From patchwork Tue Jun 27 15:07:31 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tom Lendacky X-Patchwork-Id: 9812361 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 841D660351 for ; Tue, 27 Jun 2017 15:10:06 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 77AC028589 for ; Tue, 27 Jun 2017 15:10:06 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 6C29A286BC; Tue, 27 Jun 2017 15:10:06 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 8CC0E286D1 for ; Tue, 27 Jun 2017 15:10:05 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dPs5f-0007HU-Gi; Tue, 27 Jun 2017 15:07:43 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dPs5e-0007H6-Vo for xen-devel@lists.xen.org; Tue, 27 Jun 2017 15:07:43 +0000 Received: from [85.158.139.211] by server-12.bemta-5.messagelabs.com id 1D/BE-01735-EB472595; Tue, 27 Jun 2017 15:07:42 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA1VSe0hTcRTe7z62qzn5OQ1Po3ystKcvIoj6Jyt BIU00pEVUd3XbvbVN251hBWlTEqxspVlOs2kpZA+xIl1ZRqFS2Ds1ev2xosfAqMyikupeN83+ +77zfec758BhSE2ZUstwBTbOamFNOmUgxSfEZsR12LL0ieXf4hee+nySWoJSu67+IjLRGlqwG HILNtB8u32AzhuZWeDu+EwXodboMhTIULiEhM7qSlomCFcgODdwmJSJBu8l4FV7MVWGAhglng f9g18JGYfiLLjvPY5kHIZdBHiqsNxA4kElXL/Xq5QFAk8FV0MjKWMKx8C7105axmqcCiUVPaN BATgNThzpH8Uaqd7745pKxpNxBJx+XOL3h8Dt6jfSEow0YDa0XEmQyySOhLbB2tF4wFHQ9v27 Ut4BcCmC509H/JkzwDn0QOUzTYOuu7WUD6fDh0/1hJwJeDrcKcnw9TYScOjGKcpHDijB+8W3H OA5sP/sb7/gUUHT0VaVn9Dg8TygfeQyBdUjb/1LmWDYc9HvqkPw8VW7v7+XhsZ9D0kf+aMBx/ nXKgeKc0641vnvWueEa12IbEazRM66nbPGzU+MN1gFI28zs4IpLilxQbyZE0XWyJlYgxi/Mdd 8AUmPUahQoHbkaM64iaYwhG6y+gxk6TXBhtxNO3hW5Ndb802ceBPNZBjc0GXP1lKWXAunA3Wz KNlCrJyRK9gsmKRHG3MCE6QLU/fnSbJazGPNomD0SXdQtDZcXSr3YVng8y3jbWMv+ghN04aqk UKh0ATlcVazYPtf96JwBulC1fVySpBgsY2ne6XBhDSYqsuUB9vYf5K2CCW71/aY+2LpmuGdOe 83J6e/2BNZZtjyc9LQUIMiun9R+c6elhUVB/UX5x5ze1Na781Pbo4kzvCuYmVnd9/idQkOwX7 JU7PUttuuD36yOuDAS3d35YI1UdsKs5pWLftUuHJ5xCrhTdtWPuXKtmf7v+1yXM2Zkj4pLTtm uKqGqHbdShnUUSLPJs0hrSL7Fx9CSlOdAwAA X-Env-Sender: Thomas.Lendacky@amd.com X-Msg-Ref: server-3.tower-206.messagelabs.com!1498576059!101729163!1 X-Originating-IP: [104.47.38.78] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.19; banners=-,-,- X-VirusChecked: Checked Received: (qmail 14478 invoked from network); 27 Jun 2017 15:07:40 -0000 Received: from mail-bl2nam02on0078.outbound.protection.outlook.com (HELO NAM02-BL2-obe.outbound.protection.outlook.com) (104.47.38.78) by server-3.tower-206.messagelabs.com with AES256-SHA256 encrypted SMTP; 27 Jun 2017 15:07:40 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=BMKWUnVGbAemP6ETsJwrXL4mf2o/1Ccu89qZT0dk/n0=; b=Te6xrw6ePacEOhlYkQbe7Ty6aWc5eOo2iYJT8zfsaCvmkaanzIUA4UlnCLN1EG+9GhwfrcrT5DOSGmL1PfYSBhVZ+Vr3gMmZOa+Wp1S3LJRNCdqBJAA9DK2X6PTlmIaA9mzTc+aft8PU2oN611BROW0FH8Cy/59nQMbfbWYTTtw= Received: from tlendack-t1.amdoffice.net (165.204.77.1) by BN6PR12MB1138.namprd12.prod.outlook.com (10.168.226.