.prod.outlook.com (10.168.163.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1157.12; Fri, 16 Jun 2017 18:50:02 +0000 From: Tom Lendacky To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, xen-devel@lists.xen.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Date: Fri, 16 Jun 2017 13:49:58 -0500 Message-ID: <20170616184958.18967.93012.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20170616184947.18967.84890.stgit@tlendack-t1.amdoffice.net> References: <20170616184947.18967.84890.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: SN1PR16CA0032.namprd16.prod.outlook.com (10.169.34.42) To CY4PR12MB1141.namprd12.prod.outlook.com (10.168.163.149) X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PR12MB1141: X-MS-Office365-Filtering-Correlation-Id: 772dfd9c-c228-471d-fe77-08d4b4e87ff3 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(48565401081)(201703131423075)(201703031133081); SRVR:CY4PR12MB1141; X-Microsoft-Exchange-Diagnostics: 1; CY4PR12MB1141; 3:nxj+XGL0To90KEVdZFwMlk4RHOIL8t37GLQRYXD1Tykxz32dCxWu8SL1j0dagyp/BIrL9tA7wII65kA/66uNUEquk9xIduZfLKzCsJRMC9S2ehUsoJxtHsg03mAODF68YsKsFtfTkHCygWHvAP828LyoPovAn5DxtvvlLBmCnSwnPXOhCQz0f8cKvrx1X7F2WowKHd/043We0ibW1dHnufTsQt1PI/XQ27RZi89PWABZ9hsYdwqycya+P8aCR5JgvPg+60z8Bcf3f1OfkppzHru2aypBY6mwgKwJuHPj7bshDlVizG/rP+A+Y+IMvjRkHvC7xyKHerVeaIKgr1ICNaqfLCbVFaHP88pD/WU9G+Y=; 25:CCykfBYHam/9wty7kxDxzfgayxbx7nagHGw4nwPDopLfOCtAGuC6frD7H+3kYl5PDXikuZpkch7W77OKqfebpmiLD1s6B2iHLOZY5I4yaS8UHZTvSNE+xFy2ImjZIm3eA1d3eA4cddcRR4K7rgWOf1DdbRJTzY/dh3nGHRkCGf9nXMvIxLj/g0EUTHC5uUigNtAe4pD5dpJuHT8CLmut2zFm3IBmNKpoS8nMXVIY7ZtqY2RoNJigEh+pjS8PyXScWvFy4nM/mqaI9sqnKkdmq8KcMnAnerQxFOSzTQPnNUufvxgjnvZM1nGLlFm4B4i4aMhjPwXX+JrbnQHoK+sQL9DcjDhLR/wOlubaEuiUPF/n2T2zAo/En/lL0no3ZZBJ1Bz8emBj/JYPtGKITcaDtd5o6fOGXt89p/nuSimjEKBpWnPbyhyYUjsUZYY48Clu0xsGb4mNb1RdXsjR5jQ5YyJH8JKkEkOz9hWUhot1BjM= X-Microsoft-Exchange-Diagnostics: 1; CY4PR12MB1141; 31:tiuwnBzury0yAiXGU+elDt+K9Uwll0qH6g54v8f2tMYfml2Ng3J+5V5zteLiIMtZlpxWmV7uYZzCzS1hXF5S81CJ53QYxMxa6UC5U2RkYo7u9962c1KKcgWR0xcz2S+aXh4mJHLRsN+QooTg+chz0GZPCARWRTgZiH/VViVSto5xb3dIVMB3BcIlZoHromiNttxWcCcvlydASKULfEPAZQuIgbvNbXZ/dCWKHFZSaAI=; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(20558992708506)(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(100000703101)(100105400095)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(20161123562025)(20161123560025)(20161123564025)(20161123555025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CY4PR12MB1141; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CY4PR12MB1141; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDWTRQUjEyTUIxMTQxOzQ6Zk1EOXdseC9FK05yOWFjSkdtRXlHNGZMcGdP?