From patchwork Tue Jun 27 14:56:41 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tom Lendacky X-Patchwork-Id: 9812109 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 54AEC6020A for ; Tue, 27 Jun 2017 14:59:06 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 472E227F97 for ; Tue, 27 Jun 2017 14:59:06 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 3A5D7286AA; Tue, 27 Jun 2017 14:59:06 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 443DE27F97 for ; Tue, 27 Jun 2017 14:59:05 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dPrv7-0002VZ-Kf; Tue, 27 Jun 2017 14:56:49 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dPrv6-0002Uy-FS for xen-devel@lists.xen.org; Tue, 27 Jun 2017 14:56:48 +0000 Received: from [85.158.143.35] by server-10.bemta-6.messagelabs.com id 79/EB-03613-F2272595; Tue, 27 Jun 2017 14:56:47 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA1VSa0hTYRjuOzs7O5rHPjfDt5Gl62JZm7MfGUQ YBJVQNoqIDMqzOm2j3ThnyYICk3VR06KLoIhZNrtYSWEpFXZz0WVqWShJZJkaKC7TpB9ZdM7O Kvt+Pe/3PO/zPi+8tEJ9mtLSnNfD8U7WrqOiSWta0hK9gd+41VhXnLzswtcaciVaG7j7gzChH KXNaXZ5c5XW0pFflHs81/s+cJTKR/WmIhRNk9ingIljYwqpQPgUgmtdJ8OFGh8m4EzhRVSEom gKL4bO4W+EhDXYAj23PiglHI+rCegtw1KDAg9T0NwWpCSCwDOh+rxfIWESz4P7ESMGr4HWF6O khKNwFpQOPAhr1HgtlDwcU0l4Op4Fl1/7lLI+Dp6V94l6WhywEOrvpEnfCjwbGocrw62Ak6Dx +3dKygD4CIKn/q8Rz7lQMfZSJYsSIdBaGfYBvB6u9h+Q4Rx47suWW/0EFPiuq+SihIKy682k3 JsKodJ3kQG9KnhTlI8ihRL6W96TcnGbhFBNO5Jb7OIKIxGcAxcO9SllUVAJTWfbI0OGMTR8ek ydQPqKSbtW/Nu1YtKu1UhxBS0QOD6P4/Xp6QYzb7NYPQ7WZtenG5caHJwgsBbOzpoFw06X4yY Sz2KK+JrQaK3pEZpBE7rpTB1s3KqONbt27bOygnUHv9fOCY9QCk3j84GCTVrS6XJyOmDuuUVZ HM9ZOO9um108sz9KoGN08UynRDOCm3UINotMPUd6uru94RuhDntoE5hxSYQlkXWv86/Fn2PtQ IlaDYPEfOoYN8c7bJ7/+UGUQCOdhqFcokuMzen5O2lQDEGIIcgqkxTCw/6jtPkoYyTY/bmrKj O50zht2yu/paW7Y8WAufBJg6Elc/nQrFs1Rl1Z7obOnsG3UZoPpht5Q4nHLk2l6v3H+0Nt60Z rMxZtSZhQOoyZGU9+bTfUtdpSz6XE5x1s73fu9xUGm1fHlm/eHLsnNL+4POfnFz749CDz8aZD uyp7W68qK7+EH5rQkYKVTU9V8AL7G97VWXanAwAA X-Env-Sender: Thomas.Lendacky@amd.com X-Msg-Ref: server-12.tower-21.messagelabs.com!1498575405!75884323!1 X-Originating-IP: [104.47.32.50] X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG X-StarScan-Received: X-StarScan-Version: 9.4.19; banners=-,-,- X-VirusChecked: Checked Received: (qmail 11540 invoked from network); 27 Jun 2017 14:56:46 -0000 Received: from mail-sn1nam01on0050.outbound.protection.outlook.com (HELO NAM01-SN1-obe.outbound.protection.outlook.com) (104.47.32.50) by server-12.tower-21.messagelabs.com with AES256-SHA256 encrypted SMTP; 27 Jun 2017 14:56:46 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=PupwITcbgZOiYFhEjj5P7mzNS7zg/t6PUiBkt86zAo4=; b=gHWQIfJdbQRdjU99cXkX3RzEFWBnSwaMQhW+dh3MlPSO4Z4SExWiIvAf43l1Pf9+j0gDShlne82QgSvnHv2du/KdxONs1LrhiUiLV5M13YkiTzYrC6kdG9fQjeC5JrGkDpwcG6eGXjilGdSiOtYGJqVTbcjjwQpsrSCptYDsda0= Received: from tlendack-t1.amdoffice.net (165.204.77.1) by DM5PR12MB1145.namprd12.prod.outlook.com (10.168.236.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1199.15; Tue, 27 Jun 2017 14:56:43 +0000 From: Tom Lendacky To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, xen-devel@lists.xen.