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1199.15; Tue, 27 Jun 2017 15:07:32 +0000 From: Tom Lendacky To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, xen-devel@lists.xen.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Date: Tue, 27 Jun 2017 10:07:31 -0500 Message-ID: <20170627150731.17428.51715.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20170627150718.17428.81813.stgit@tlendack-t1.amdoffice.net> References: <20170627150718.17428.81813.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: DM3PR12CA0052.namprd12.prod.outlook.com (10.161.151.20) To BN6PR12MB1138.namprd12.prod.outlook.com (10.168.226.140) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 3cf58897-53a4-4cd5-07ba-08d4bd6e3df8 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(48565401081)(300000503095)(300135400095)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095); SRVR:BN6PR12MB1138; X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1138; 3:Yi4iWIbBro2tKfEU1q6V092q3BKkxq7x9SDCRyDdtpMbHv1tdd6oYl7lXuEl1TOFnoqADT2ZKwL4/344N3Yb/AVQiHXQdJgYdnqyD63QJGWymygBnLKTO+VDdMiAL0VTWS/sU6ZVhoY+Zg2g23sHE9A+GSGtc8Tui9CqlBYai1tIngyxvDR2veEHxuiI3xRE/uQzXbxodAu6WGAwyG5VHG1Q4LCdRF1M9MdXtJ0SkWZNDsHQm9OuJlLUlDryYSvUtCJjIQJzUhk3ruZk0P7c6TpUXAsTvT6TP5n6UctFmAbmgL8QpUmY7KJYfZnvI+RD2r2y0rM9mfcEgYcKWryVcKiHZB+6HHYQmBZEP8OOOp3YQtSoqwt0QpXgNYQt5+J2uQmSFP3PQXFZPXFZCm0l1lXuIhfKERUZFL5xdk+kthdfp9lzE9N/MfKUcMk2pUN97j5nYy5T3HMr5HdzL28U70Kx4T5VEGoZQJ2FPE5FcYHLQXU9Ubh8/HOTRtWI94Qyfq1qd53m6UENgQ7LcSFgihpBCT5/kci+QMwT0vB9OdNwqHHo4xG+pWIa+lVo6MLuXr5GrDMtveGvLajN8p1BVhyu7RtzGgIc3vz5RItaL/ZboG9UeydFB3yb5coDpcBeUVQb5o7bZVMU1UTUZmhClyyUPD2VGK+mb3PmPdIBQ8U8n7WDF6W3VBU2f8olLICP3wxB50Z8xPpdKg/rYSOriA== X-MS-TrafficTypeDiagnostic: BN6PR12MB1138: X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1138; 25: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 X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1138; 31: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 X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1138; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(125551606395959)(278178393323532)(20558992708506)(133145235818549)(236129657087228)(767451399110)(148574349560750); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(3002001)(100000703101)(100105400095)(10201501046)(93006095)(93001095)(6055026)(6041248)(20161123555025)(20161123562025)(20161123564025)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BN6PR12MB1138; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BN6PR12MB1138; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjZQUjEyTUIxMTM4OzQ6TG00ZGFVY0wwMWxwZjFkV0hwQkdpZSt5ZFgy?