= =?utf-8?B?NW1TZ3VOUDlyRUk0c25sMEN3VFduQWd4c1FPa1pyeENBY2dNVGRIZy9Qc3Bi?= =?utf-8?B?YlR5V2hGbzc1SnZiNll2RFV6cjRXMVR0c0FiYkI1RDNybHc2bi9BQXBZK0dx?= =?utf-8?B?UEppaXVDOTBDQ3l3WjY3ZFpwZ1JqTXkxZVlJYkR4OXBoSlRwd29CRmI0OE9t?= =?utf-8?B?VFNmaStHay8wWlNHb2l4RVV5dHJqeTVZSlBlNHVkZ0JxeG5UMUJRdFdBVXRK?= =?utf-8?B?N3dPYWFaWE5mdDZtNFNMZktQc1JnSHZ0WXJGTDNHQXNuNkJySVFlYk42RFcv?= =?utf-8?B?Ly8yUlZSZzhFVmtCaEp0eFlCTXpTTC8zMzRYN1o0ZkdnckIzQnhHZTlIT2JK?= =?utf-8?B?NmFhQitVUXU0WXA1QXgwYXpYd1NFSERWcDJaeEYvYnIvOEdEcXVWS2tSUjVq?= =?utf-8?B?RHhiY2UrQnVxZFVHYWpLZldHUmhsUHhXYUhlLzdNTlQ3cHQwQVhhRjlEbzJ0?= =?utf-8?B?bDg2TU1la3hQWlY4dTNlRlFNay9EOHZhVWc3ZWhrOTJkTW8zenl1MEJ6TFB1?= =?utf-8?B?TU9qazlOc0JsZlo2QWRCWmx0WWo3L3VEV1NNaG1xQlhSSmdzMVFtcE9JRVFS?= =?utf-8?B?bHdaa1hKU2Y0RVdxUDBtOXQvczVmbHI5Tzd0WjRyT3dtcVQwUWpTWGFabXpl?= =?utf-8?B?N3A2a3pOdnoxcnZOUFQ2TXZMWHdEZlpUSktQUVFKcUlubGtsd1RCV2w1OFds?= =?utf-8?B?cTZad3Q0bUhZalZrclJOVjJRS1hscU5lcXFGNldZWW1CbEZZSVFBMzUwZ29r?= =?utf-8?B?VUNsbm1TYndzSG05TnEvWGthaUd3SWdOeUlPSWE3dTYxYUZnemVCY01nRGc2?= =?utf-8?B?NVJwelMvT1k5SjZjVklmd2xGb2NrV0MyZ0JCRC9wTU95TGU5UGJtZm5MRG9L?= =?utf-8?B?dDhyUnF6c1hmQWZ2MFp3THZ1U2xFQzZ5U0Uzc0IvOE95aU9VT1hHbFVtLzNI?= =?utf-8?B?LytpcURTUy9PMzlhOWR5L1ZGbnMwK0ZhN0w0a0dkc2RrU0lwSjF1U3N6RFF4?= =?utf-8?B?a25ZaEdwRDVHODUwT01BYWNzRU1ZMGVEa1ZHdElIYTYvd1U4eHoxSERpN1Z1?= =?utf-8?B?c25OYWlCNHdSQ0VIQUxjQlVOZUZpN2JpVmVpUEpkZ2NRZFNEbGtrTUI4ZXdt?= =?utf-8?B?dmlxSnNjbjhLNnZDN2FBcFNkNVlIWVV5N09MbXpreGtjM2c0bkVTajdubDRV?= =?utf-8?B?cEFZQjdFMUdrbFZOZTdJOVgyZlNkam9TTkJzNEovREl6dDFpeG90ditITFlm?= =?utf-8?B?QkZFODZ6QUtHL0U4RzFLOCszbDFzeklDWDdJSXhpMmdWTWh1bEZRZjFFQ2k4?= =?utf-8?B?RlR1d3lzSms3TFdwYXpnakpvZnBqSFF2MDZZVHdmc29ibVlGRis3aWlGc1B2?= =?utf-8?B?cDR5TitHeE9yY3k4YjZjVmRTMlZCU2U5VWMwYlB6eGFlcFhqK2c0WDZIOG02?= =?utf-8?B?VnhnUTZiNDhOWnJIcjdmZVQzN1F0QmhQVThiZURhQklHWjlpRmRYMzdyd1cw?= =?utf-8?B?bFF0elAxZWFEbVFsemxYRDh5SHlBUkh6NWhOTnh5TisveXZ0dWJDcW5KbWZq?= =?utf-8?B?ZTBZSVd3dU1pbldwd0dtWmovYU95K3FzUjN5RURGRlJjNU9UYldGTExzZzhY?= =?utf-8?Q?sP7CnrId3DQ62YQ6E=3D?= X-Forefront-PRVS: 0340850FCD X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39450400003)(39840400002)(39400400002)(39860400002)(39410400002)(39850400002)(54356999)(4001350100001)(50986999)(305945005)(575784001)(86362001)(76176999)(8676002)(81166006)(6506006)(7736002)(4326008)(189998001)(83506001)(25786009)(5660300001)(1076002)(6666003)(230700001)(9686003)(3846002)(6116002)(47776003)(66066001)(2906002)(23676002)(33646002)(103116003)(2950100002)(7416002)(50466002)(54906002)(7406005)(110136004)(478600001)(38730400002)(55016002)(53416004)(72206003)(42186005)(53936002)(921003)(1121003); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR12MB1141; H:tlendack-t1.amdoffice.net; FPR:; SPF:None; MLV:sfv; LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDWTRQUjEyTUIxMTQxOzIzOi9yckd0eE1TOG9jRmZVeWVJVjUrSTdVYlV4?