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Date: Tue, 27 Jun 2017 09:56:41 -0500 Message-ID: <20170627145641.15908.7401.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20170627145607.15908.26571.stgit@tlendack-t1.amdoffice.net> References: <20170627145607.15908.26571.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: DM3PR12CA0060.namprd12.prod.outlook.com (10.161.151.28) To DM5PR12MB1145.namprd12.prod.outlook.com (10.168.236.140) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f3a18ae5-8e61-4b6c-500d-08d4bd6cba17 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(48565401081)(300000503095)(300135400095)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095); SRVR:DM5PR12MB1145; X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1145; 3: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 X-MS-TrafficTypeDiagnostic: DM5PR12MB1145: X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1145; 25: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 X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1145; 31: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 X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1145; 20:5M1/OpI999z/DhjchAeu+AjYsqoLHsgBZq+lYDEOYZgKPmhE9WSo+7u2F8qRanlTL72g4bjTnihMQSgqDnIMW/HN296WG17sMtnR91JI7BB8URIKiyULhNs+nC8rLrRkGIKw90qB2dvSgm6c5PX4OmKzPvFfzgal1j85lqpszf3l4+yri5F+RJZwLH7Y8AtubTtYjlwv+k/CoaAoNiumk+D2Vap+N939E49SvjSKdKpEHnENh6MPTIKQkZ8QxFNND48xn/Hdyw8LpDJ6ZP+t3lk+W/s3hJXjKXGQf8T+nCyDerm2hLGT9V6QlE25yYFuL/MqGzugRMlHS+2K1wyyuoRe0TgEl7c4H3SlGNbVj9itoHxt07fz/J50pzqArDAGGTt2YyggOtjIr2YTXMA3wqgvEiC2eYMpDl8tSu3dXRuMLL55kf11dOje+1IlB4dPu3O30QWY85tNckiensDC/qaJRMJLhJM8Q/KIHvePVYo0tSlZeoB3znCG+VvSsLrT X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(236129657087228)(767451399110)(48057245064654); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(10201501046)(100000703101)(100105400095)(6055026)(6041248)(20161123558100)(20161123560025)(20161123564025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM5PR12MB1145; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM5PR12MB1145; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTVQUjEyTUIxMTQ1OzQ6cW05VncvVDlNMStBM0NVOC9EVjNNMGprc2kr?= =?utf-8?B?V2ErVHNyRXh2L2FkRlRPZFRXSHN6bFJYckY1UmlpUlBXY1lqUk1xTXlvUkk2?= =?utf-8?B?SjFJRXNQQTlyQWFORzd3VU1XeituSzhqZW96QVdtMzhpejJjTllFQkJaN0I0?= =?utf-8?B?THA3cmhwaU9uYUN2N1FRQ0JTRW5PN0NSdk9pRk5mUVFuMTM2emlBbEFzcENG?= =?utf-8?B?aCtIWjBTTjh5Q2hXUXBrNVRFY0lvUFBFVE1iTmR3cHdCZlFrcEd0ZGlvRExN?= =?utf-8?B?Z3cvK1IvR2QvQU9LcjNUTEtMRWM2ZnZJSDN4emp1ZEVaaHM5T1R0Y1dGQkto?= =?utf-8?B?dW4vbU13YXY1NTBLVXVaeVNuQ1FGZ2pHc0xGU1BwOTFpQldlNVRtem5PU2Vn?= =?utf-8?B?U2lrUkQ4NXVCaEpiUjJxNm1KM0p5NE00SW5jcVI5WTVBSkdNd2s1YVcwQUJn?= =?utf-8?B?VkZqc2VVNjcwU21tSzZHZ3Z3WTU2Z3NSRldRV2tLbXRxcXR5eDZTWFNJNHkv?= =?utf-8?B?YXozaHpZL3Z6WHQ1azE3TXR1S2ZoVlRNcWQ0U1pVeW5kNlZMTzRVSUplNnNy?= =?utf-8?B?SXJsYWM4dE50bFB6UXN2UzBwUTFLbjE2WUQzUHl1d2dvREJEWkdHSVNscVh4?= =?utf-8?B?UW5TMkZEZHB1eEdlR2MvWWs0a2VoNkxNeFAvN0k0YVJXSTdpd0J4eWZMdGJv?= =?utf-8?B?eWNMS3FzSW5uM01XV1ZTR1A3bVgzWTBNNHhJcmluSS9sMjV5MnkwbkVEblBX?