= =?utf-8?B?U25YS1hSdGREMzB1NStjZGhTam9BeTRML3A3ZnFHZmZNMW9OTTRSdjhYNmdj?= =?utf-8?B?eSt4RzljR25VNFpDTStOUmdsZElIQ2JIRmZmRUh0MlYrcmVFdWszRm0wdU14?= =?utf-8?B?TkdTckg5K212SVF1RFJNbytBVnpHaWFXMGVaVStxdWg1ZEJaSDArK2RGbEdF?= =?utf-8?B?dkcwZ0MxUG9UVG1EQ0NLK0VPV1VFbVFCRHJGN3dhWVRvZ01NbVlIUEJrQTVI?= =?utf-8?B?UkRuUDFVNUcwRThremhpZWNMeitZWHdIUmtPMktIeHhWcEd3akRBMmxlR1hl?= =?utf-8?B?WExtOUFFSFBBZHVXRUlXUEliMGdFbTloL2IwK2VyRFRibUpaNDJld0ZkOHhh?= =?utf-8?B?V0VPeU52U2ZGMXM2UFJrUmsxTjRJV3N4M1NNeHpHNEk2VjE3QWpBLzFtM1gr?= =?utf-8?B?U2NKN3hWMUg2S1p0TGtwaU5NcXBhUFlxWDdJVGlBRXVvZnNqYzlqNEpXODlH?= =?utf-8?B?VEgrOVh5N2VKd2VzYnVDV0lHditPeVRVSkx1S1pJckRPRjNieVA1bFdXWFNE?= =?utf-8?B?K0VFbkgwNk80WDRVODZJWUpWRWVZSFA1aERVYll1eUNJSW9IQkppL0NIckNP?= =?utf-8?B?Q0lNYklEamhITDhCZkpnU05DT0RnRURaU1VKeUhKejc0ODhZT0M3blRIVHVp?= =?utf-8?B?K25nZStPQXJGajBlV25WZE5uSEdyeGpybG51akFLNDZpRk1Ta0xDMVJjY2RR?= =?utf-8?B?RWFzU2FnN0t5dEdyU1pCZUZQUjMzUUhIMVhkMHdZbE1HeGliQ3hFTE0vSkFQ?= =?utf-8?B?Vzk2Q3E2c2c2MjFLVzNHZCt5MVYrZm44RG1xN2NvRUhydktsK0IyVlQ1REcw?= =?utf-8?B?d3hmSzZta2F1ak8vWm5iUUVUUDlZdVRMZmh6ZjVVZXRhNnY3b3NOdndOWkE4?= =?utf-8?B?OEY0RHBoeXlVbjBna3pocTNIKzhlY2NFWjVKRmN1RkVtUnF1TlJ0Q1pUOUlt?= =?utf-8?B?TlVxYllTYkhMcHZLRWtvWFpoek53Z1pEVWhPY0hZU01VeGx5WlJ0ckxMcnZp?= =?utf-8?B?UU1GbmRmUDRGRElva2puR0RScTlvQmJQRi9INmdIMlNpb0I4WXZubTdzRW1h?= =?utf-8?B?Z1BqN2wyaEYwNERDNE91LzU3bHFDZVRUNTh6UnFOVjNwTitJRE1vK0p2OGVs?= =?utf-8?B?TUMwb2NVUDdHK2JNeEVZZTVGeHZVektyc0hWMTZMSjUwTjFYUTZVNllqZXZU?= =?utf-8?B?WE9mNVF1aVpaWVhtbWNPZVJjTUNicFVwVGw2QnFtNzFpUVdNNnhjVm9oZmw1?= =?utf-8?B?dnQraEFWMVdRQWp3TEJTdXBTUWhGT0JGRDBRaWVPdHlWR2RFbExwY2E3Rlg5?= =?utf-8?B?dzFXZ1cxandDVjZNOFFHTzFYcXRabzB5SE5iNjhvM2MwcnZsT2MrS2FNQVNV?= =?utf-8?B?UFlpUnE3SWVRVjZmQVJ5MEdzdFY0RnMvN05sMHl2cCtrRjdhWWNnTVpJVTZE?= =?utf-8?B?c1VlcDBpYjZKTmZrbHpSS0YwK0hoV0JkL21MWldFdmNHVVdWSUJoK2xUQ2FQ?= =?utf-8?B?MFoyZmFZL1hRZlNBekhHeUhYRDdyMjVENys4bFBJcEpJZ01qSk9lbkxGM01I?= =?utf-8?B?TUVUMTFPT3dLUWFoVkk3bTBBNU1xQnNicVc3OTdRcVN3cGZBeW55RTlVSDRS?= =?utf-8?B?VzhxZ1MyQmw1THFqUWp6VmptUU5vTzFaRUZUTVF1djZtVmNMYkZiRWlsMnRj?= =?utf-8?B?WTExdVBwTlVRTmVVUzFvY2tZYTFlUHV5S0UvNWNjdDJNRFUxVFVHTEkxc3Fh?= =?utf-8?B?cmFUbS82c2Znazl1UVBLNVcxZzh2R1g5M3NtRktaVzVZVTIzMjZkNlpKVy82?= =?utf-8?B?aTF3VzVLQy9ORUFvd3lkQm1EZ2I0d3c1QkhVS1lRZkZtOFUvc2xGNWVVWDY3?= =?utf-8?B?am9FcXZUREE9PQ==?