From patchwork Fri Jun 16 18:51:40 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tom Lendacky X-Patchwork-Id: 9793245 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 4476460325 for ; Fri, 16 Jun 2017 18:54:14 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 36B9F2865B for ; Fri, 16 Jun 2017 18:54:14 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 296B528670; Fri, 16 Jun 2017 18:54:14 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 016E02865B for ; Fri, 16 Jun 2017 18:54:13 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dLwLg-0001pi-55; Fri, 16 Jun 2017 18:52:00 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dLwLe-0001os-BH for xen-devel@lists.xen.org; Fri, 16 Jun 2017 18:51:58 +0000 Received: from [85.158.139.211] by server-3.bemta-5.messagelabs.com id B3/D3-02022-DC824495; Fri, 16 Jun 2017 18:51:57 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmphk+JIrShJLcpLzFFi42LJ0Fcz1D2j4RJ psGeeqMWSj4tZHBg9ju7+zRTAGMWamZeUX5HAmtG9cAtTwdpuxorH94QbGP+UdzFycbAItDBL rDpykBHEYRSYzCix9vokZhBHSKCVSaL3/FmmLkZODjYBHYlrb7+A2cIC4RL3zs5mAbFFBBYwS TyaJgDSwCzwlk1i37kzbCAJJgEZiQWLljKD2CwCqhLfdm1mB7F5BTwkLq4DqeHg4BTwlGi9Bz ZHCCjc/vM7mC0qICex8nILK0S5oMTJmU9YQMqZBTQl1u/SBwkzC8hLbH87B2y6hICCxPbv39l ATpAQaGOU6H7VBDVTRWLW5wvsEEWyEkfPzmGBsH0lFv/vYQeZKSGgLHGqxQ8iXCtx88MyFog5 E9klFmz8xwqR0JJYc/oxM0RiGZtEV8ddqKE5EhOv/YEaaiHRvfAPI4R9hlXizucEiIYJAhJvj h2AKpKROPCzgx0isYRV4t3X7cwTGLVnIfl0FsKns5B8uoCReRWjenFqUVlqka6pXlJRZnpGSW 5iZo6uoYGpXm5qcXFiempOYlKxXnJ+7iZGYJJgAIIdjF/6nQ8xSnIwKYnyvn/iHCnEl5SfUpm RWJwRX1Sak1p8iFGdg0Ng0dGmYCmWvPy8VCUJ3gZ1l0ghwaLU9NSKtMwcYBKDqZTg4FES4U1R AUrzFhck5hZnpkOkTjEqSonz7gXpEwBJZJTmwbXBEuclRlkpYV5GoJuEeApSi3IzS1DlXzGKc zAqCfMGgUzhycwrgZv+CmgxE9DioAsOIItLEhFSUg2MRSs4ZfbuevnOxfGq7yOne7f2dwo0L5 p717zF7wXjEpFca7OmKVt78z20H0Y115x8+GDV0+Pyyz1LOOcc6HC9zHPjXeyJ1fqJWYesZpn s2uNxqnCx8pQfcqtm5QlmBPRNL2Fqf7nr9Qbz7hNPdZ+GzpCf/9x0bX/rusMNE106dFerJJ15 xt1+TImlOCPRUIu5qDgRAIcubaaXAwAA X-Env-Sender: Thomas.Lendacky@amd.com X-Msg-Ref: server-2.tower-206.messagelabs.com!1497639114!83191081!1 X-Originating-IP: [104.47.38.49] X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG X-StarScan-Received: X-StarScan-Version: 9.4.19; banners=-,-,- X-VirusChecked: Checked Received: (qmail 10602 invoked from network); 16 Jun 2017 18:51:56 -0000 Received: from mail-bl2nam02on0049.outbound.protection.outlook.com (HELO NAM02-BL2-obe.outbound.protection.outlook.com) (104.47.38.49) by server-2.tower-206.messagelabs.com with AES256-SHA256 encrypted SMTP; 16 Jun 2017 18:51:56 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=gUScnrHak6gcev2g8Y/qzbz4WaAssrr326JDQ62vuWs=; b=Ebn1YTI+R6ElIrsPVrWLTCmxJ2YfeC/d+2RelHmA6PnIlbXt6jOmMU1UGYPgIod+/XCZgpTLb6vUHtqI/SRnw+eJwUfwEn0AvO1JlbSpY7fmpRqWjN5NZ1e4Ls96rNW/9y7hBwQGF7CCSX0/r8mnlFPbRJXvYa9vjitXA5Y6hzo= Received: from tlendack-t1.amdoffice.net (165.204.77.1) by MWHPR12MB1152.namprd12.prod.outlook.com (10.169.204.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1178.14; Fri, 16 Jun 2017 18:51:44 +0000 From: Tom Lendacky To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, xen-devel@lists.xen.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Date: Fri, 16 Jun 2017 13:51:40 -0500 Message-ID: <20170616185140.18967.61905.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20170616184947.18967.84890.stgit@tlendack-t1.amdoffice.net> References: <20170616184947.18967.84890.