= =?utf-8?B?SVl6eVQ0ZERHVk1XWDR6dDRwUzR1My9iMVNqbXlUOGJHOVNxRzJEcE9WYjlP?= =?utf-8?B?NlRvUTdnbnBwWW1DMzVXQjhpZy9XcjY2a2MxMXEwN1pUZUhPQStzcXNTMTdI?= =?utf-8?B?V0VCaThpeE9SQmlpRWJ1WUtSZzFST1JhUE1jWk1pditUb2g0ZGN2SkY0M3gz?= =?utf-8?B?enhaRlBDbmRwYk5jZERXRnJrYTVjTCs0NkxWSjBKK1JkMlJ0RTRBaUxkSVg5?= =?utf-8?B?ZEk3L1F4R1ByZTZiZElyUlI0eUNYWUFBVnFoOU0yMUJPUEVSOWZGOTFEUnFZ?= =?utf-8?B?NG9kdmRYeGcyVmljdlFGTlpJM0tLaWhUN1dSSVo4WU0yY2pKcW9pa3E3eFhr?= =?utf-8?B?REZ1M3FKRnEzckhmVWJqUFJBQjdaQTB4eURtZnd2eVl2bXpjMldEbzRQY2U1?= =?utf-8?B?NHA1TjBxeUQvVVpYeGxFMmk4TGZVcFI0QXlhRTdwckxJRE1TMmxlRzBCVEE1?= =?utf-8?B?c1dmZzFPYVo4S2drbWE4aFNtSEdtZzRxenBRTGxlMGRsVjRKbVR2VlRacTBx?= =?utf-8?B?NlRndU1zV2MyejJBM25vZTdhMmM2YU1xU2FZNnh6dy9URGR5czVycUt2ZHhx?= =?utf-8?B?VFdCT1ZZd21OY3F5UndtejhibjFvSXRMbFNxYlkxaXpjNHpUTUZqb2FLci9p?= =?utf-8?B?UGsybEtqZyttTTZNdkxJNDl5dFVUOEpKKzB1ZFhJa3lSaGVLcWliajBYVEdh?= =?utf-8?B?Nk1kSmQwbGk3VTYzZjdGSHVUZWZRVGlCbVo3RGZYVnpyWndLVE5Cb1AzbWdI?= =?utf-8?B?NDR4NjB6VFM3TStLUTlacVBFSHVjY0dMZElLNmFBTWo5ZzNpY1ErTWE0Qi8w?= =?utf-8?B?RG1tZkdmdkFxYlFGQWJvczM1a1RiRi92QnpXOU9jZEMrUjd1V0JOamtiYkNT?= =?utf-8?Q?frBbw7PWqQEvX6C8ES83ZdCemBgWo+2Pi3YdNa?= X-Forefront-PRVS: 0351D213B3 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39840400002)(39400400002)(39410400002)(39850400002)(39860400002)(39450400003)(83506001)(2950100002)(4001350100001)(9686003)(50466002)(53936002)(72206003)(33646002)(7736002)(55016002)(25786009)(189998001)(4326008)(110136004)(38730400002)(66066001)(54906002)(23676002)(5660300001)(86362001)(47776003)(2906002)(6506006)(7406005)(3846002)(53416004)(478600001)(7416002)(1076002)(103116003)(305945005)(54356999)(76176999)(42186005)(50986999)(8676002)(230700001)(6116002)(81166006)(97746001)(921003)(1121003); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR12MB1145; H:tlendack-t1.amdoffice.net; FPR:; SPF:None; MLV:sfv; LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTVQUjEyTUIxMTQ1OzIzOmo3OWtvUElUUGVmTE9jRGJKaUhjc3d4SHVl?= =?utf-8?B?OE9sNTBGeTkxZkE1cFVoUWYyZzJjRmhuaEhiOXpyNVppWGR1bThvQzkzOXl6?= =?utf-8?B?azFWRUEvQVIvYS9vd3ByY3hvNngwbFdFUzJ1RmlZYnZvL3F0ZEIzREsxdHdO?= =?utf-8?B?RHdwQmZwNVhwWTFEREdDUGJkM2kzUFlOTUFqYzQ5S3dKRGcrcUhnbTdMbHVT?= =?utf-8?B?aW1RZ3NmYmhoNERINGZSbTdQV3ZEdFNlaXVmQVltMHpIL3NBRjdBRzF4YzZ1?= =?utf-8?B?blpvdDc0NjJjd1lqYWN6bmIzbkZpK0pNbkVEZjM1UU9LbUlsaWNHSFBQdjJh?= =?utf-8?B?V1oxV3YxVCtmc3Z5UlNNUXhIVHhmMkMwT1YreU1tMllSejRNS0c2aVF4eDB6?= =?utf-8?B?YVFrVHo0R2tBMWJ1V2JkRkgvSzlROEdVUDg4STRhTlZLQ3E4QmxIaVpBbmkx?= =?utf-8?B?Rm4vMytDTkpPaEFFOWZkYkZqOXFLcnpZTzArNXVpSy9LNkVzKzJ0a1lmRjkz?= =?utf-8?B?OHJPelpPeXRpUzFWTk5yQ2xnNW5ieVFIZm5Bc3BHL1lnNTRKTkg0dFVTNE5j?= =?utf-8?B?VWQ3a3QzeUdPTjE1UmU0VDA5ZFRMVGFsVXlTQUlDb252Rk9sZUhwQ01VK3Js?= =?utf-8?B?SkFaZEYzaWoxQWxCRm1nR0x5cFNLSnczMTRlQk1sc3VlWTZ5SnkyZCtTOTc1?= =?utf-8?B?Nkp1bENKemlvRnU5SU5XWEJuRlgzeURJYVJINFVVaWNGZlBQVkVSdW9VMEc0?= =?utf-8?B?UmordEVRZlhxV1FGMUdSS3paVkF6blVRY1A3cWd6Smp2b3FZbFFVSnFmamx2?= =?utf-8?B?SWc4LytGL2V1bFlYRDRxWk5IMmU1TU1EWEw0SmJPMkpBcy8rS21xRVEvNU5M?= =?utf-8?B?YkRkbjYwWnNpVXBtam9iVHpTV2srNkgwMHhlTExCQzkxYTlSVFZJdGV4R0NI?