= X-Forefront-PRVS: 0351D213B3 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(979002)(6009001)(39850400002)(39400400002)(39410400002)(39860400002)(39450400003)(39840400002)(189998001)(47776003)(66066001)(53936002)(33646002)(50466002)(42186005)(110136004)(103116003)(38730400002)(53416004)(1076002)(478600001)(54906002)(6116002)(3846002)(7736002)(6506006)(72206003)(9686003)(55016002)(4326008)(25786009)(305945005)(230700001)(5660300001)(81166006)(7416002)(7406005)(2906002)(2950100002)(54356999)(23676002)(575784001)(50986999)(4001350100001)(76176999)(83506001)(8676002)(97746001)(86362001)(921003)(1121003)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR12MB1138; H:tlendack-t1.amdoffice.net; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjZQUjEyTUIxMTM4OzIzOm5Wa3IrVEdHS1JsWDhBMGk2eG5iYUhDdGJl?= =?utf-8?B?K2pvdG9ERnpFQXp3Q0hxQmh4TUV5cElpWFRDT1BOajNpRnlzK2l2aE82OHYy?= =?utf-8?B?cnNQL2Zta0hwVjNrbFdncUhHbnd6alcrbXc0RE9ld2t3amR0U3BpdnVWaDlX?= =?utf-8?B?dUZJM1RoRTBtNVhCRkJ3ei94bVBxdFBqQ3Fnd2hoYmYxT0UxWC9EcmhzZDhx?= =?utf-8?B?dnpvWHc4TFpTaUlScUNMUmRUNzZwbXBqd1VuVC9ZR1VmcXBPdUNLTnE2SWJp?= =?utf-8?B?K2ludmJuTEVEaHMxSjRkN0RJVHVnZEljbW00QnV0K3FNWlJ6MXp3NkU4RHgy?= =?utf-8?B?YlN4czI0ek9mV3Rsa3hoV0FVbjlmT0dHc055SjhFME1PWDF1UW8vaEJscnBz?= =?utf-8?B?S2dNZ21DTGZJQ2QxKzRIcjJ4KzQzOHBYV2IxMzhFRUovc2NrTHRtdWVFdVpn?= =?utf-8?B?dkVVMDRwcXdMMU8walRrL2ZycEFJZTBsaFNCMjBYK1hDekt2c3I2bDl6RERp?= =?utf-8?B?MUZTeUNIanhrQVMzRG42Vm5wS2NpOXRnMVBWWGlJS0U1VjVNZjZ4dUkxV0Ur?= =?utf-8?B?Tm80Z0Y0dWJndXRXRE5aOXpNSjU5SEdTZFRnbWV3S0QvUFk1NklPQm1aMTF1?= =?utf-8?B?NzhjVjB1clBxZUdoTktiR1hSQ1FoTENlSHhkUmZ2MjFVR3lSOGtka09BTGt2?= =?utf-8?B?VnBUNFhmYTdmN2Q1N1RKNG5qV3dtS0N5cS81TmJKbjRudWhLNStnek83RVo2?= =?utf-8?B?WEErK1lLQXRhbmZmTEZTV09hSGNDYXNnL0FZZG9FSHR4OFNUcnBaT1htampH?= =?utf-8?B?REVFaFI5azlMUlNLbndzZUh1RUZ4MGd4SkQ3KzFnL3pNVDlMZ0JnNU9YeHRU?= =?utf-8?B?M05PZ2R3NnpTTm1kYVIzcU1ZMCtZUFNJcVBNdHFkWUVSU3ZRazBkQTZCSS9h?= =?utf-8?B?RVlXQTFzQ2F5TUxERXNvOU16UTVDdUZMYUJJRit4cGNmdklJbzhaY3JURzRD?= =?utf-8?B?TERSelEyNisvdm05UnNnaG1wcU00d3BMR2poNjQzWlBQSkI3cTJnMUFCT1ho?= =?utf-8?B?dlFUNVNNT0VaTHpMMnZOdURWWm5yNlA1Ynh6eTJlTk50ZVc2dU9NWFFJNkx3?= =?utf-8?B?VS9wdWJMNnV3UnUyVUxaZlhXU2xIZzJSVnNGUkN2QlordVI4bVk3ZThvdDJR?= =?utf-8?B?anBBRHFwSGJDSHh2NkI0aW85RGZLdW1SM0NibHU4QnovL2VMZ1FySXFhdUdj?= =?utf-8?B?YjAvR3UvalNlMkVYeHpNS3VCb1pjdHd2TUwwQ2ZlUHRHeHZEYVNuUmlYZDBI?= =?utf-8?B?VkNYM3NydENNbVpWcXZ1RzVvMDZWYlhQRVZ3QlZUbGwyNUJ6VHNyK0dYSXls?= =?utf-8?B?RTladkpBSklVRFg3OEJPVTBxelFrZFB4bW94Qkx2MjZqSWFYUnpZUmgwOW83?= =?utf-8?B?YnNicDAwS093WGpiYXo2bEc1U3VMUEUwcTF1TFZHL1lLVU1RcnVteXNZdExM?= =?utf-8?B?RUtHWFVNd1o2bkpCUThvZWFxTDRiTnZGK2FGdFY4ZDkyRmdYbC9CTjR1S25w?= =?utf-8?B?eGNVQ0Jma0plRHk5UmhXbUw2SjZNa2Erc0o5VFJ0WklRclA1RU5xNWxpU3h1?= =?utf-8?B?TDl0cExRaEVueGhMRjJqNXZ2WVJ0cnprTWtwTUF2c0RPYXRtSUxMYTA2TDEw?= =?utf-8?B?Qms3T3d4MVMwbzcxSnJReFd0eHBBazZEOWJpZ1NPdU1FZ2NUUFI4eWhwN2ZM?= =?utf-8?B?amFZalltODZwR1F5M20xSkhnSEY3L0hYNHVxNEdSR2loNnRpSENkTWt1UzdR?