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: BN6PR04CA0054.namprd04.prod.outlook.com (10.174.93.171) To MWHPR12MB1152.namprd12.prod.outlook.com (10.169.204.16) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 36455d73-69b0-4ffa-4fc9-08d4b4e8bf02 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(48565401081)(201703131423075)(201703031133081); SRVR:MWHPR12MB1152; X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1152; 3:Qk1wnGt6MmaH371nXKQV2jWb/sfEQEwHdTiJAjD0ICIZuWfooPiDbl+8/FSdxmvldBF7M3QtyEcig78fCnvt9zounPfJCeu7b3Od7HWxLG+sRH11L/YTWJRX6PgQqOoofTQIh9OYMlDLtKqTgcjUur5mi4v7Nqw1sy6lcmENrn1gzlKQitUhDI2JfZ3pBW+RPYk5rrJgIWkgFAYAeU7Is98p6dDq5aZ5cXm5/ne6dNdOHywPCqQ1fuLZUyB2tALHRRcrWXbkdccXVzYuXt8lQ69coI7HzJxck4yzsqKuX7gCwnk22fNlWbvPL6hE+kiYt+Lh5VBVd40p47X+BNHF/HaxS1ZjbZOYy8I0Vv1dUsU=; 25:DiAMWu2wWP0DHO3dnaDVR3D6P8i/sDSMX3iYLSXKcDzP3gcxRK9NQzR2FJOLjUb++sOHXte/XhjC3wgEooURipVtcbqKKc2qQgkGPa8MNG7KNQoP3s4S+sqrQ4NzQiMIGSNXWaCmMehrwxKdzf9Vv13k/F7936/lXKYiGDxD8AUtlwc4CzxKyYp303Ttr3k/+bCUbkRuz0jlVidh/r9SPBGKaDDU7F9cNbTo1TPYi0bs8tkf4zq2ONX1p1V0PpWg/bu/CN9nJ4JnVE4YIfEm91F5Chl8FfeqcL1eCX40lP0KphpCL7BuvrMqfWreKCcZoIjsjFNWtISqScHE8xq3iISRTti4/4pYAXKYCzlX9FTQ9RzMygvwmhqgPhS39A1X17+sLDpTDUy0VqadtM4TyFL2s/BGiQFzA4Z/j45XEfS7mScilcB2rUVMu0YhJbkU2x1cR2pb08BIMDsFWyMufS3F9WLaRRkxz/BL2MEcbso= X-MS-TrafficTypeDiagnostic: MWHPR12MB1152: X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1152; 31:D4ukCOlIGbXOziarOyVZWGLKvG/NGjjqh2R8R9Mx+qbYz6fcc3Qe1xC2JaR3lF0SoL6z7QmiZZDlmx/JxIk6AfrxpSzvIua5k+UtjDLdxsLpfqT8is9FORRE7UHxQhq58Z9mCT1kBxnbcWT8nD4Hg2yCiNLXEBOftnkV/BTZMqWIfQsoSjDNCK+xRLVRNQc7HG7xws/cyuwISBHoHPkEFb/fpn46+5/swJSZsJPEyAc=; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(100000703101)(100105400095)(3002001)(6055026)(6041248)(20161123562025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123560025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:MWHPR12MB1152; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:MWHPR12MB1152; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtNV0hQUjEyTUIxMTUyOzQ6UnNtNUY5TUlaUThGdURKWTBMOEhRZUQ0aWZQ?= =?utf-8?B?Y3p0ZWJPSlBSQk8ycE9ScHdLZWpHREgwd1duSm4rZlpEeHRSbTlkWWZrT2tG?= =?utf-8?B?azVCRTEwQmIrN2RTWitOUm9IOC9veTBoa0huaU11MXRDbHFSU090eS9JMzNQ?= =?utf-8?B?Rk9nQUl2bVJDMTd6Ui9zZi9Fck5udnJPZFdlYlcvTzYvQ1FPNlZLSm9valV2?= =?utf-8?B?UUhYTVJXaUlid3NaSUN6QWw2ZU1jUWR3SXdKZVlaN284Sm12K3p2ZE1KNGNu?= =?utf-8?B?UlZlazRiZS8wZVJwS3NzUDJSdkdDR2lva0xYMFY1QjRYcmJiaEpVQ0RqT25w?= =?utf-8?B?NWlwRDZ5Q0RRc25EbVlZYS9acDZBc0pnL1o4bldmT2Y4OWVySlg2Q1FJRURV?= =?utf-8?B?VUs3aUNFTThVMWRyNHpmdjJERnQ1WElnZTVIbm5oV1RWaDR0ZVF1KzAzVDRy?= =?utf-8?B?YTZaeXZKejNBNW9sdzM3VlpUc0Y0R1ZGSENUNmwrRTE0MTdTZVc0UW9US3FT?= =?utf-8?B?RzRVNk9nZmpRRnJ2cG44TU94STJGdERHeldiOXV2dndSVU0vNGlNditxbzEx?= =?utf-8?B?Y1lQWEMweTFhSEVpbXNjN0Z3R1UrUXJzNkZVWkdTV3AyYWtkbHU4ekJnSW55?= =?utf-8?B?bCtsT1JKRGo5c25LaWNHMmV4U3drSjhMdHFkMVZ2QlBkek9VbkozWHdGUVBi?= =?utf-8?B?ZEs1NC9pR1Fwa1ZXelZKVHkxVzJkQ0crYjg3ZFovZ3V4UWdrSlpkYXc2UG52?= =?utf-8?B?emVwTVJ5d0tJY01tTWZyUkhBaWc5UUcrZnFqUnNSVGJqck9ZN1hpSE1ucXc0?= =?utf-8?B?RVU4alRKZ1BGeHdhOWpDQ2NWN1djSDJIN2orNTMrSzBTektRWU1RQnBpVDky?= =?utf-8?B?bXpIYTFENllDUHVUWFpucmplUW9TQjgwcmordFIrNkQvZGw3Z3dyVjVia05W?= =?utf-8?B?S0dLYkdIVnl5c1lpcStrQ0tMd1ZhR0RwU0NDT2hxdGl1NXhhdzdqS0VuVjl0?= =?utf-8?B?OTRHWVVDd2xzNnAwVzZqRndNL29CM3ZlNHJoL211K0U2NE1yME5JTCsySnhE?= =?utf-8?B?Z2FkU3pwblN6Y09zeDRyclJNajlPOTQ3dS9YZkJRWjlmWVZ5Zng1TVdwTWdv?= =?utf-8?B?L2tiMUYzWlN0V2xYUFJIb0RQQzhnaDJxT05iTVBjRlBoY042cjJ0TFc0eXow?= =?utf-8?B?TlF3TVd4bTRjaXl6VEYzbTlqTzhDdVcreVJDdE9JWEJKSjRyK0VWTUd1QW1R?= =?utf-8?B?enVCVTI1RkE1bHZBSjNPblFJMzdYaTZIdnNmcjdtWjF3NVFvcWMrMkM3ZTdu?= =?utf-8?B?dDlBSDExU0NJSHQ4ZXZ2RGN0aStuNXIzcWRCQ2pmWDdUbHdnSWVRcDExL3Qz?= =?utf-8?B?bFZzVzhoOVVZUlFoRGNKMzhCN2N2RmFGTXdIaHM1dGxHVDlpYXlIWW42L0p1?= =?utf-8?B?MzZ4QUNSVVFueHMzb01qeThlRHNiWWMwNkRWa09YK2VtYTh4enZ4Z012dS9N?= =?utf-8?B?NDVRT3V1Q1hIeVlLT0FjUUJmd2M5Nnc1Qi9OT0E0UW9FcFNSSE9ta3pSQndk?= =?utf-8?B?QUFzb0FWUE1xNUl6K3kveGxkOXB2Nk12VmttZkN3TnU3M08yMWl5YjlnanVz?= =?utf-8?Q?qKt8PRZYC6f9zqFvNHm?