= =?utf-8?B?U1g4QzUwUmZPWGtpUXJ4WEhBRjFaT3FmY2VGRTFpZ1pUL0I2RlNLV1ZyenNa?= =?utf-8?B?c21NeUdSVE8zdXQvdXNUUFphR0llaEtja21GWnJaNVNlbXNZRlFCK0VZdW80?= =?utf-8?B?ZllVZUxIb01JV1BwNHQrNnhuWnVTYnI0SG9YRTY5Ti9XU0Z4dnVVMUpaSkFU?= =?utf-8?B?MEtIOVA5Q2h2Uk9RSU4xdVBOcmJKRUliNStTbngydDc2ai92MmZ2c09WMGgx?= =?utf-8?B?T0pRaVp4cTZYdWpra0tiQ2dHQ3hiU3lSTXg2bkt2VmcwNk1lTkVubGVzb0FR?= =?utf-8?B?U2VSczY2eWZMTlRzQVFsN2xlVitaTWlkWE1FZGNvY3YyV3JSYThrOW12L1RL?= =?utf-8?B?QzhIZlVNcFZrdDhLOWtHNlZBZDF5K2wyUWVGWEpFd1RWSVk0aGhJKzNLQ2FI?= =?utf-8?B?cjlJOHRlc1c4U01hVTRNN0JLZHdpNGJFWmhmbDBvVGNVc0N3SHUrQW15aUx4?= =?utf-8?B?aXBSSHB5OXpvTDhhSGpNeWdxRndRQlFPNXkxOVJVWkFKcyt3OEMrd3ErV2xX?= =?utf-8?B?Zys5eE9WTGpKY3lNWjgyZ21HbnhmN3dobUxqR2xEVnFNZ3FXQjJCbytISE4w?= =?utf-8?B?NkdmRHE2TlF3MnJrS1ZhZUxYTTQ2VDlGUHR3bmN5RWo0STJ4YlB0aHFxNHlR?= =?utf-8?B?N0xmTVN1cm5RTUZsaVBBdk5OaGQvekRYZXNIVnRPR0dqMTZZdHFYczJ4Rnk2?= =?utf-8?B?TzkyTDRGeGNOR2JkNWpZdUxwdm1hSzlBWVIvRk4zWEF5S0ZwdDBJT3doM1o2?= =?utf-8?B?U1lmNXVNNENPc1NjUCtxKys5UytBSGNmNzJMRjY0c0pDbm4wQmRTdzZiM3I0?= =?utf-8?B?K2lIOUt2ZHZPZWJDcmEvS1YrS09xSVh4L0NBMDlsTTFzdXNTR0ZwaWZBNjN6?= =?utf-8?B?cCtUdUlodVFsVDNrOUI1V0lVNU1PeGR5WjdCdW91ajB1MUd5dkpjL3h1MEhy?= =?utf-8?B?SzFLSHJLSE8xUzlMVFVRUXZtZXJpd1dIbHM4S3ozRHhRQUVYbURJTFJTS1V0?= =?utf-8?B?UTY2VEJoeU8vY3R3ZFlWN01CbFZzdTk4VHd1NDdDU3dGaW1aNkRvKzNZeXRj?= =?utf-8?B?WVNwREtkd3RhZTR4eFZVajVVQVFtWm5oY2tTKzlwUjN0UjdjQXBjc2xKblBP?= =?utf-8?B?dGhVZ0lteTBuSEJjQTc2YzIyWVZOdnBVSVNHcThHekVMaDJKYlgzZTZnSExo?= =?utf-8?B?WnRzSDRIdHNEcitXOTFSdy9tWjhOYXhTRjB1MjdOaDdqbGRFenA5Um1pSkQ4?= =?utf-8?B?Rk93cDFNV3Jsc1VEb3lFSFRzQWxyTEo0VXBBL21tRXB5K3FIU3gvSGNlZXpk?= =?utf-8?B?YXhQOE1CU2lzU0dUdmNHNktvYzMyb2k3WnB2cVl0bEZIMWF3SUl6QzV4V09h?= =?utf-8?B?dytidW95eHpqOXVBVXhNZkk2K2FIelFLTTUxMzY2NXVxTXcwYWoyRm5TQVhw?= =?utf-8?B?OTluYndqbmN4TWZTd0VCWXNjRHN4MXNKSkwzSmpyKzRFc3NVZmhaN0cwWEtR?= =?utf-8?B?RVNXSDhPanNhSm1KZUVaRmlmZ2s4alp1VWwxMGVVWllxYkFNSFMyUGZXKzhu?= =?utf-8?B?WjRjOUFKRnpQQWt2clpFR1VlQ2RFNWRuUHRxM1cxSXpORGkxa1ZlQVB5SHRG?= =?utf-8?Q?KKCAdcfITw2+i9jhIGZ42xgRjLM02QD8HXnNGgP?= X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDWTRQUjEyTUIxMTQxOzY6YzM1VldrSk1GMWxsS2g0a0l3RlVWQkQ4bm8z?= =?utf-8?B?WURZQTFpd1JYdmVtOVVvSFE5SzRuSHZaQkk3bk43dnV4V3B3WGJWSy9iWmtF?