= =?utf-8?B?VDF6UDh4Mm9MVmFQS2kxaUFzcllxdWltU0FWODZZVXVSQmc9PQ==?= X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjZQUjEyTUIxMTM4OzY6TDV5Y01mWUYvVjU0RU5aekQvVlRFVkJld281?= =?utf-8?B?RG9nb3hLbWlsRGlheXFNamNNSXFVdGZBTGFDcmJXb2pqL3FpNlBudkFlcDJs?= =?utf-8?B?VVpPU21uNStnVW9xZGdlNUNpd2hQQ2pvc0hxNzlaUUlTd2VkaDQ4VEx4Zkxi?= =?utf-8?B?Uk5wSitlS3FMQ2VlYnVDZ0FYYVNWa1luYWdndlZPS0tEa1lKQ0ovYTVnMlpt?= =?utf-8?B?RzdOZDg4bUplWU5KTk15THMrZGx2S1haOGVhQU9KTmZ6ZWYrYzQ0WkdzUldy?= =?utf-8?B?bzFXb0UxK1dobElFOXNycFhEM0RETEsweklFLzE1SHdQRFdCb0UxY0FOV1Ja?= =?utf-8?B?UWloc3E3L3luQXE5a3UxclVMcTVWc0IxYXhiclYrN1ZxVTcwTFdEU0o2K1dT?= =?utf-8?B?ZHVzQ2Y5TUlFdFU5a1BYdXFTeGFjNDJxeGIyRWVMcDAwRmhoUEorV0FZOVcw?= =?utf-8?B?SnFqejZxRHJrQklsTTVwcEI3Z29qZllycE83WVV3WlJ1dldreGhJT0hvWnI0?= =?utf-8?B?TmgzM0JzRk5PRFBmS2VkU2wrM2FvSUZDTldLT0ZEOFVRM0hTRTBzKzViVk04?= =?utf-8?B?cDZZWjFlQmV0LzV5Q2xNdHdJcVRyZU80OXUxSjcySDlQZnIvZTVmUzNyNGhv?= =?utf-8?B?Vmg0WG4xTXRvL1RSNmRhZFowdmhTQ1J6Y0o5Q3c5NlVXMHp1MVl6SzRmQVJx?= =?utf-8?B?YlR3eGIrYTNESms1SHV4ZFByV2ZDMHNkTDF5Q0ZhVU5NY0ptNDJyY0c1SEpH?= =?utf-8?B?UC9FRW5Cd1JDY2IxeFh5SUl3K2NVTFFabWJIL0hzbVU3OURhQjJiRVFWL0JL?= =?utf-8?B?bE5pbnhXbG5hZHBkWHBoY0JETmlLYTBnandpc3lRZExFcDZHSWZSOEtrSklY?= =?utf-8?B?UGZaRkI4RGxjemx6WUlDRm1UL2ZsUXpLQ3JQZTdsd20yM2dyazZieERBa3dv?= =?utf-8?B?aUo3c2tqNjlVVTdoYTBYaWhZMGdWVlh3MkhaZnp5NXlWd2dJa0tjTjc0WGNF?= =?utf-8?B?UytzZDNxS0Q4MTkwNEpBWnEwU29BZ09YWDFESXd0TlhmS2ExZkpKVDhkRVlT?= =?utf-8?B?SThCRStxaFErSUN6V3h3OHZhQlE4b1I2TDB0eEt6d2dlRFpWaVBkR25mMyt4?= =?utf-8?B?T0ZwYXN5cmFoZTRUcWtYd0xSMjR4bzRNUHJ2Z2pGMmtkNjNWc3ZxYkVHR3RF?= =?utf-8?B?OTZhYlczYnFMUVhrWHBpQzBxODJxeVZBdHZhajZjMXlZb2NhajhROEZranlN?= =?utf-8?B?ZEp3aVlPMVRpRzBoU1B4cFFleGJNV2VpNGwwdmRNYXgrbHl5YkVFbjloZTdz?= =?utf-8?B?TCtaZ0RKSm9uWVNmcnhQcFZqdXgrU3RVUFp1SE1Tc1hpS3hCSVA5VGVCdFlZ?= =?utf-8?Q?EZf/EZ9?= X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1138; 5: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; 24:tCLsAKpDxk6CZuj+xCfHPsskwTdgonOlBOoJYDRvKo3waHawZaPeORAOXJ203Bzl2njExon7EBbIefyh/qpk7MgXGKwXv0sU1H9AMy+QbaY= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1138; 7: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 X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1138; 20:c+mp24I/j8iXBpjDx0PDVUbyDpMttXfRtS8/WM1aV2Jzq6xHcoSmY6iTQ54BwDAkZ4/2GUkQtrNzcl8yvRJVvqEMKJA6V2IPqVEYdGde2DBMoypgjqvhEyJu0OUXulPNFjR/3SrexFRLKablWh2iroPoPRM2V8lrRPJ2ktg6A+JdgC2Rxr8iLxJbyTRUxr1si6HofT8DJ7LNx/5DEvnRs0k63fkA+2VgcT+j7PG3dCNbPuf/WCx6h4NNpx/J7dn9 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jun 2017 15:07:32.9487 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1138 Cc: Brijesh Singh , Toshimitsu Kani , "Michael S. Tsirkin" , Matt