= X-Forefront-PRVS: 0340850FCD X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39860400002)(39400400002)(39850400002)(39410400002)(39840400002)(39450400003)(47776003)(53936002)(6116002)(3846002)(5660300001)(189998001)(7736002)(53416004)(103116003)(33646002)(1076002)(66066001)(42186005)(54906002)(9686003)(2906002)(110136004)(38730400002)(76176999)(305945005)(54356999)(50986999)(230700001)(72206003)(7406005)(25786009)(8676002)(83506001)(86362001)(23676002)(6506006)(478600001)(55016002)(6666003)(4326008)(50466002)(7416002)(4001350100001)(81166006)(2950100002)(921003)(1121003); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR12MB1152; H:tlendack-t1.amdoffice.net; FPR:; SPF:None; MLV:sfv; LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtNV0hQUjEyTUIxMTUyOzIzOjE3NklVRnFreEhjTXo3U2oyaXU3QThxcWZk?= =?utf-8?B?NVN0djVNWmhWakNOc2dsTDJ3VTk2Y2xNS0ZqeHN5YnpvWUxBbUtkSlcvUkJh?= =?utf-8?B?OEY4SWpBSEJWSjVlSFdZditwVFl3QTU3U2sveHlKcU1EOVRJSkdVYjVzM2V0?= =?utf-8?B?aDhvRnF0TUpNN3lxdG1nQmlnL3NNWlRJcWxwMDd4bEVLT0VtcmdtVUVJRjBk?= =?utf-8?B?QTRoRXdPL2lHOGFBYnEzc0d3Zis1UHRUMUx5VWpFbnRRNjdIcDZ6dkQyRElt?= =?utf-8?B?VTk4bWUxTjV2ZzMrNnc0R0pVNTZ6WGdvWTB1SlBSRmVHK2hicStRL25pRXZu?= =?utf-8?B?N3R5RXB0ZXN6SG85UXJBdFFvUU5GNVVXYkJCN010MEc3bVA5cDFMQ0w2RlFS?= =?utf-8?B?U1NOZWZWTy91U3lxNWFZUUF4NHFVRitUU28rT1VtRi9IeHUrdWVsRURaTjVZ?= =?utf-8?B?Uk1wTlRHcG55RFNVQ1ZDcmViNy9BczZaOXB1ODZ1cHFvZHB0ODRYa0phZWFG?= =?utf-8?B?MFpCSDBVN3hwclN3a1ZxU0RJMU00a2hSclBhaGxOamx3MDh6L2UxUTIxcFRB?= =?utf-8?B?R1pIR2x2UkpoaGpEbzI0MDRscm9Ic0NvdERLRUhPeG1oN0FldG5lSWlDcitj?= =?utf-8?B?aVlXUkZJZFlKRmtRbEFYc1pzQ1MyTVljdk41WnN2TGg2YndqVUp6ZGREbzk3?= =?utf-8?B?L0ZoNE9MNHNWRDBpd092TEJVaGxQTkFqTktyOFVKakhzb0N6V1NQcmo0bzV2?= =?utf-8?B?c0dVTGZzUnZCV3doV2M0Ty8xTi9sZW1GeTkvcjVaQmNLbHFYa3Y3UytJTjR6?= =?utf-8?B?ZG5KVVFuWjZacEFJMUdnd21tUXI0VzRtWklCMnJOdTZkSFFqMzQzZXAwRnpW?= =?utf-8?B?cjZ1cXNVUFVURlBMNXlheW4yWjg4NXRvVmNRMGkrZ2ZwRkJ0QzU1bUlCS1BQ?= =?utf-8?B?eXNTOW5qTTc0eE5ibDhXQjg5T0tGM1FhQnFiY280TVlZMG1UNENMWE9vL0Ra?= =?utf-8?B?WjhKekF2WVc2R25QT0VoQ2VIajJ0QnRGWFMzRjR3TnJPeUpzOWpURHdkMjYy?= =?utf-8?B?UUtQdUJVTzl2bVR2VjcwN2ZYKzNrZU9FVE9zbmVTN3p4VmsrcDZtVUlpUXFX?= =?utf-8?B?eWJpTDFIdytJeVdjQm1rMmp2Z0ZUOXlPcjhHOUZlYTFrMTEvYkJaVTFRVXhP?= =?utf-8?B?a2RYWjk4eHVtT1lNZytoMW10MHM0MnJXY1A2dnhaN3g0aXdIdzZNRVdMYUVU?= =?utf-8?B?ejhseTFjS1gwY0M4OXN6ODl5T2hHbXpzNWlsSmYxelZQUWJhUHNmSW1CT3pi?= =?utf-8?B?a0ZCZWN5bnptNGRUZDJkVmdXVWZjNGlXUGl2M1UzNUM2UDdMMi9tL1diTC9r?= =?utf-8?B?TU42MGh0NHlHaGZ0a3A2d2M5K1FXUEN1cm9taUN5QTFGckNzZnoyd1RBTFN2?= =?utf-8?B?Z09XNFFmVlRodHpQWkZWNjF2ay9WMmJYK1VDamhOcjNKeStsNXllSXBSZHJx?= =?utf-8?B?NzlndGhYT3ZROEMyeUozZjFNRkFuUjd4MzR4S1pMelBEdEREMUdRMllQeFJ2?= =?utf-8?B?OWpEYnVXMGt3Ymo2aXBFY2kzbDFJWHBJVmt0djEwL2FRUE9mZ2Q0MTBuZ1lu?= =?utf-8?B?ckQ4MHFwL2ZCVzhENU1sYkJkYnFBTzNkdk00QnNPc0xyOVYwU21DNE1nPT0=?= X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtNV0hQUjEyTUIxMTUyOzY6K2FObjJlNUNweTJ4VkE2TkUxSzVKTlBIUVpv?= =?utf-8?B?ZWNrdGVnei9VZ05pZGNpTERmSGs1bmlCKzdhOHpEaHVIenZLcGlYcEJ6bytN?= =?utf-8?B?Z1c0TFUzNHJWVVBOTWFRVTZ3MWdRaHpaV1o4QmhlYzdPalJPdTF0blJVS0o2?= =?utf-8?B?czNKdy9KVDVybVAvZ05FRXpvUFJRV28wazNBaldJcjNzQVlTWThQcDNQTng1?= =?utf-8?B?Ymp5TkJJeldFdDg2WEpGTTNOZjRMNGJqSzM4QTJFUzJ6aWg4TitYbDRaaTFj?= =?utf-8?B?L2xPUjNpMHRmUlVuNHhFdFBEUWdtcEZjcTRKSkJibHNycnZGSGV0SG10bFFk?= =?utf-8?B?MjZ3MGMwenpHbVFsM3ExSnJwYVJwSUU0UVRxNWxqNkxtUGZHbmFES2dQUVlR?= =?utf-8?B?cm9heGtNVWl3YVNOUmFCc2didERESFM5SDNmcUNRMnJ1RWtTa08vcnR1VWcy?= =?utf-8?B?akVQbU4zMFlwQmVDcGhQM1pTQWZ6cVJZd1ZLWlRJSzRXdklkQlU0S3lhaklX?= =?utf-8?B?M2RUZUVteVVPWmRVS1Ixck5Xd3VIa0tGMDJySHdWSHd1ZStacS9Sc2VqdTRY?= =?utf-8?B?bnB4Z09tZlVzU3NLU256NzFoNnMwRzd3Y1ptNHBPNmpNYUFMV0Q0RXFnelJL?= =?utf-8?B?eG5JT1IvQWJscktOdE8wd0l4QlN4VjlEdU02LzFiZkpKcEdFN1daNnZPREwy?= =?utf-8?B?VmV3ZndIZ1JndWxCM1RrQy9zVU5MQnVuY2EwMHJoK0ErWGdPQzNpb3dIc25s?= =?utf-8?B?WjNtc2NzWWJqYXVkWFNOQ1gyVGdrbDlLc000TDVuWS8zelF5QXNTMHpLUGcx?= =?utf-8?B?UGdXTVlReGhiakZBTm8ybmlUaDNnckdMdll5MVhpR1N0WTJrYTkwRlZXZEg5?