From patchwork Tue Jun 27 14:56:20 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tom Lendacky X-Patchwork-Id: 9812105 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 5A8FA6020A for ; Tue, 27 Jun 2017 14:59:01 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 4D0F627F97 for ; Tue, 27 Jun 2017 14:59:01 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 3EF86286AA; Tue, 27 Jun 2017 14:59:01 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 9FC9A27F97 for ; Tue, 27 Jun 2017 14:59:00 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dPrur-0002QR-Ur; Tue, 27 Jun 2017 14:56:33 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dPrur-0002QB-6o for xen-devel@lists.xen.org; Tue, 27 Jun 2017 14:56:33 +0000 Received: from [85.158.143.35] by server-9.bemta-6.messagelabs.com id 6E/F0-03557-02272595; Tue, 27 Jun 2017 14:56:32 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA1VSbUgTcRjvf7s7T3Hyd0t8Wpk1Kyua6ZfQSBN 6s6BYRkV9qG7t2hZ7427Vqi8mliUVZmQ5xcwSspBmi1wmlcWIrMwX1BlRYBklzF4MhVLqbrfM 7tPv+f/e7oGHUahO0hqGc7s43s5atXQMaV6qXaVL5vN3pLefi8+89u0qmYvyAvd/EXq0k7LYD Q73HsrsL+yjnOOp7nst36gC1Di3BMUwJC5SwOeuk7Q0IHweQUNfmaIERTMqfJyAwuoVEqbxEu gN/SAkrMYbwNfRT0l4Oq4hYKAcS2YFDtHwoP0FLREEngU1tXXhIBLPh9udjeF3Jc6DZ+PnSAl H4/Vw9uOjSFkenGkdiZJwAp4N9d1FlKyPh2cVH0Q9IxYsglvNS6VnBU6GplBV2Ap4DjSNjYUX AHwCwfunlyg5cx54RjqiZFESBF5WkTLeCCVDP8OZgFOgrWiT7G0lIBiqjAS9pKF7eJCQDYshd LFSIRMDUTDs+4kiAwX1n32UPNwloaHkOSVbrPCu9U1EVY1g+K0/Uv6Cgiuvt8rEbxUU1z2gSp HOM2VZz79lPVOWrUGKG2ihwPEHOV6XkZlm4C0ms8vGWqy6jPRlaTZOEFgTZ2UNQtpeh+02Es9 imvj5UX+j/jGawRDaBOVNyN+hijM4jIfNrGDezR+wcsJjlMowuDZQuEVD2h12TgvKHKcoi+c5 E+feZ7GKZ/ZXCUysdrqyV6KVgpO1CRaTTLWhuZpE5WWJwBJhPmCftP090C6UpFErkfhPqlgnx 9ssrv/5IZTIIK1aSTvElFiL3TWZPiQWE2IxWa2Xil3sP0pTgIrjKmZsTulRlxkKHnq/f8pN0L +JGwxOfPUf2TaRv6p7ddXK6+X9d1oOP7E2L3Mb9X1H8YKqnNx1wTUWz+Bxo/dLdlNW9v5T3ol g7PLTnaPE9l7DCdNKVxYaLV3bsyI9MOtCWer3vnvqXc6cQz70im5I85UmGdu82cVGz7H5C0dm aknBzGYsVvAC+wdhO+XHmwMAAA== X-Env-Sender: Thomas.Lendacky@amd.com X-Msg-Ref: server-3.tower-21.messagelabs.com!1498575389!72395972!1 X-Originating-IP: [104.47.34.67] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.19; banners=-,-,- X-VirusChecked: Checked Received: (qmail 52872 invoked from network); 27 Jun 2017 14:56:30 -0000 Received: from mail-by2nam01on0067.outbound.protection.outlook.com (HELO NAM01-BY2-obe.outbound.protection.outlook.com) (104.47.34.67) by server-3.tower-21.messagelabs.com with AES256-SHA256 encrypted SMTP; 27 Jun 2017 14:56:30 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=BMKWUnVGbAemP6ETsJwrXL4mf2o/1Ccu89qZT0dk/n0=; b=hChIf4ZNvZag5hg/qsew++XjKAeYEDrrdLOTwvgCRsA0IpTq5lP12ntptmlSTHMiEcIujEyzDWfdTH3DUMU4+VaKtCxnqx2kOSP7pK5abwVBvUSdNeGJghYCVl425s9Wq8asBBzj+w1kFXd4aL68hBBu0RbP8WLoih2BnJpetbo= Received: from tlendack-t1.amdoffice.net (165.204.77.1) by MWHPR12MB1150.namprd12.prod.outlook.com (10.169.204.