Fleming , Alexander Potapenko , "H. Peter Anvin" , Boris Ostrovsky , Jonathan Corbet , Joerg Roedel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Larry Woodman , Ingo Molnar , Andrey Ryabinin , Dave Young , Rik van Riel , Arnd Bergmann , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , Juergen Gross , Paolo Bonzini Subject: [Xen-devel] [PATCH v8 RESEND 01/38] x86: Document AMD Secure Memory Encryption (SME) X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP Create a Documentation entry to describe the AMD Secure Memory Encryption (SME) feature and add documentation for the mem_encrypt= kernel parameter. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- Documentation/admin-guide/kernel-parameters.txt | 11 ++++ Documentation/x86/amd-memory-encryption.txt | 68 +++++++++++++++++++++++ 2 files changed, 79 insertions(+) create mode 100644 Documentation/x86/amd-memory-encryption.txt diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index 9b0b3de..51e03ee 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -2197,6 +2197,17 @@ memory contents and reserves bad memory regions that are detected. + mem_encrypt= [X86-64] AMD Secure Memory Encryption (SME) control + Valid arguments: on, off + Default (depends on kernel configuration option): + on (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=y) + off (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=n) + mem_encrypt=on: Activate SME + mem_encrypt=off: Do not activate SME + + Refer to Documentation/x86/amd-memory-encryption.txt + for details on when memory encryption can be activated. + mem_sleep_default= [SUSPEND] Default system suspend mode: s2idle - Suspend-To-Idle shallow - Power-On Suspend or equivalent (if supported) diff --git a/Documentation/x86/amd-memory-encryption.txt b/Documentation/x86/amd-memory-encryption.txt new file mode 100644 index 0000000..f512ab7 --- /dev/null +++ b/Documentation/x86/amd-memory-encryption.txt @@ -0,0 +1,68 @@ +Secure Memory Encryption (SME) is a feature found on AMD processors. + +SME provides the ability to mark individual pages of memory as encrypted using +the standard x86 page tables. A page that is marked encrypted will be +automatically decrypted when read from DRAM and encrypted when written to +DRAM. SME can therefore be used to protect the contents of DRAM from physical +attacks on the system. + +A page is encrypted when a page table entry has the encryption bit set (see +below on how to determine its position). The encryption bit can also be +specified in the cr3 register, allowing the PGD table to be encrypted. Each +successive level of page tables can also be encrypted by setting the encryption +bit in the page