= =?utf-8?B?NDFBUzRwNEtpdytIUCs4MWR1Zkc1UUtJMXl1UUlIanpyNWV5bGRQeTBucE1s?= =?utf-8?B?MFBlMzV6VUJibm5BbEtCL3dsUlpHZS9vZjNqQ1hyTVR6LzZVUWxKc21lZ1Rt?= =?utf-8?B?TEdBQkwrcVBBbDlTK1didWhMdVNuME9BM2phbTVESGJxankvNGRmMzBVWmU2?= =?utf-8?B?eWZ1aWxnUEtXczhJaDM5bmN2bnMrcklqM0NwekxPOFdOS3BxaGU2V1g3aFZq?= =?utf-8?B?VG5PWFBvbW4wNUdzMmVrNkVTR1NSUTRlMHdiMEgxQ0hQUjZ3YkRqYTN2SnFs?= =?utf-8?B?VUU2NldjR3hKMk1kWkVzTVZmTGFUWUdYMTFNVFJXSmFmVDYwNWJZbi9OMzR4?= =?utf-8?B?aHVaZUt0WExLYnk0Zk1pb2RTMnJHajZwR1RSalM1ejJHcVlWK2JaNzJHcnhy?= =?utf-8?B?aVQ3cmc1aCtXNTdwdjhIYmRGVGhEV2x0K2duT0c0cUd3WVNyaXFKb2ttd1pk?= =?utf-8?Q?DuBPZ2R?= X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1152; 5: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; 24:DpHeBSA8GIKGj3IUeeTHWe4rSRZdjmfeDHzylRi+T6TUMqdtGQ6BTqPPf4Kde6NQOzPtYaaosy8xkTtb9B7eLY9Z3Co/N9G624xMXxrckKk= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1152; 7: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 X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1152; 20:vFNBbmb2lwYXJU4y/vMRZVpV7jqBpvK6Nu46j4GZvQeQ1U3Fhv728c8xjWdMXQMKV4GJRVW1vX08VAfCFNSJAwcOa66+uenB4TlHCrjxeNNN1wmkJcdksaA1W6BWHHoVS483pnWy+SXw1MkP6SAVWeU18EiCuw7AAkzlG+z2m/t5qwP/wFvWzH1tOyQ3BbZzYM7oGsyv+3a2P4ydmk1oe8o8af7KTAMVajVnl3XnRFPbvkfgirX4IlRkYAK1rBKd X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Jun 2017 18:51:44.9687 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR12MB1152 Cc: Brijesh Singh , Toshimitsu Kani , "Michael S. Tsirkin" , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Boris Ostrovsky , Jonathan Corbet , Joerg Roedel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Larry Woodman , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , Juergen Gross , Paolo Bonzini Subject: [Xen-devel] [PATCH v7 10/36] x86/mm: Provide general kernel support for memory encryption X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP Changes to the existing page table macros will allow the SME support to be enabled in a simple fashion with minimal changes to files that use these macros. Since the memory encryption mask will now be part of the regular pagetable macros, we introduce two new macros (_PAGE_TABLE_NOENC and _KERNPG_TABLE_NOENC) to allow for early pagetable creation/initialization without the encryption mask before SME becomes active. Two new pgprot() macros are defined to allow setting or clearing the page encryption mask. The FIXMAP_PAGE_NOCACHE define is introduced for use with MMIO. SME does not support encryption for MMIO areas so this define removes the encryption mask from the page attribute. Two new macros are introduced (__sme_pa() / __sme_pa_nodebug()) to allow creating a physical address with the encryption mask. These are used when working with the cr3 register so that the PGD can be encrypted. The current __va() macro is updated so that the virtual address is generated based off of the physical address without the encryption mask thus allowing the same virtual address to be generated regardless of whether encryption is enabled for that physical location or not. Also, an early initialization function is added for SME. If SME is active, this function: - Updates the early_pmd_flags so that early page faults create mappings with the encryption mask. - Updates the __supported_pte_mask to include the encryption mask. - Updates the protection_map entries to include the encryption mask so that user-space allocations will automatically have the encryption mask applied. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- arch/x86/boot/compressed/pagetable.c | 7 +++++ arch/x86/include/asm/fixmap.h | 7 +++++ arch/x86/include/asm/mem_encrypt.h | 13 ++++++++++ arch/x86/include/asm/page_types.h | 3 ++ arch/x86/include/asm/pgtable.h | 9 +++++++ arch/x86/include/asm/pgtable_types.h | 45 ++++++++++++++++++++++------------ arch/x86/include/asm/processor.h | 3 ++ arch/x86/kernel/espfix_64.c | 2 +- arch/x86/kernel/head64.c | 11 +++++++- arch/x86/kernel/head_64.S | 20 ++++++++------- arch/x86/mm/kasan_init_64.c | 4 ++- arch/x86/mm/mem_encrypt.c | 18 ++++++++++++++ arch/x86/mm/pageattr.c | 3 ++ include/asm-generic/pgtable.h | 8 ++++++ include/linux/mem_encrypt.h | 8 ++++++ 15 files changed, 128 insertions(+), 33 deletions(-) diff --git a/arch/x86/boot/compressed/pagetable.c b/arch/x86/boot/compressed/pagetable.c index 8e69df9..246bf29 100644 --- a/arch/x86/boot/compressed/pagetable.c +++ b/arch/x86/boot/compressed/pagetable.c @@ -15,6 +15,13 @@ #define __pa(x) ((unsigned long)(x)) #define __va(x) ((void *)((unsigned long)(x))) +/* + * The pgtable.h and mm/ident_map.c includes make use of the SME related + * information which is not used in the compressed image support. Un-define + * the SME support to avoid any compile and link errors. + */ +#undef CONFIG_AMD_MEM_ENCRYPT + #include "misc.h" /* These actually do the work of building the kernel identity maps. */ diff --git a/arch/x86/include/asm/fixmap.h b/arch/x86/include/asm/fixmap.h index b65155c..d9ff226 100644 --- a/arch/x86/include/asm/fixmap.h +++ b/arch/x86/include/asm/fixmap.h @@ -157,6 +157,13 @@ static inline void __set_fixmap(enum fixed_addresses idx, } #endif +/* + * FIXMAP_PAGE_NOCACHE is used for MMIO. Memory encryption is not + * supported for MMIO addresses, so make sure that the memory encryption + * mask is not part of the page attributes. + */ +#define FIXMAP_PAGE_NOCACHE PAGE_KERNEL_IO_NOCACHE + #include #define __late_set_fixmap(idx, phys, flags) __set_fixmap(idx, phys, flags) diff --git a/arch/x86/include/asm/mem_encrypt.h b/arch/x86/include/asm/mem_encrypt.h index 988b336..faae4e1 100644 --- a/arch/x86/include/asm/mem_encrypt.h +++ b/arch/x86/include/asm/mem_encrypt.h @@ -21,18 +21,31 @@ extern unsigned long sme_me_mask; +void __init sme_early_init(void); + void __init sme_enable(void); #else /* !CONFIG_AMD_MEM_ENCRYPT */ #define sme_me_mask 0UL +static inline void __init sme_early_init(void) { } + static inline void __init sme_enable(void) { } #endif /* CONFIG_AMD_MEM_ENCRYPT */ unsigned long sme_get_me_mask(void); +/* + * The __sme_pa() and __sme_pa_nodebug() macros are meant for use when + * writing to or comparing values from the cr3 register. Having the + * encryption mask set in cr3 enables the PGD entry to be encrypted and + * avoid special case handling of PGD allocations. + */ +#define __sme_pa(x) (__pa(x) | sme_me_mask) +#define __sme_pa_nodebug(x) (__pa_nodebug(x) | sme_me_mask) + #endif /* __ASSEMBLY__ */ #endif /* __X86_MEM_ENCRYPT_H__ */ diff --git a/arch/x86/include/asm/page_types.h b/arch/x86/include/asm/page_types.h index 7bd0099..b98ed9d 100644 --- a/arch/x86/include/asm/page_types.h +++ b/arch/x86/include/asm/page_types.h @@ -3,6 +3,7 @@ #include #include +#include /* PAGE_SHIFT determines the page size */ #define PAGE_SHIFT 12 @@ -15,7 +16,7 @@ #define PUD_PAGE_SIZE (_AC(1, UL) << PUD_SHIFT) #define PUD_PAGE_MASK (~(PUD_PAGE_SIZE-1)) -#define __PHYSICAL_MASK ((phys_addr_t)((1ULL << __PHYSICAL_MASK_SHIFT) - 1)) +#define __PHYSICAL_MASK ((phys_addr_t)(__sme_clr((1ULL << __PHYSICAL_MASK_SHIFT) - 1))) #define __VIRTUAL_MASK ((1UL << __VIRTUAL_MASK_SHIFT) - 1) /* Cast *PAGE_MASK to a signed type so that it is sign-extended if diff --git a/arch/x86/include/asm/pgtable.h b/arch/x86/include/asm/pgtable.h index b64ea52..c6452cb 100644 --- a/arch/x86/include/asm/pgtable.h +++ b/arch/x86/include/asm/pgtable.h @@ -1,6 +1,7 @@ #ifndef _ASM_X86_PGTABLE_H #define _ASM_X86_PGTABLE_H +#include #include #include @@ -13,6 +14,12 @@ cachemode2protval(_PAGE_CACHE_MODE_UC_MINUS))) \ : (prot)) +/* + * Macros to add or remove encryption attribute + */ +#define pgprot_encrypted(prot) __pgprot(__sme_set(pgprot_val(prot))) +#define pgprot_decrypted(prot) __pgprot(__sme_clr(pgprot_val(prot))) + #ifndef __ASSEMBLY__ #include @@ -38,6 +45,8 @@ extern struct mm_struct *pgd_page_get_mm(struct page *page); +extern pmdval_t early_pmd_flags; + #ifdef CONFIG_PARAVIRT #include #else /* !CONFIG_PARAVIRT */ diff --git a/arch/x86/include/asm/pgtable_types.h b/arch/x86/include/asm/pgtable_types.h index bf9638e..de32ca3 100644 --- a/arch/x86/include/asm/pgtable_types.h +++ b/arch/x86/include/asm/pgtable_types.h @@ -2,6 +2,8 @@ #define _ASM_X86_PGTABLE_DEFS_H #include +#include + #include #define FIRST_USER_ADDRESS 0UL @@ -121,10 +123,10 @@ #define _PAGE_PROTNONE (_AT(pteval_t, 1) << _PAGE_BIT_PROTNONE) -#define _PAGE_TABLE (_PAGE_PRESENT | _PAGE_RW | _PAGE_USER | \ - _PAGE_ACCESSED | _PAGE_DIRTY) -#define _KERNPG_TABLE (_PAGE_PRESENT | _PAGE_RW | _PAGE_ACCESSED | \ - _PAGE_DIRTY) +#define _PAGE_TABLE_NOENC (_PAGE_PRESENT | _PAGE_RW | _PAGE_USER |\ + _PAGE_ACCESSED | _PAGE_DIRTY) +#define _KERNPG_TABLE_NOENC (_PAGE_PRESENT | _PAGE_RW | \ + _PAGE_ACCESSED | _PAGE_DIRTY) /* * Set of bits not changed in pte_modify. The pte's @@ -191,18 +193,29 @@ enum page_cache_mode { #define __PAGE_KERNEL_IO (__PAGE_KERNEL) #define __PAGE_KERNEL_IO_NOCACHE (__PAGE_KERNEL_NOCACHE) -#define PAGE_KERNEL __pgprot(__PAGE_KERNEL) -#define PAGE_KERNEL_RO __pgprot(__PAGE_KERNEL_RO) -#define PAGE_KERNEL_EXEC __pgprot(__PAGE_KERNEL_EXEC) -#define PAGE_KERNEL_RX __pgprot(__PAGE_KERNEL_RX) -#define PAGE_KERNEL_NOCACHE __pgprot(__PAGE_KERNEL_NOCACHE) -#define PAGE_KERNEL_LARGE __pgprot(__PAGE_KERNEL_LARGE) -#define PAGE_KERNEL_LARGE_EXEC __pgprot(__PAGE_KERNEL_LARGE_EXEC) -#define PAGE_KERNEL_VSYSCALL __pgprot(__PAGE_KERNEL_VSYSCALL) -#define PAGE_KERNEL_VVAR __pgprot(__PAGE_KERNEL_VVAR) - -#define PAGE_KERNEL_IO __pgprot(__PAGE_KERNEL_IO) -#define PAGE_KERNEL_IO_NOCACHE __pgprot(__PAGE_KERNEL_IO_NOCACHE) +#ifndef __ASSEMBLY__ + +#define _PAGE_ENC (_AT(pteval_t, sme_me_mask)) + +#define _PAGE_TABLE (_PAGE_PRESENT | _PAGE_RW | _PAGE_USER | \ + _PAGE_ACCESSED | _PAGE_DIRTY | _PAGE_ENC) +#define _KERNPG_TABLE (_PAGE_PRESENT | _PAGE_RW | _PAGE_ACCESSED | \ + _PAGE_DIRTY | _PAGE_ENC) + +#define PAGE_KERNEL __pgprot(__PAGE_KERNEL | _PAGE_ENC) +#define PAGE_KERNEL_RO __pgprot(__PAGE_KERNEL_RO | _PAGE_ENC) +#define PAGE_KERNEL_EXEC __pgprot(__PAGE_KERNEL_EXEC | _PAGE_ENC) +#define PAGE_KERNEL_RX __pgprot(__PAGE_KERNEL_RX | _PAGE_ENC) +#define PAGE_KERNEL_NOCACHE __pgprot(__PAGE_KERNEL_NOCACHE | _PAGE_ENC) +#define PAGE_KERNEL_LARGE __pgprot(__PAGE_KERNEL_LARGE | _PAGE_ENC) +#define PAGE_KERNEL_LARGE_EXEC __pgprot(__PAGE_KERNEL_LARGE_EXEC | _PAGE_ENC) +#define PAGE_KERNEL_VSYSCALL __pgprot(__PAGE_KERNEL_VSYSCALL | _PAGE_ENC) +#define PAGE_KERNEL_VVAR __pgprot(__PAGE_KERNEL_VVAR | _PAGE_ENC) + +#define PAGE_KERNEL_IO __pgprot(__PAGE_KERNEL_IO) +#define PAGE_KERNEL_IO_NOCACHE __pgprot(__PAGE_KERNEL_IO_NOCACHE) + +#endif /* __ASSEMBLY__ */ /* xwr */ #define __P000 PAGE_NONE diff --git a/arch/x86/include/asm/processor.h b/arch/x86/include/asm/processor.h index f3b1b27..8010c97 100644 --- a/arch/x86/include/asm/processor.h +++ b/arch/x86/include/asm/processor.h @@ -29,6 +29,7 @@ #include #include #include +#include /* * We handle most unaligned accesses in hardware. On the other hand @@ -241,7 +242,7 @@ static inline unsigned long read_cr3_pa(void) static inline void load_cr3(pgd_t *pgdir) { - write_cr3(__pa(pgdir)); + write_cr3(__sme_pa(pgdir)); } #ifdef CONFIG_X86_32 diff --git a/arch/x86/kernel/espfix_64.c b/arch/x86/kernel/espfix_64.c index 6b91e2e..9c4e7ba 100644 --- a/arch/x86/kernel/espfix_64.c +++ b/arch/x86/kernel/espfix_64.c @@ -195,7 +195,7 @@ void init_espfix_ap(int cpu) pte_p = pte_offset_kernel(&pmd, addr); stack_page = page_address(alloc_pages_node(node, GFP_KERNEL, 0)); - pte = __pte(__pa(stack_page) | (__PAGE_KERNEL_RO & ptemask)); + pte = __pte(__pa(stack_page) | ((__PAGE_KERNEL_RO | _PAGE_ENC) & ptemask)); for (n = 0; n < ESPFIX_PTE_CLONES; n++) set_pte(&pte_p[n*PTE_STRIDE], pte); diff --git a/arch/x86/kernel/head64.c b/arch/x86/kernel/head64.c index 95979c3..5d7363a 100644 --- a/arch/x86/kernel/head64.c +++ b/arch/x86/kernel/head64.c @@ -100,7 +100,7 @@ void __init __startup_64(unsigned long physaddr) pud = fixup_pointer(early_dynamic_pgts[next_early_pgt++], physaddr); pmd = fixup_pointer(early_dynamic_pgts[next_early_pgt++], physaddr); - pgtable_flags = _KERNPG_TABLE + sme_get_me_mask(); + pgtable_flags = _KERNPG_TABLE_NOENC + sme_get_me_mask(); if (IS_ENABLED(CONFIG_X86_5LEVEL)) { p4d = fixup_pointer(early_dynamic_pgts[next_early_pgt++], physaddr); @@ -157,7 +157,7 @@ static void __init reset_early_page_tables(void) { memset(early_top_pgt, 0, sizeof(pgd_t)*(PTRS_PER_PGD-1)); next_early_pgt = 0; - write_cr3(__pa_nodebug(early_top_pgt)); + write_cr3(__sme_pa_nodebug(early_top_pgt)); } /* Create a new PMD entry */ @@ -290,6 +290,13 @@ asmlinkage __visible void __init x86_64_start_kernel(char * real_mode_data) clear_page(init_top_pgt); + /* + * SME support may update early_pmd_flags to include the memory + * encryption mask, so it needs to be called before anything + * that may generate a page fault. + */ + sme_early_init(); + kasan_early_init(); for (i = 0; i < NUM_EXCEPTION_VECTORS; i++) diff --git a/arch/x86/kernel/head_64.S b/arch/x86/kernel/head_64.S index ef12729..d56ccb71 100644 --- a/arch/x86/kernel/head_64.S +++ b/arch/x86/kernel/head_64.S @@ -370,9 +370,9 @@ GLOBAL(name) NEXT_PAGE(early_top_pgt) .fill 511,8,0 #ifdef CONFIG_X86_5LEVEL - .quad level4_kernel_pgt - __START_KERNEL_map + _PAGE_TABLE + .quad level4_kernel_pgt - __START_KERNEL_map + _PAGE_TABLE_NOENC #else - .quad level3_kernel_pgt - __START_KERNEL_map + _PAGE_TABLE + .quad level3_kernel_pgt - __START_KERNEL_map + _PAGE_TABLE_NOENC #endif NEXT_PAGE(early_dynamic_pgts) @@ -385,15 +385,15 @@ NEXT_PAGE(init_top_pgt) .fill 512,8,0 #else NEXT_PAGE(init_top_pgt) - .quad level3_ident_pgt - __START_KERNEL_map + _KERNPG_TABLE + .quad level3_ident_pgt - __START_KERNEL_map + _KERNPG_TABLE_NOENC .org init_top_pgt + PGD_PAGE_OFFSET*8, 0 - .quad level3_ident_pgt - __START_KERNEL_map + _KERNPG_TABLE + .quad level3_ident_pgt - __START_KERNEL_map + _KERNPG_TABLE_NOENC .org init_top_pgt + PGD_START_KERNEL*8, 0 /* (2^48-(2*1024*1024*1024))/(2^39) = 511 */ - .quad level3_kernel_pgt - __START_KERNEL_map + _PAGE_TABLE + .quad level3_kernel_pgt - __START_KERNEL_map + _PAGE_TABLE_NOENC NEXT_PAGE(level3_ident_pgt) - .quad level2_ident_pgt - __START_KERNEL_map + _KERNPG_TABLE + .quad level2_ident_pgt - __START_KERNEL_map + _KERNPG_TABLE_NOENC .fill 511, 8, 0 NEXT_PAGE(level2_ident_pgt) /* Since I easily can, map the first 1G. @@ -405,14 +405,14 @@ NEXT_PAGE(level2_ident_pgt) #ifdef CONFIG_X86_5LEVEL NEXT_PAGE(level4_kernel_pgt) .fill 511,8,0 - .quad level3_kernel_pgt - __START_KERNEL_map + _PAGE_TABLE + .quad level3_kernel_pgt - __START_KERNEL_map + _PAGE_TABLE_NOENC #endif NEXT_PAGE(level3_kernel_pgt) .fill L3_START_KERNEL,8,0 /* (2^48-(2*1024*1024*1024)-((2^39)*511))/(2^30) = 510 */ - .quad level2_kernel_pgt - __START_KERNEL_map + _KERNPG_TABLE - .quad level2_fixmap_pgt - __START_KERNEL_map + _PAGE_TABLE + .quad level2_kernel_pgt - __START_KERNEL_map + _KERNPG_TABLE_NOENC + .quad level2_fixmap_pgt - __START_KERNEL_map + _PAGE_TABLE_NOENC NEXT_PAGE(level2_kernel_pgt) /* @@ -430,7 +430,7 @@ NEXT_PAGE(level2_kernel_pgt) NEXT_PAGE(level2_fixmap_pgt) .fill 