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1199.15; Tue, 27 Jun 2017 14:56:24 +0000 From: Tom Lendacky To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, xen-devel@lists.xen.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Date: Tue, 27 Jun 2017 09:56:20 -0500 Message-ID: <20170627145620.15908.94963.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20170627145607.15908.26571.stgit@tlendack-t1.amdoffice.net> References: <20170627145607.15908.26571.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: MWHPR14CA0024.namprd14.prod.outlook.com (10.173.227.34) To MWHPR12MB1150.namprd12.prod.outlook.com (10.169.204.14) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 852da10b-7ee5-443b-6727-08d4bd6caf8a X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(48565401081)(300000503095)(300135400095)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506067)(300135500095); SRVR:MWHPR12MB1150; X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1150; 3: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 X-MS-TrafficTypeDiagnostic: MWHPR12MB1150: X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1150; 25: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 X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1150; 31: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 X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1150; 20:IxiBZbPrlbjuhrXAee/YAIrfdCSMrKmPU0ek+gT9HQF5pKWnxrFKYYQssxbRCEB/UQpVQfmSfC9tD2ZI+Z/SwJ6Twgyi7hwGLuOAY98TXCAyS1vvJaVbb6JceJ5PgAVXFguWB4IfUnj1gPEPTNO2X5W9jT4ZZf170Gt0DJ/1ZSRLit9zyBNQLVYDwWz4AfjfAAZ96Bez5ZVibH8wZcBdHFm4mJxGcpwuSK6M+7/lfbMwg6RhreIHUU5Peqkj5KH8yhtFyYBICXAo0rR83tuLshh352fAZI6jL4qNjUCisxojiAsItyWN0D4c9cB3NckJ7lnSv8uJ9YPfpPKVg4IgaZZM+ZxM3TRov63JL+dfY4Oy0p+Sk+ZvHGMEPhNWk39TG1lJeJ69FDyOYuCuG9p4IRkl4w6iRGGDRjVNTrANNjl35qfLt7PrwgOuR07Yp1f1B5wxIGoZTT0NA1PK/21Pfc3P1wPAbncMNXD8bxHQt9cYtrXfuzR1n4wSMXqsQ6ug X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(125551606395959)(278178393323532)(20558992708506)(133145235818549)(236129657087228)(767451399110)(148574349560750); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(100000703101)(100105400095)(10201501046)(93006095)(93001095)(3002001)(6055026)(6041248)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123562025)(20161123555025)(20161123564025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:MWHPR12MB1150; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:MWHPR12MB1150; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtNV0hQUjEyTUIxMTUwOzQ6djIxZW9nS0dLQ2lBUTJXZ3BkZFRvYVFVNzlJ?