= =?utf-8?B?cDNqS2FPaHNjZlNaNll5aEJwMnordk5pSWJmVldZR1VURU8zd3JLSEw1SFdJ?= =?utf-8?B?aUllcC91M3BhRDRNL01zL2ZpNGlVdjdWbk5XdWY5NldlcTFjL1R5N0FaSWhl?= =?utf-8?B?akdGVzJ4WlBiWUhRbmphRHBEQXpQLzRydmZMSEt2QUhlZTlhd1FTNjFDREkv?= =?utf-8?B?M3hmaXF5SlRNYldlSFZ0TXhoN1ZOZGF3K3Q0bjFYQlh1MityTVoyOUdhQ010?= =?utf-8?B?OU12Q0E5SHg3N0hJZEUrbVpwVk9wb1Y0aFg5MHBiYkcrTmV4NzlPblRRWEJ2?= =?utf-8?B?Y0hBZEdQeXMzUWNMVkprcCs3WkQyM25UZkR6eENuZEdMR1gxRndYVm8zckRO?= =?utf-8?B?VEFsSUdHbG5wNTA0WVdwUllxeHFOaEM5Q1d3ZFJMd3F1SFYyNEx3cm9aODlT?= =?utf-8?B?a2g0aVQxMCs4SjdKM3BjK2pheS9tRDgxczFmYTVmWW04eVdlWEJUa1piVTRi?= =?utf-8?B?dGZzQXppL2dGV3VFeUxHZTB2VnhCNVFsdzU5NWl5Kzd2K21HV2VISVk3Ni9x?= =?utf-8?B?T3BTcWRoOG54a1pncnExZnZWNHM4YndqZ0RZVkJjZUdJS0tUS0JWOEpsMS9m?= =?utf-8?B?WERYdUdYaU5kZFJnenhwNDZwUldrOUxLd25CTVI1QjlBT2VMMFJMWkNzUXY1?= =?utf-8?B?VzJ3cHJGalB2QjI1V252SXRYTlptZEo3c0w1SGIraU5QQXhuRmFvemkzN0cz?= =?utf-8?B?QmI4TUNHU2ZqMzkwOUJwMjdxdXpSYzFvdlMrU2x0ZXRwUkVlL2hyUWY5QUxK?= =?utf-8?B?Y1p2S2RwZ0c0SnNDQ1Uzb012L1MwZE1kM2Mzd2RaU2dlSXRyc0JybUZXeXdp?= =?utf-8?B?aWE4b1ZNTlV3K0F5K05oUDVWL0VuT1lmWEhuUnRVNEJjMmkvZXlsTUVCZEk5?= =?utf-8?B?N1JFTWN0SFJlNm9kOVVWU014MFlYdFhOWFFudTJ5aTNsS1JsRGlMdlM2MWxx?= =?utf-8?B?NE14YWtlQ2lNNkdHcDBMYU45Tmg4WjQvYkcvaUZSSnlTSHRqTGVkSGt2ekNo?= =?utf-8?B?VTFZaUtlL2pFS0M4eHV3L3hvaGpKLzNoU1dOaTNBRHcvQ1F6b2EvMFpJWWJo?= =?utf-8?B?NFJPQUZ6cktaaW12MmxtZUZWNWVrbmN0Q1ZUcnA0SzY5dWdsN1dUeTJPblNq?= =?utf-8?B?WEVRUjF2ZXhRUURkS3NyV2JPOXNrUG9tMkF6ZTdWWnNCejJadDc5a2R2MmJv?= =?utf-8?B?QStneXkxNCsxMkt6alVMbFZaQWtZTHkxU1RnQVBndElPRlJVUXpKMmc1VzBp?= =?utf-8?Q?3AH03RS?= X-Microsoft-Exchange-Diagnostics: 1; CY4PR12MB1141; 5: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; 24:cEnrDn+NXC4KK+9XvN1eidaO6N73w2UfdyQ4tXjwCoN5kh3zmbuEr1zYwvdfKn+ODNeKtukwPwN7bIDf1i/+DpcDb6Cn4GwMoua14oDis+o= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CY4PR12MB1141; 7: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 X-Microsoft-Exchange-Diagnostics: 1; CY4PR12MB1141; 20:nFovgFmTgi0wFMlBJJCsYgJGEWUctli2oo5iFt4ouRroBjkkmvvY1dwpYKiPW+yeg1hkuxnfOw54rU3UlShaAdxzrT9owDwhHLBh7gx94fgmDCcWTVfS0B8jr2otOVwb86HsW2tk7M6PgntZUgQljYrXH156fqQomwp98Waa9E4uejfFVmQhGKzN3PEYTOnEztXE6+sdTGWbdBEGHRTWNWJnN7gby0R+xmODCyMsAtb1dYPrA8MUfFfuLm8ssOdw X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Jun 2017 18:50:02.2228 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1141 Cc: Brijesh Singh , Toshimitsu Kani , "Michael S. Tsirkin" , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Boris Ostrovsky , Jonathan Corbet , Joerg Roedel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Larry