506,8,0 - .quad level1_fixmap_pgt - __START_KERNEL_map + _PAGE_TABLE + .quad level1_fixmap_pgt - __START_KERNEL_map + _PAGE_TABLE_NOENC /* 8MB reserved for vsyscalls + a 2MB hole = 4 + 1 entries */ .fill 5,8,0 diff --git a/arch/x86/mm/kasan_init_64.c b/arch/x86/mm/kasan_init_64.c index 88215ac..d7cc830 100644 --- a/arch/x86/mm/kasan_init_64.c +++ b/arch/x86/mm/kasan_init_64.c @@ -92,7 +92,7 @@ static int kasan_die_handler(struct notifier_block *self, void __init kasan_early_init(void) { int i; - pteval_t pte_val = __pa_nodebug(kasan_zero_page) | __PAGE_KERNEL; + pteval_t pte_val = __pa_nodebug(kasan_zero_page) | __PAGE_KERNEL | _PAGE_ENC; pmdval_t pmd_val = __pa_nodebug(kasan_zero_pte) | _KERNPG_TABLE; pudval_t pud_val = __pa_nodebug(kasan_zero_pmd) | _KERNPG_TABLE; p4dval_t p4d_val = __pa_nodebug(kasan_zero_pud) | _KERNPG_TABLE; @@ -158,7 +158,7 @@ void __init kasan_init(void) */ memset(kasan_zero_page, 0, PAGE_SIZE); for (i = 0; i < PTRS_PER_PTE; i++) { - pte_t pte = __pte(__pa(kasan_zero_page) | __PAGE_KERNEL_RO); + pte_t pte = __pte(__pa(kasan_zero_page) | __PAGE_KERNEL_RO | _PAGE_ENC); set_pte(&kasan_zero_pte[i], pte); } /* Flush TLBs again to be sure that write protection applied. */ diff --git a/arch/x86/mm/mem_encrypt.c b/arch/x86/mm/mem_encrypt.c index 9a78277..b2d1cdf 100644 --- a/arch/x86/mm/mem_encrypt.c +++ b/arch/x86/mm/mem_encrypt.c @@ -15,6 +15,8 @@ #ifdef CONFIG_AMD_MEM_ENCRYPT +#include + /* * Since SME related variables are set early in the boot process they must * reside in the .data section so as not to be zeroed out when the .bss @@ -23,6 +25,22 @@ unsigned long sme_me_mask __section(.data) = 0; EXPORT_SYMBOL_GPL(sme_me_mask); +void __init sme_early_init(void) +{ + unsigned int i; + + if (!sme_me_mask) + return; + + early_pmd_flags = __sme_set(early_pmd_flags); + + __supported_pte_mask = __sme_set(__supported_pte_mask); + + /* Update the protection map with memory encryption mask */ + for (i = 0; i < ARRAY_SIZE(protection_map); i++) + protection_map[i] = pgprot_encrypted(protection_map[i]); +} + void __init sme_encrypt_kernel(void) { } diff --git a/arch/x86/mm/pageattr.c b/arch/x86/mm/pageattr.c index c8520b2..e7d3866 100644 --- a/arch/x86/mm/pageattr.c +++ b/arch/x86/mm/pageattr.c @@ -2014,6 +2014,9 @@ int kernel_map_pages_in_pgd(pgd_t *pgd, u64 pfn, unsigned long address, if (!(page_flags & _PAGE_RW)) cpa.mask_clr = __pgprot(_PAGE_RW); + if (!(page_flags & _PAGE_ENC)) + cpa.mask_clr = pgprot_encrypted(cpa.mask_clr); + cpa.mask_set = __pgprot(_PAGE_PRESENT | page_flags); retval = __change_page_attr_set_clr(&cpa, 0); diff --git a/include/asm-generic/pgtable.h b/include/asm-generic/pgtable.h index 7dfa767..882cb5d 100644 --- a/include/asm-generic/pgtable.h +++ b/include/asm-generic/pgtable.h @@ -424,6 +424,14 @@ static inline int pud_same(pud_t pud_a, pud_t pud_b) #define pgprot_device pgprot_noncached #endif +#ifndef pgprot_encrypted +#define pgprot_encrypted(prot) (prot) +#endif + +#ifndef pgprot_decrypted +#define pgprot_decrypted(prot) (prot) +#endif + #ifndef pgprot_modify #define pgprot_modify pgprot_modify static inline pgprot_t pgprot_modify(pgprot_t oldprot, pgprot_t newprot) diff --git a/include/linux/mem_encrypt.h b/include/linux/mem_encrypt.h index 59769f7..837c66b 100644 --- a/include/linux/mem_encrypt.h +++ b/include/linux/mem_encrypt.h @@ -30,6 +30,14 @@ static inline bool sme_active(void) return !!sme_me_mask; } +/* + * The __sme_set() and __sme_clr() macros are useful for adding or removing + * the encryption mask from a value (e.g. when dealing with pagetable + * entries). + */ +#define __sme_set(x) ((unsigned long)(x) | sme_me_mask) +#define __sme_clr(x) ((unsigned long)(x) & ~sme_me_mask) + #endif /* __ASSEMBLY__ */ #endif /* __MEM_ENCRYPT_H__ */