= =?utf-8?B?NG1yU3M2SVNtNVZqQXkvRUxzTzJqOGxjRTY5N1lMWC9mWDBiSytkMGZrcU9p?= =?utf-8?B?V2xRdjdacDk3WlFMWU14YWN2SCtSeTZwWVNHb0RKQ0svNFBoaWk2c2FURSsz?= =?utf-8?B?NUJ1VHJRTjhTRDVMSjRMZDdkTnM3bUFtSk1SY1ZNK1RlSzBuaUFXS1kzOFFQ?= =?utf-8?B?L0J3RzQxN3IzTURjaVZIUVdkVFBTSWUzZGN5VVdzTzg4Zyswd3NocWNYUGUx?= =?utf-8?B?SUJEazE1N2RuVFJyc1F3YU0vODFZdnpzODZza3FsMTUrTmpkMUNyekxoU2E5?= =?utf-8?B?VVhKS3VmeWh2MW1neW5pelkzQ0xBV3htTDJxMUUwYXZicjJtWGwvc2dmWkhy?= =?utf-8?B?bWR4MXZMRThKc1Q5T3VhTTM4MzJFNmVXRThNNUludWdTS0o5blJ2SWEzcHNI?= =?utf-8?B?cXAxZjJNcFRpMFJ0RkhiWEhuSmJSMk9LVWZuNHlyc0VCYlpBaFMxMHY5VDY0?= =?utf-8?B?WDFJS3kzbGE1WmZjOXozeFRlaG10Nk1ZRXVQY0NicjgvVXZhS0gyMFBBd2to?= =?utf-8?B?b0J3WEVWZGhUcDdWeWpmcSt1Y2FWR2VjNStOVXR2MWJvcUtuZ2I3M0ZVL3I0?= =?utf-8?B?QjVZaldGYXBXZm02ZVNQT2JZa2F5eHRXVWZteE5ZTTVHRUZaWmZocERRcThO?= =?utf-8?B?TWpXcHgvV3Biei9vVi9TL2F0dmN3VkpoWDBnMXhZd3ZaSnZnQU1nWHJIcDFC?= =?utf-8?B?MU1RQ2FHMkU2dDBzRG54NFFSZ0pTRi9OVnJucXc5dGFwTXBhUk8raFBDRVls?= =?utf-8?B?R3h5S05XK3U0WGg1dFVkNnk5eFBEbWVCbmxuTjNHNW1EWWxYeFZnR0tyYzAy?= =?utf-8?B?WitLMnhJWUNjWlZLaTZ2TjhKeHcya0lmSEpQSnEycmxabTFmdU95WFBaall0?= =?utf-8?B?THIxTWprWXR6NTh3MUtWcStmWWpQenFWMmM0QTRjSmlHSjh0cHBnRlptVHJz?= =?utf-8?B?bjVLOTdGbi9zdGdLMXRrTFZ1R05uNjFlUTdNM25YL3p4UWdRZXI2ZWlnTHI4?= =?utf-8?B?MWErMmtBcVB2em82RzI0T1I2L1BQdGlOVmcvQi84YTMySEdBUXcxaDFYMVNT?= =?utf-8?B?NGpPckdpb0dMMDBXYkxtR0JhUlBkN2NldmxLSGpIandvRklLck1YdUs1Y0Q3?= =?utf-8?B?Y3kvRExyMGlzQWZjc0RLRFdydmxhVlh2ZHVBd01MRjZxanZOZ1ZJNWVtTjBh?= =?utf-8?B?b0NiSWJXbkJVLzhCTVJ1NWxNcFIwQjZHR3UwbUFoMkxWQkgzL3ViZmFGQjVO?= =?utf-8?B?THRQTGRmWGNIdktYNytmN25XeUlSOG1ISEI5dFNxTEpQMVRqSk1SSDB1amtV?= =?utf-8?B?Q0V4SzdJenZOdUF3QVN5eWtwblFacDhUV2xyQm9CdHoveXIwblE5Ym5LZlhD?= =?utf-8?B?UFdZUlRUalB6Q2RvR1E0M1RSR1dvOVJsYUZQdzc1TEU4dytHREJaelMzVDNl?= =?utf-8?B?NmlNaGFmalAwQ0hQaHFVRTZDRmdZeGhTOVQ0YUg2cXNuRnREZmkxMHRZNDBE?= =?utf-8?B?SExISzZYWm45ODhUV1F1U2piR01NZ3VqdldEM0NpQUI1ZDl2MzBlQ2s0SG5B?= =?utf-8?B?V1czTUh1M2ErWXh3aUVCWVYvLzdiOVJmZ1FMSXJVcU1MUFBIaUNDdzdiK0pE?= =?utf-8?B?a2JoRG9IdDJYV3kxdlZDaHFCcllVRlRzWHVROWpIWTlkM0dpTk5iVlRUQTV0?= =?utf-8?B?UEVIeWUxMm0xTFp4WE85Yk5pYzJBWER3b1JORXlhZ2E4b3dCbEJwWmxZb0JQ?= =?utf-8?B?N0ZDbS96RXR0NTd3Y1cwb1JwZll6SHA3bDM5eUVhVWc4N2NLZU5uaTF3ZWd2?= =?utf-8?B?SDlPc3lmbVpBL3JpZ2YwS2JZdi92eXlxT3V2RnRCTXhmcDdxR3BzSTh6c3Zo?= =?utf-8?B?TnFBdkVkRlE9PQ==?= X-Forefront-PRVS: 0351D213B3 