Woodman , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , Juergen Gross , Paolo Bonzini Subject: [Xen-devel] [PATCH v7 01/36] x86: Document AMD Secure Memory Encryption (SME) X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP Create a Documentation entry to describe the AMD Secure Memory Encryption (SME) feature and add documentation for the mem_encrypt= kernel parameter. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- Documentation/admin-guide/kernel-parameters.txt | 11 ++++ Documentation/x86/amd-memory-encryption.txt | 68 +++++++++++++++++++++++ 2 files changed, 79 insertions(+) create mode 100644 Documentation/x86/amd-memory-encryption.txt diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index ee5c65a..9edc0b7 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -2197,6 +2197,17 @@ memory contents and reserves bad memory regions that are detected. + mem_encrypt= [X86-64] AMD Secure Memory Encryption (SME) control + Valid arguments: on, off + Default (depends on kernel configuration option): + on (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=y) + off (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=n) + mem_encrypt=on: Activate SME + mem_encrypt=off: Do not activate SME + + Refer to Documentation/x86/amd-memory-encryption.txt + for details on when memory encryption can be activated. + mem_sleep_default= [SUSPEND] Default system suspend mode: s2idle - Suspend-To-Idle shallow - Power-On Suspend or equivalent (if supported) diff --git a/Documentation/x86/amd-memory-encryption.txt b/Documentation/x86/amd-memory-encryption.txt new file mode 100644 index 0000000..f512ab7 --- /dev/null +++ b/Documentation/x86/amd-memory-encryption.txt @@ -0,0 +1,68 @@ +Secure Memory Encryption (SME) is a feature found on AMD processors. + +SME provides the ability to mark individual pages of memory as encrypted using +the standard x86 page tables. A page that is marked encrypted will be +automatically decrypted when read from DRAM and encrypted when written to +DRAM. SME can therefore be used to protect the contents of DRAM from physical +attacks on the system. + +A page is encrypted when a page table entry has the encryption bit set (see +below on how to determine its position). The encryption bit can also be +specified in the cr3 register, allowing the PGD table to be encrypted. Each +successive level of page tables can also be encrypted by setting the encryption +bit in the page table entry that points to the next table. This allows the full +page table hierarchy to be encrypted. Note, this