= =?utf-8?B?eEdmNytYcmxnQTVrYk41Yys0K25Ub2xHTGxqd3ZBcmtnSDBldTRienF6aEhO?= =?utf-8?B?S29VRU51a0Zab1o5VlBGa0paYUY5cTNVVVJwYjVkU0ZrQzEzN0R3L2pOeWpH?= =?utf-8?B?S2dNaVlqaUlDUk9PZ1d4VnFKM1BFcE1JZnhUWEpidzRZNEFTRnA5QkI4ZFBx?= =?utf-8?B?Rld1Z3BLZUw2UEhHaGhHSHRDRlduRkRFSkQ2Tm0xUS8zaU52VWdQVzNGRWJo?= =?utf-8?B?Wk1pTzdJWWtSVWRSKytDUEZDVHhVN2dRQTNlN042KytPT0dTM3RGallRMmhE?= =?utf-8?B?TnlMYi9uRzRtWlgzSXRDTWRWOW5WTzZrQ1lvVGdOaExBVzAwbHZoN2ErQUtH?= =?utf-8?B?aWJBc2lkVkJUcEZYeVJ0S2hMYkdjd3A3WWRPc0FSQWc4bEdMMXA3b1ZwQkk4?= =?utf-8?B?bXFDSVhYZTVNblVFOFg3THB0VHE4V2ZZUitLTkFrTlpyay9YTlFOL0ZSQ21O?= =?utf-8?B?aitlQkhvVG1xelg1RzdzdFpIVkY3a1Q3bFJDSnczd0pVNUNTZnh2WXVaQmNh?= =?utf-8?B?VEJEblZZVXpGRHpxb2FlSmUzbjlwSEY4V0htODNlRFlkVFppc0tGNXMrbERw?= =?utf-8?B?UUxjZ1pLeFdoRmIxTU1leWM5c3ZKNEJRM0lGOGk4eVlYanRwbUpJMk0xaCtt?= =?utf-8?B?cHNoamloUEdMM3ZuRkduZDE3VVlTcllaazhQZityUDZXNm56VTNNcjVYSUJD?= =?utf-8?Q?Gcyrrrf4kf1wI/H6MM=3D?= X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTVQUjEyTUIxMTQ1OzY6eW1jeU1Xa0NpcG13cW1QT0VrUWNPaVh5SnpO?= =?utf-8?B?TTA1RXZBL0RITit2ZWpKSW5tVXI2NVo0SHA0Z1lSdWVhci9uTXh2cm9od1JT?= =?utf-8?B?cVVSdXpabTYybUFOS21DNG40VWcxbFFwcTB3MGpueG5jU1F4YnFJU0NhUHFM?= =?utf-8?B?cUJrd3YxckhsVU51cW43NGV4V3NBZUhIV3E5RmJkd1BZbE1OU0FaaS9HZndN?= =?utf-8?B?Ry8zdzB0ZzN2OEZMc01ZSDgzVEVCUlMxSXcvZ0VJVE00OTJhQkV5TDZOaFp5?= =?utf-8?B?Ty9VT3JITmVsL3BkRDN6ajczSXZ1K0QwZlcxNHE0emh2ejdETXp2aEhUVjk0?= =?utf-8?B?Z0VGRGVlZFRYaWVybUhCTGN1bE5mbjIrN3hRVHp3dDlYNnAwMUxHbnBjT2Va?= =?utf-8?B?RE9BdWk4VHZPbU5FT21Yems5VSt3MENRdVhJRm44TXoxbXk4MEdlMUFYU1ls?= =?utf-8?B?U2xmVEpZeHk1OU1oVTRid1ZsRHYxZ1g1aTFhNEtJeFU5NEYzcEJPL1JMWWwx?= =?utf-8?B?Vy9aZ3pnaDdsT1RNZzBPV2dMaERGYTBMeVhobWE3Z1FJcVZPUE5mK2xyNUs0?= =?utf-8?B?Q0xqcm1OeXRJMjJLbi9KOWxqMlZGdU9OS2FIVlBCWXNKNkhVU0R6NkJTOHlI?= =?utf-8?B?TnFCc0dGR3YwTTN3YytUWDI3NC9SRWxnbFZDWVJVSjRPQ0dhUGdpcXpmL0ZJ?= =?utf-8?B?Z2FQWXkyQjVUOVNuMGtlZzhvSXlhOEFzcENYM2h4dFl0YTJSN3RILzlEMnJa?= =?utf-8?B?Q1hPclZnbnRUN203dkxEb3BMRE9BL0F3Q1AwR0Y5d3lvUlluTUNGRXFqVFIr?= =?utf-8?B?M1JPMkFTK3RuSGJCeUNHbERhT21CTzBpalpmYkdySmF0SitQdTdCSnBLd3dS?= =?utf-8?B?NmJ6MHBhWjBXVkhJZkxoSzJrMFgxanhuN1N3bEtvVyt0bmM0M1lPSzdxelVR?= =?utf-8?B?VE42ams4YjRNa1Y1N2FVQnZ6aEtncWVXZkMxVGkrQ1lZOWU5OUVmV3YwS2gv?= =?utf-8?B?OUgzZWVWL1NlcVNlbFltUXRyU1UzbUZBdXppamNJdlpqdVp1b3pUZVZLYS9w?= =?utf-8?B?Z29TTDZvTUEvaGNBdnptYzV4bVliWEhVdmFRelVVV3ZDVmtJK0NkN0dPQ2V5?= =?utf-8?B?alZKUlJvSkdnck1mam8wMGlma09XeEVYcXRtTXFmN1BrVTJBdkhEcW0yNW5Z?= =?utf-8?B?L3RTRm56d09YRmxyU2pBb2E5MWh4SW5nTXdvbGNwL2szSkszNkU0S0Z3aUZU?= =?utf-8?B?NTVPTVNFU1habENIZDVQdDduYTZ4RFBjOFprNXBzOGZBdFYzNDZSQlhJTmpW?= =?utf-8?B?djIzaG9xSDZxSHdkVFBBNlljQjRQSEhzaGEyOU1wVFYwU21hcDdOR0Q4YU1Y?= =?utf-8?Q?KlaNZ2m?