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39850400002)(39400400002)(39840400002)(39450400003)(39860400002)(39410400002)(54356999)(25786009)(76176999)(47776003)(72206003)(478600001)(66066001)(23676002)(2906002)(3846002)(1076002)(6116002)(230700001)(50466002)(53416004)(50986999)(33646002)(97746001)(86362001)(54906002)(55016002)(6666003)(6506006)(103116003)(42186005)(4001350100001)(110136004)(2950100002)(189998001)(575784001)(38730400002)(7736002)(9686003)(83506001)(5660300001)(7416002)(81166006)(53936002)(4326008)(8676002)(7406005)(305945005)(921003)(1121003); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR12MB1150; H:tlendack-t1.amdoffice.net; FPR:; SPF:None; MLV:sfv; LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtNV0hQUjEyTUIxMTUwOzIzOjYxS0RBTFM0TmRsZjRwUTJSR3VsNUhFRnBx?= =?utf-8?B?dzZoQUVtTktzR0k5amRURVVpU0RKb2Vxbm02OGRXcXhEL2pyMGc3ODU5N2JS?= =?utf-8?B?MGlUYVlrdjRYbmtXaWxVUmxUZTVWN2JCU0JUaDBianArSnJwN3ZXZlNDV3Ix?= =?utf-8?B?emxpdU9WRVZ3OStHYmVoT2cxRUJhSlI5UjQ3QmpnUmdla1o5ZlJjenJBNUNG?= =?utf-8?B?cUozb2ZhZHlQMjBHaUFLZnNJYVo1Q3doU3ZkdTczRm4zbm05ajBUQTlVSUti?= =?utf-8?B?ZzJUNnRYazhXdFRHZCtDazl5TUFNcFh2VmV6aEo3WThiU3BrQS8xS0VGVXF2?= =?utf-8?B?aDk1N1NpMzU2ekRkcVBKWTU2RGEvNE9DYnAyNm40ZHRDTENTUFlWR1pxbTl3?= =?utf-8?B?RUNqNzR2VTJXZjFOeTdaa3hVQzNZZyt5NVJjTFZocldFS1p4OFlSUjFmNmtB?= =?utf-8?B?ejU3SXcwcWd2eEdOV01wQW5KTUx2bmppYk9IR1JxbmFEcGJhT0JjRW5PV2Iz?= =?utf-8?B?SmFxdERIVXgxT1pUUXRYcER3NDM2aXZ5NVpWVUxrUHJvZ2VETEN6Nk53R0Rq?= =?utf-8?B?YUVGTnNXS20rUE0yaHNCOGNzZ1ljcVdBekIvSXRQUlMyMWRXa2d0VysvTCtE?= =?utf-8?B?N3ZlMk5HWi9tRDVwRTNpRlJrcUlQZEJXUmljRkF3UEFZQkg4WDFIOW9VRVFC?= =?utf-8?B?YUQxTy84eG1VR2JvMXQ1MnBQV04wb3FuQ1Y4T25IYUJsQXpHWEllMWNtSmp5?= =?utf-8?B?ZEx3ZFYzdTIvTmNYNVFjdGI0cFBuUmtJYlUrZmdTUDVhejdPOHBPbFRDUVF6?= =?utf-8?B?bXBYUWNBN05Udk5EOWhQTEtvQ21FWEN3TnFmNnAzRTZBbUxqSmpZUmZKS1FJ?= =?utf-8?B?SXlyZVJMNkJIYkUzM2JFQ1hFR3hGSHMyYmlzSXlsc2ovWWE4M1VEU29VdkpW?= =?utf-8?B?NnRYU3E2VnViWXZXZHFqOFdtM040UDAvOXJORlRRTUJZZVJCc2FySk5yc3pN?= =?utf-8?B?Sk5KeUN2Y1hnbFNZQUViKzdZNWxhRE14MlJ1MTVPQmNDSGJHNm1rTTBMZWF1?= =?utf-8?B?OUZlMUxIenRKMVpEbUVLVHBXWXNQVUZWNDVUeEFZOXdSazZJQ0VYR1lzYUlY?= =?utf-8?B?ZTBLdCt5dUJ0OHY4VlVOL0puMjArNER3TE1YbG8zN20wUitXcU5WVndXSWc1?= =?utf-8?B?aldnZlF4M29aTlhWNUJ0c2tZandFTnZlMExjdWJnQ1ZmS0JGTklPR010U21Z?= =?utf-8?B?eGVVbVNibithWjkxVW9pY3BWbFBZOTNaT1ovQ3pqeDdQVlo1UzNNMzdQYVQ4?= =?utf-8?B?Rm5tQS83WjRZK1ZzeFZyWDYzbzNYV1lwZXBsaDFuZUFxczNBNTMyYmlseDRO?= =?utf-8?B?aUdEYlpSNFVJQ2krZ0gzdUxoZGZHaURoWTFPd2NrRVJLby9FcExQWE9PdzIy?= =?utf-8?B?TWRxWmhuZDZpSGhIN05vYm45SmQ5djJNWHd2UXAyUWpMSi84TjR3WUtCbC9r?= =?utf-8?B?ZWtDdXZ4RmRyd3pmYURjQmJJWjI3RWdyT0txcUV1WlZ1eFJjOEo4UXZkbitE?= =?utf-8?B?V09nT204Nmc1cGRGNHM0ekllMzNmbTNDSjNUbDcrUFp0UDR3czNJdHh3SU5J?= =?utf-8?B?aE9LN2U4emN5WWU0NXd2U3A5N1VNdzcvMm9neUkvR29pTEk2SHpMa0dWSEFY?= =?utf-8?B?b3RRalpEZXR4Sis0Ykg2NkVSWHd1TkZ6QzNvc0FoSnN6ZGhPTjRHU1BQYzFn?= =?utf-8?B?Y2pNNkxUdlMrWXFGT21HQT09?= X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtNV0hQUjEyTUIxMTUwOzY6THYrOEcycFpFNGJUMzZJbGJnS3NnS3ZPd2hp?= =?utf-8?B?VnJOTnVDbGhiQmtPTFd2MlNGK2o4Um1CNmRXYytUaTFjcnRoS0NsbEFhSVRq?