table entry that points to the next table. This allows the full +page table hierarchy to be encrypted. Note, this means that just because the +encryption bit is set in cr3, doesn't imply the full hierarchy is encyrpted. +Each page table entry in the hierarchy needs to have the encryption bit set to +achieve that. So, theoretically, you could have the encryption bit set in cr3 +so that the PGD is encrypted, but not set the encryption bit in the PGD entry +for a PUD which results in the PUD pointed to by that entry to not be +encrypted. + +Support for SME can be determined through the CPUID instruction. The CPUID +function 0x8000001f reports information related to SME: + + 0x8000001f[eax]: + Bit[0] indicates support for SME + 0x8000001f[ebx]: + Bits[5:0] pagetable bit number used to activate memory + encryption + Bits[11:6] reduction in physical address space, in bits, when + memory encryption is enabled (this only affects + system physical addresses, not guest physical + addresses) + +If support for SME is present, MSR 0xc00100010 (MSR_K8_SYSCFG) can be used to +determine if SME is enabled and/or to enable memory encryption: + + 0xc0010010: + Bit[23] 0 = memory encryption features are disabled + 1 = memory encryption features are enabled + +Linux relies on BIOS to set this bit if BIOS has determined that the reduction +in the physical address space as a result of enabling memory encryption (see +CPUID information above) will not conflict with the address space resource +requirements for the system. If this bit is not set upon Linux startup then +Linux itself will not set it and memory encryption will not be possible. + +The state of SME in the Linux kernel can be documented as follows: + - Supported: + The CPU supports SME (determined through CPUID instruction). + + - Enabled: + Supported and bit 23 of MSR_K8_SYSCFG is set. + + - Active: + Supported, Enabled and the Linux kernel is actively applying + the encryption bit to page table entries (the SME mask in the + kernel is non-zero). + +SME can also be enabled and activated in the BIOS. If SME is enabled and +activated in the BIOS, then all memory accesses will be encrypted and it will +not be necessary to activate the Linux memory encryption support. If the BIOS +merely enables SME (sets bit 23 of the MSR_K8_SYSCFG), then Linux can activate +memory encryption by default (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=y) or +by supplying mem_encrypt=on on the kernel command line. However, if BIOS does +not enable SME, then Linux will not be able to activate memory encryption, even +if configured to do so by default or the mem_encrypt=on command line parameter +is specified.