means that just because the +encryption bit is set in cr3, doesn't imply the full hierarchy is encyrpted. +Each page table entry in the hierarchy needs to have the encryption bit set to +achieve that. So, theoretically, you could have the encryption bit set in cr3 +so that the PGD is encrypted, but not set the encryption bit in the PGD entry +for a PUD which results in the PUD pointed to by that entry to not be +encrypted. + +Support for SME can be determined through the CPUID instruction. The CPUID +function 0x8000001f reports information related to SME: + + 0x8000001f[eax]: + Bit[0] indicates support for SME + 0x8000001f[ebx]: + Bits[5:0] pagetable bit number used to activate memory + encryption + Bits[11:6] reduction in physical address space, in bits, when + memory encryption is enabled (this only affects + system physical addresses, not guest physical + addresses) + +If support for SME is present, MSR 0xc00100010 (MSR_K8_SYSCFG) can be used to +determine if SME is enabled and/or to enable memory encryption: + + 0xc0010010: + Bit[23] 0 = memory encryption features are disabled + 1 = memory encryption features are enabled + +Linux relies on BIOS to set this bit if BIOS has determined that the reduction +in the physical address space as a result of enabling memory encryption (see +CPUID information above) will not conflict with the address space resource +requirements for the system. If this bit is not set upon Linux startup then +Linux itself will not set it and memory encryption will not be possible. + +The state of SME in the Linux kernel can be documented as follows: + - Supported: + The CPU supports SME (determined through CPUID instruction). + + - Enabled: + Supported and bit 23 of MSR_K8_SYSCFG is set. + + - Active: + Supported, Enabled and the Linux kernel is actively applying + the encryption bit to page table entries (the SME mask in the + kernel is non-zero). + +SME can also be enabled and activated in the BIOS. If SME is enabled and +activated in the BIOS, then all memory accesses will be encrypted and it will +not be necessary to activate the Linux memory encryption support. If the BIOS +merely enables SME (sets bit 23 of the MSR_K8_SYSCFG), then Linux can activate +memory encryption by default (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=y) or +by supplying mem_encrypt=on on the kernel command line. However, if BIOS does +not enable SME, then Linux will not be able to activate memory encryption, even +if configured to do so by default or the mem_encrypt=on command line parameter +is specified.