= =?utf-8?B?TGdWSDdBeWkzaUxkWlU3RWIrSlM4aU8wcDF5U3h2Q01tN0VkN3YwUU5IQm9t?= =?utf-8?B?V2JDRmpKd3BLVnNGbFIxYVQrbGwrMGtEK0RzUGFhSjcvOGR6Qm5QVFBrM0dh?= =?utf-8?B?Q2hBZFhQUFE0eVNVYWVXeURZa2ZKZGJldE9Td3B3REx0VTg0Tzd3ekxGdk5o?= =?utf-8?B?N1ZGblUvZ1R6Ym0xZGc0WHYvd1M5anYxNXBaUjNtTHlqclA3T2piZi9iUTZV?= =?utf-8?B?V2NET0R0Q3k1a1FWR2JTUWpyZStHaHByeVpPS0FwdCs3elRiaW5sR2p2bXFa?= =?utf-8?B?NTNXNXRDY2oxZkFqSFl1WkVGdlBPRGIrdERlS08xVXAwaUZnM2lES2FQbWZ6?= =?utf-8?B?aCtJWnlxd2hRMWFVZi9HcEFkVW9Od212aFk2TS9pdDhZMU05ZmhMQnYzenBL?= =?utf-8?B?Zk1wQVcwRU5aUm1qOWhPTUhFSklEMUYzSWh6V3o0bTVKbUpFa2JZcytxemFX?= =?utf-8?B?YjYvN1BUNCtDVGxyU1hrQWNxd3ZPNFNGUms1NzU2Ti9aaDB0WVdrM1Y4UXk2?= =?utf-8?B?QlB3VTgreXk0QndweHIvL3A2MjRUZTJXVVBDVUR6VjRBcFpWSFBkWVJuKzVt?= =?utf-8?B?YWs2RnNXejJoU0Q2ZGJyRjYzMk9oZG0vQ0NLR1NmRldxQk1xSkwvT0dBVnFI?= =?utf-8?B?cXVMbWhqMjZnK2FBL1NNc280UStteW1UaVUvZmo1cGVXMkJjRTRZRllSbzdP?= =?utf-8?B?RFNwbTJlc2xJRjRYSzdRRmQ3amc0Q0o0YnlEYXIvZkJhamluOTFURm00UUhT?= =?utf-8?B?enErbHRDd0Q2Qm14ZzI1S2Jwb2RmREJUVmpHcHpoVzBSeXNJZkU4Z0pXMVVB?= =?utf-8?B?dFh6SXRZNTRSQURvL01MR0RNYzJOV0pxcWQ3d3NLZHFWYVVLUm5CNUVOYXR6?= =?utf-8?B?eXU2bjVRUm5MamVwK1FFbjJPcE9zckxLUHNrVlZ0cGRhV0tOU3NRdXBGQXVu?= =?utf-8?B?alNNdTl1L2U3eEVFS3ZoQVd4Y083a3ZyYWZxV215VFY1MitBdmt5dkQ5WWNj?= =?utf-8?B?MGYybHgxSDFsaFg4TTV4Qmp6eWZ0WTQydmp5NkpPc1ZPaUZvWjFmVU1lRjVD?= =?utf-8?B?OSsvN1hCektCelllYkFyVVprVW9IWHJNYVZHVS9VV01kK0ZqL1dTT1ZDeVd1?= =?utf-8?B?LzZCTGdtbVBCa0Mxbzk0Wm5URitiWnFZemhrOHF2UjZqVGdqaWRnYVl4cTZm?= =?utf-8?B?citING1SdkpDTXZJc3VqWDM5ZUw3Z2VWTkt4eEZ3aWdIME5SdFJqY2loanpE?= =?utf-8?Q?N6ipy3I?= X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1150; 5:m+lhUaIo4y2CYWLfRYEi2PwNYOVKk73Ivy2L/kuDzfKLv1oxKioP8x63rOgQ8AqEeKaHg8Bq7kLVaVZj/lUJq/DE+z7eTvrHs4S1FR7olCkPCXr2wxleveR2Gz4dpBMbGncUjPBtaszZdsMBZkoV3uQWVlhqTWAkQdEBYUbGizZCtaJ++aHDBsDuPZZpLF8hLAO3PVn6tCTOSKNyLLdYZu6Em7aLlJ4WrE80s/vHNtqPmmp2Uc6pb6Rt/b6mzog2Mhp0h+CeTGBD+a6fdZlOv/WJJR3nSWapAiZRZnhmfOKlVRojoN2ox2KVw6WIp6PNMQzGN9+TUAdiEzBCOgJiLTUM3YdNRsAqTyBzMa6tfuyJwSuvHrWYQPPjfHD8d3AfrY1vWm/4pjPhjTHeqzgGPOo69d/gnnKh25RRfIqrwO6o3Z7UOS/5yoyduOxWQiUOjSuvGlQbWnTgQpefQwS2buW2QjVXDU+ajAR0y4uPDMGpw2Zr9zMQjpEccZBRwxhU; 24:5Ldj7uP0fAsG8/aX3GH2KJeTeNB6vfDN7nr4H2+oHyyYuOHIxHj6G56s2rYZqMgGOjGPz+6b/BHhOysKmG+w+UWjNFDqN2gdifx5LjZenwE= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1150; 7: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 X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1150; 20:Zjuq7Wx+XAcp7OLyAswhbAgEoDgCcTn6FHC2BpmRCTPLhltRrA+FFXM8O39cvWwss4isD1MhXfTae0FfThqWvrNoHq7oib+5KwOQBqaNjPUGuy/l0kFXGsuLWTdNJi4IXHHiENNrZdS6sXuyxYAl0FpBEUq5MpLAZKrYpQMKecSQL5pUkoRrk5D3EF41zFBw77yO5k3CT1qvv8bRKh7Ve3OmH4jAD999ouO/+MnovIxGbFdDec51K1JVbIMjSZjv X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jun 2017 