= X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1145; 5: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; 24:CUDd7KhJLNlJBSmL54rfzdNKwvQA9FBiW4QyeABQF8HzOQ5KtXrXbZa5z2+hRFEtJvUXc06IaF8xcNsjwcS3PJyzCX0wNtdLW1lEd/Wv7xg= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1145; 7: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 X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1145; 20:y3mUxnL1KAWOvT/F4++hJ6vKBgVjsnbIglL+kqYwdK9aPJ3aAAX+MDFZAjn3f4+ZOLTbdQVGW1egEz2M80mrzCXw5gFw/eS+0WM+04o0mViPeljIUcyT+Ud8AUv8MMl7rcGikZmxkd+PmmWXnmDpmmCO5X5qAGZSDpKmbHnPAP8QM9MefoP73ofmgapLilvOeWzFZh8qUV7ThjOt7HMRyDA1/LqZ52ZVaO+FVMGMdVWI7+EiIAiO/uNMtTb7eUU4 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jun 2017 14:56:43.4008 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB1145 Cc: Brijesh Singh , Toshimitsu Kani , "Michael S. Tsirkin" , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Boris Ostrovsky , Jonathan Corbet , Joerg Roedel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Larry Woodman , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , Juergen Gross , Paolo Bonzini Subject: [Xen-devel] [PATCH v8 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP The ioremap() function is intended for mapping MMIO. For RAM, the memremap() function should be used. Convert calls from ioremap() to memremap() when re-mapping RAM. This will be used later by SME to control how the encryption mask is applied to memory mappings, with certain memory locations being mapped decrypted vs encrypted. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- arch/x86/include/asm/dmi.h | 8 ++++---- arch/x86/kernel/acpi/boot.c | 6 +++--- arch/x86/kernel/kdebugfs.c | 34 +++++++++++----------------------- arch/x86/kernel/ksysfs.c | 28 ++++++++++++++-------------- arch/x86/kernel/mpparse.c | 10 +++++----- arch/x86/pci/common.c | 4 ++-- drivers/firmware/dmi-sysfs.c | 5 +++-- drivers/firmware/pcdp.c | 4 ++-- drivers/sfi/sfi_core.c | 22 +++++++++++----------- 9 files changed, 55 insertions(+), 66 deletions(-) diff --git a/arch/x86/include/asm/dmi.h b/arch/x86/include/asm/dmi.h index 3c69fed..a8e15b0 100644 --- a/arch/x86/include/asm/dmi.h +++ b/arch/x86/include/asm/dmi.h @@ -13,9 +13,9 @@ static __always_inline __init void *dmi_alloc(unsigned len) } /* Use early IO mappings for DMI because it's initialized early */ -#define dmi_early_remap early_ioremap -#define dmi_early_unmap early_iounmap -#define dmi_remap ioremap_cache -#define dmi_unmap iounmap +#define dmi_early_remap early_memremap +#define dmi_early_unmap early_memunmap +#define dmi_remap(_x, _l) memremap(_x, _l, MEMREMAP_WB) +#define dmi_unmap(_x) memunmap(_x) #endif /* _ASM_X86_DMI_H */ diff --git a/arch/x86/kernel/acpi/boot.c b/arch/x86/kernel/acpi/boot.c index 6bb6806..850160a 100644 --- a/arch/x86/kernel/acpi/boot.c +++ b/arch/x86/kernel/acpi/boot.c @@ -115,7 +115,7 @@ #define ACPI_INVALID_GSI INT_MIN /* - * This is just a simple wrapper around early_ioremap(), + * This is just a simple wrapper around early_memremap(), * with sanity checks for phys == 0 and size == 0. */ char *__init __acpi_map_table(unsigned long phys, unsigned long size) @@ -124,7 +124,7 @@ char *__init __acpi_map_table(unsigned long phys, unsigned long size) if (!phys || !size) return NULL; - return early_ioremap(phys, size); + return early_memremap(phys, size); } void __init __acpi_unmap_table(char *map, unsigned long size) @@ -132,7 +132,7 @@ void __init __acpi_unmap_table(char *map, unsigned long size) if (!map || !size) return; - early_iounmap(map, size); + early_memunmap(map, size); } #ifdef CONFIG_X86_LOCAL_APIC diff --git a/arch/x86/kernel/kdebugfs.c b/arch/x86/kernel/kdebugfs.c index 38b6458..fd6f8fb 100644 --- a/arch/x86/kernel/kdebugfs.c +++ b/arch/x86/kernel/kdebugfs.c @@ -33,7 +33,6 @@ static ssize_t setup_data_read(struct file *file, char __user *user_buf, struct setup_data_node *node = file->private_data; unsigned long remain; loff_t pos = *ppos; - struct page *pg; void *p; u64 pa; @@ -47,18 +46,13 @@ static ssize_t setup_data_read(struct file *file, char __user *user_buf, count = node->len - pos; pa = node->paddr + sizeof(struct setup_data) + pos; - pg = pfn_to_page((pa + count - 1) >> PAGE_SHIFT); - if (PageHighMem(pg)) { - p = ioremap_cache(pa, count); - if (!p) - return -ENXIO; - } else - p = __va(pa); + p = memremap(pa, count, MEMREMAP_WB); + if (!p) + return -ENOMEM; remain = copy_to_user(user_buf, p, count); - if (PageHighMem(pg)) - iounmap(p); + memunmap(p); if (remain) return -EFAULT; @@ -109,7 +103,6 @@ static int __init create_setup_data_nodes(struct dentry *parent) struct setup_data *data; int error; struct dentry *d; - struct page *pg; u64 pa_data; int no = 0; @@ -126,16 +119,12 @@ static int __init create_setup_data_nodes(struct dentry *parent) goto err_dir; } - pg = pfn_to_page((pa_data+sizeof(*data)-1) >> PAGE_SHIFT); - if (PageHighMem(pg)) { - data = ioremap_cache(pa_data, sizeof(*data)); - if (!data) { - kfree(node); - error = -ENXIO; - goto err_dir; - } - } else - data = __va(pa_data); + data = memremap(pa_data, sizeof(*data), MEMREMAP_WB); + if (!data) { + kfree(node); + error = -ENOMEM; + goto err_dir; + } node->paddr = pa_data; node->type = data->type; @@ -143,8 +132,7 @@ static int __init create_setup_data_nodes(struct dentry *parent) error = create_setup_data_node(d, no, node); pa_data = data->next; - if (PageHighMem(pg)) - iounmap(data); + memunmap(data); if (error) goto err_dir; no++; diff --git a/arch/x86/kernel/ksysfs.c b/arch/x86/kernel/ksysfs.c index 4afc67f..ee51db9 100644 --- a/arch/x86/kernel/ksysfs.c +++ b/arch/x86/kernel/ksysfs.c @@ -16,8 +16,8 @@ #include #include #include +#include -#include #include static ssize_t version_show(struct kobject *kobj, @@ -79,12 +79,12 @@ static int get_setup_data_paddr(int nr, u64 *paddr) *paddr = pa_data; return 0; } - data = ioremap_cache(pa_data, sizeof(*data)); + data = memremap(pa_data, sizeof(*data), MEMREMAP_WB); if (!data) return -ENOMEM; pa_data = data->next; - iounmap(data); + memunmap(data); i++; } return -EINVAL; @@ -97,17 +97,17 @@ static int __init get_setup_data_size(int nr, size_t *size) u64 pa_data = boot_params.hdr.setup_data; while (pa_data) { - data = ioremap_cache(pa_data, sizeof(*data)); + data = memremap(pa_data, sizeof(*data), MEMREMAP_WB); if (!data) return -ENOMEM; if (nr == i) { *size = data->len; - iounmap(data); + memunmap(data); return 0; } pa_data = data->next; - iounmap(data); + memunmap(data); i++; } return -EINVAL; @@ -127,12 +127,12 @@ static ssize_t type_show(struct kobject *kobj, ret = get_setup_data_paddr(nr, &paddr); if (ret) return ret; - data = ioremap_cache(paddr, sizeof(*data)); + data = memremap(paddr, sizeof(*data), MEMREMAP_WB); if (!data) return -ENOMEM; ret = sprintf(buf, "0x%x\n", data->type); - iounmap(data); + memunmap(data); return ret; } @@ -154,7 +154,7 @@ static ssize_t setup_data_data_read(struct file *fp, ret = get_setup_data_paddr(nr, &paddr); if (ret) return ret; - data = ioremap_cache(paddr, sizeof(*data)); + data = memremap(paddr, sizeof(*data), MEMREMAP_WB); if (!data) return -ENOMEM; @@ -170,15 +170,15 @@ static ssize_t setup_data_data_read(struct file *fp, goto out; ret = count; - p = ioremap_cache(paddr + sizeof(*data), data->len); + p = memremap(paddr + sizeof(*data), data->len, MEMREMAP_WB); if (!p) { ret = -ENOMEM; goto out; } memcpy(buf, p + off, count); - iounmap(p); + memunmap(p); out: - iounmap(data); + memunmap(data); return ret; } @@ -250,13 +250,13 @@ static int __init get_setup_data_total_num(u64 pa_data, int *nr) *nr = 0; while (pa_data) { *nr += 1; - data = ioremap_cache(pa_data, sizeof(*data)); + data = memremap(pa_data, sizeof(*data), MEMREMAP_WB); if (!data) { ret = -ENOMEM; goto out; } pa_data = data->next; - iounmap(data); + memunmap(data); } out: diff --git a/arch/x86/kernel/mpparse.c b/arch/x86/kernel/mpparse.c index 0d904d7..fd37f39 100644 --- a/arch/x86/kernel/mpparse.c +++ b/arch/x86/kernel/mpparse.c @@ -436,9 +436,9 @@ static unsigned long __init get_mpc_size(unsigned long physptr) struct mpc_table *mpc; unsigned long size; - mpc = early_ioremap(physptr, PAGE_SIZE); + mpc = early_memremap(physptr, PAGE_SIZE); size = mpc->length; - early_iounmap(mpc, PAGE_SIZE); + early_memunmap(mpc, PAGE_SIZE); apic_printk(APIC_VERBOSE, " mpc: %lx-%lx\n", physptr, physptr + size); return size; @@ -450,7 +450,7 @@ static int __init check_physptr(struct mpf_intel *mpf, unsigned int early) unsigned long size; size = get_mpc_size(mpf->physptr); - mpc = early_ioremap(mpf->physptr, size); + mpc = early_memremap(mpf->physptr, size); /* * Read the physical hardware table. Anything here will * override the defaults. @@ -461,10 +461,10 @@ static int __init check_physptr(struct mpf_intel *mpf, unsigned int early) #endif pr_err("BIOS bug, MP table errors detected!...\n"); pr_cont("... disabling SMP support. (tell your hw vendor)\n"); - early_iounmap(mpc, size); + early_memunmap(mpc, size); return -1; } - early_iounmap(mpc, size); + early_memunmap(mpc, size); if (early) return -1; diff --git a/arch/x86/pci/common.c b/arch/x86/pci/common.c index 190e718..08cf71c 100644 --- a/arch/x86/pci/common.c +++ b/arch/x86/pci/common.c @@ -691,7 +691,7 @@ int pcibios_add_device(struct pci_dev *dev) pa_data = boot_params.hdr.setup_data; while (pa_data) { - data = ioremap(pa_data, sizeof(*rom)); + data = memremap(pa_data, sizeof(*rom), MEMREMAP_WB); if (!data) return -ENOMEM; @@ -710,7 +710,7 @@ int pcibios_add_device(struct pci_dev *dev) } } pa_data = data->next; - iounmap(data); + memunmap(data); } set_dma_domain_ops(dev); set_dev_domain_options(dev); diff --git a/drivers/firmware/dmi-sysfs.c b/drivers/firmware/dmi-sysfs.c index ef76e5e..d5de6ee 100644 --- a/drivers/firmware/dmi-sysfs.c +++ b/drivers/firmware/dmi-sysfs.c @@ -25,6 +25,7 @@ #include #include #include +#include #define MAX_ENTRY_TYPE 255 /* Most of these aren't used, but we consider the top entry type is only 8 bits */ @@ -380,7 +381,7 @@ static ssize_t dmi_sel_raw_read_phys32(struct dmi_sysfs_entry *entry, u8 __iomem *mapped; ssize_t wrote = 0; - mapped = ioremap(sel->access_method_address, sel->area_length); + mapped = dmi_remap(sel->access_method_address, sel->area_length); if (!mapped) return -EIO; @@ -390,7 +391,7 @@ static ssize_t dmi_sel_raw_read_phys32(struct dmi_sysfs_entry *entry, wrote++; } - iounmap(mapped); + dmi_unmap(mapped); return wrote; } diff --git a/drivers/firmware/pcdp.c b/drivers/firmware/pcdp.c index 75273a25..e83d6ae 100644 --- a/drivers/firmware/pcdp.c +++ b/drivers/firmware/pcdp.c @@ -95,7 +95,7 @@ if (efi.hcdp == EFI_INVALID_TABLE_ADDR) return -ENODEV; - pcdp = early_ioremap(efi.hcdp, 4096); + pcdp = early_memremap(efi.hcdp, 4096); printk(KERN_INFO "PCDP: v%d at 0x%lx\n", pcdp->rev, efi.hcdp); if (strstr(cmdline, "console=hcdp")) { @@ -131,6 +131,6 @@ } out: - early_iounmap(pcdp, 4096); + early_memunmap(pcdp, 4096); return rc; } diff --git a/drivers/sfi/sfi_core.c b/drivers/sfi/sfi_core.c index 296db7a..d5ce534 100644 --- a/drivers/sfi/sfi_core.c +++ b/drivers/sfi/sfi_core.c @@ -86,13 +86,13 @@ /* * FW creates and saves the SFI tables in memory. When these tables get * used, they may need to be mapped to virtual address space, and the mapping - * can happen before or after the ioremap() is ready, so a flag is needed + * can happen before or after the memremap() is ready, so a flag is needed * to indicating this */ -static u32 sfi_use_ioremap __read_mostly; +static u32 sfi_use_memremap __read_mostly; /* - * sfi_un/map_memory calls early_ioremap/iounmap which is a __init function + * sfi_un/map_memory calls early_memremap/memunmap which is a __init function * and introduces section mismatch. So use __ref to make it calm. */ static void __iomem * __ref sfi_map_memory(u64 phys, u32 size) @@ -100,10 +100,10 @@ static void __iomem * __ref sfi_map_memory(u64 phys, u32 size) if (!phys || !size) return NULL; - if (sfi_use_ioremap) - return ioremap_cache(phys, size); + if (sfi_use_memremap) + return memremap(phys, size, MEMREMAP_WB); else - return early_ioremap(phys, size); + return early_memremap(phys, size); } static void __ref sfi_unmap_memory(void __iomem *virt, u32 size) @@ -111,10 +111,10 @@ static void __ref sfi_unmap_memory(void __iomem *virt, u32 size) if (!virt || !size) return; - if (sfi_use_ioremap) - iounmap(virt); + if (sfi_use_memremap) + memunmap(virt); else - early_iounmap(virt, size); + early_memunmap(virt, size); } static void sfi_print_table_header(unsigned long long pa, @@ -507,8 +507,8 @@ void __init sfi_init_late(void) length = syst_va->header.len; sfi_unmap_memory(syst_va, sizeof(struct sfi_table_simple)); - /* Use ioremap now after it is ready */ - sfi_use_ioremap = 1; + /* Use memremap now after it is ready */ + sfi_use_memremap = 1; syst_va = sfi_map_memory(syst_pa, length); sfi_acpi_init();