14:56:24.5283 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR12MB1150 Cc: Brijesh Singh , Toshimitsu Kani , "Michael S. Tsirkin" , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Boris Ostrovsky , Jonathan Corbet , Joerg Roedel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Larry Woodman , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , Juergen Gross , Paolo Bonzini Subject: [Xen-devel] [PATCH v8 01/38] x86: Document AMD Secure Memory Encryption (SME) X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP Create a Documentation entry to describe the AMD Secure Memory Encryption (SME) feature and add documentation for the mem_encrypt= kernel parameter. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- Documentation/admin-guide/kernel-parameters.txt | 11 ++++ Documentation/x86/amd-memory-encryption.txt | 68 +++++++++++++++++++++++ 2 files changed, 79 insertions(+) create mode 100644 Documentation/x86/amd-memory-encryption.txt diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index 9b0b3de..51e03ee 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -2197,6 +2197,17 @@ memory contents and reserves bad memory regions that are detected. + mem_encrypt= [X86-64] AMD Secure Memory Encryption (SME) control + Valid arguments: on, off + Default (depends on kernel configuration option): + on (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=y) + off (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=n) + mem_encrypt=on: Activate SME + mem_encrypt=off: Do not activate SME + + Refer to Documentation/x86/amd-memory-encryption.txt + for details on when memory encryption can be activated. + mem_sleep_default= [SUSPEND] Default system suspend mode: s2idle - Suspend-To-Idle shallow - Power-On Suspend or equivalent (if supported) diff --git a/Documentation/x86/amd-memory-encryption.txt b/Documentation/x86/amd-memory-encryption.txt new file mode 100644 index 0000000..f512ab7 --- /dev/null +++ b/Documentation/x86/amd-memory-encryption.txt @@ -0,0 +1,68 @@ +Secure Memory Encryption (SME) is a feature found on AMD processors. + +SME provides the ability to mark individual pages of memory as encrypted using +the standard x86 page tables. A page that is marked encrypted will be +automatically decrypted when read from DRAM and encrypted when written to +DRAM. SME can therefore be used to protect the contents of DRAM from physical +attacks on the system. + +A page is encrypted when a page table entry has the encryption bit set (see +below on how to determine its position). The encryption bit can also be +specified in the cr3 register, allowing the PGD table to be encrypted. Each +successive level of page tables can also be encrypted by setting the encryption +bit in the page table entry that points to the next table. This allows the full +page table hierarchy to be encrypted. Note, this means that just because the +encryption bit is set in cr3, doesn't imply the full hierarchy is encyrpted. +Each page table entry in the hierarchy needs to have the encryption bit set to +achieve that. So, theoretically, you could have the encryption bit set in cr3 +so that the PGD is encrypted, but not set the encryption bit in the PGD entry +for a PUD which results in the PUD pointed to by that entry to not be +encrypted. + +Support for SME can be determined through the CPUID instruction. The CPUID +function 0x8000001f reports information related to SME: + + 0x8000001f[eax]: + Bit[0] indicates support for SME + 0x8000001f[ebx]: + Bits[5:0] pagetable bit number used to activate memory + encryption + Bits[11:6] reduction in physical address space, in bits, when + memory encryption is enabled (this only affects + system physical addresses, not guest physical + addresses) + +If support for SME is present, MSR 0xc00100010 (MSR_K8_SYSCFG) can be used to +determine if SME is enabled and/or to enable memory encryption: + + 0xc0010010: + Bit[23] 0 = memory encryption features are disabled + 1 = memory encryption features are enabled + +Linux relies on BIOS to set this bit if BIOS has determined that the reduction +in the physical address space as a result of enabling memory encryption (see +CPUID information above) will not conflict with the address space resource +requirements for the system. If this bit is not set upon Linux startup then +Linux itself will not set it and memory encryption will not be possible. + +The state of SME in the Linux kernel can be documented as follows: + - Supported: + The CPU supports SME (determined through CPUID instruction). + + - Enabled: + Supported and bit 23 of MSR_K8_SYSCFG is set. + + - Active: + Supported, Enabled and the Linux kernel is actively applying + the encryption bit to page table entries (the SME mask in the + kernel is non-zero). + +SME can also be enabled and activated in the BIOS. If SME is enabled and +activated in the BIOS, then all memory accesses will be encrypted and it will +not be necessary to activate the Linux memory encryption support. If the BIOS +merely enables SME (sets bit 23 of the MSR_K8_SYSCFG), then Linux can activate +memory encryption by default (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=y) or +by supplying mem_encrypt=on on the kernel command line. However, if BIOS does +not enable SME, then Linux will not be able to activate memory encryption, even +if configured to do so by default or the mem_encrypt=on command line parameter +is specified.