Message ID | 20170707134209.29711.14421.stgit@tlendack-t1.amdoffice.net (mailing list archive) |
---|---|
State | New, archived |
Headers | show
Return-Path: <xen-devel-bounces@lists.xen.org> Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id E284860352 for <patchwork-xen-devel@patchwork.kernel.org>; Fri, 7 Jul 2017 13:44:29 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D8E0B26E3E for <patchwork-xen-devel@patchwork.kernel.org>; Fri, 7 Jul 2017 13:44:29 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id CBB172853B; Fri, 7 Jul 2017 13:44:29 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 2ECC026E3E for <patchwork-xen-devel@patchwork.kernel.org>; Fri, 7 Jul 2017 13:44:29 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from <xen-devel-bounces@lists.xen.org>) id 1dTTWe-0004sb-Tf; Fri, 07 Jul 2017 13:42:28 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from <Thomas.Lendacky@amd.com>) id 1dTTWd-0004r2-3K for xen-devel@lists.xen.org; Fri, 07 Jul 2017 13:42:27 +0000 Received: from [85.158.143.35] by server-3.bemta-6.messagelabs.com id 4F/54-03044-2CF8F595; Fri, 07 Jul 2017 13:42:26 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA1VSWUwTURT1zbTDYDrmUUSudUGLKKJFNAaMX/4 Q+FCD8cO4xDqFoS10wZmiFRMDpkbARMUFpBItoHEHl1gIGhUFUQSCmoCKJi6oSKhRaSSAEmc6 bL6vc98599xzk0uT6iJKQ3NOB8fbWIuWmqowLdOu1NUf0W+O+/wudNW5n5WKNSi58c4wkYK2K M02g925Q2kabPxEZh2a5Sx0l1G5qGdGIQqmFdhFQtVlphBNpRE+juBa5zFSKtT4AAG3C78hSU XhpdDh8xMSDsVb4exfr1LC07GHgI/FWGogsY+Ce20tlEQQeDZ4Ks6LTrQ4IgqK/UukbwYnQ1/ 7xSAJB4v47tVfAazGSTDYVBFoDcNz4dJLl1LWh8DT0m6FZEPixVBdt0z6JnEE1PjKSAkDngc1 AwOUFAHwQQQnimtJ2XMBuPvbg2TRHGhsLQv4AF4H3/vtMoyEZtd6ubWegKHyEYUsb6Xgtx/JO AaKLowEyaKPQXCr9rRytFBCUcnV0cKrgKrDpaORLNDx5Dkxhv8UNBCyqEsJr7s8o8XXEPjd40 JHkc49aVX3xKruSat6EHkZRQscv4vjdSsSYg282WhyWFmzRbc8Lj7WygkCa+QsrEGITbVbbyL xJqaIrxZVXtvwEM2kCW0Y07dWv1k9zWBP22NiBZOez7ZwwkO0iKZxReP+jRqFzW7jtMDUHRZl ITxn5JzpZot4Y2NKoFXa6UxSvkgzQhZrFcxGmWpGOvr6lWo/oQ54aMKZHMkDSyJTtm3cYuxSX 6A5mlAGifnUqiyOt5od//O9KJxG2lDmouSiMtsc45N6xRCEGGJ+3jYphIOdoDS5KLMvL3/407 0qIWd9Zkn1wjO7V7D333xx8jcuJGS+zXg31F2+r+f26nXVyf3DjEHbEtX0YPWHCFV5iVd1Nzr OGf/sfWfHq75Hvoybj9ldkWkpKV3nUnOJH2013pOROYlT9Kcijsfv5LaT+XRqQ0tTWtu2gr1f qcSYdJrJ1JUSm3ortQrBxC6PIXmB/Qfy3fnWpAMAAA== X-Env-Sender: Thomas.Lendacky@amd.com X-Msg-Ref: server-8.tower-21.messagelabs.com!1499434943!72082526!1 X-Originating-IP: [104.47.34.52] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.25; banners=-,-,- X-VirusChecked: Checked Received: (qmail 30912 invoked from network); 7 Jul 2017 13:42:24 -0000 Received: from mail-by2nam01on0052.outbound.protection.outlook.com (HELO NAM01-BY2-obe.outbound.protection.outlook.com) (104.47.34.52) by server-8.tower-21.messagelabs.com with AES256-SHA256 encrypted SMTP; 7 Jul 2017 13:42:24 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=283sl58O+0HaPa9YDphdA6fj81YwvB8b9tivyfD++Yc=; b=N5/HaHlU2v02Ajcd1F2dUt9kvXxMhxYS5zqa7NnGEolx1xGDJVsDm8RUX9369MWA5NB9/G9jOEJMcMPC0RPQPAKtF+mbHTPKVR5MsT8h0hYpwtrxdnkyVEzI52T0EyO0JYvXFPCFMgddGwAYeM70tf3QMLSHvEgDGtjxtahvxUE= Received: from tlendack-t1.amdoffice.net (165.204.77.1) by BN6PR12MB1137.namprd12.prod.outlook.com (10.168.226.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1240.13; Fri, 7 Jul 2017 13:42:14 +0000 From: Tom Lendacky <thomas.lendacky@amd.com> To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, xen-devel@lists.xen.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Date: Fri, 07 Jul 2017 08:42:09 -0500 Message-ID: <20170707134209.29711.14421.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20170707133804.29711.1616.stgit@tlendack-t1.amdoffice.net> References: <20170707133804.29711.1616.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: CO1PR15CA0055.namprd15.prod.outlook.com (10.175.176.23) To BN6PR12MB1137.namprd12.prod.outlook.com (10.168.226.139) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 8b997ad0-78e8-4361-24e2-08d4c53dfcbc X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(48565401081)(300000503095)(300135400095)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BN6PR12MB1137; X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1137; 3: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 X-MS-TrafficTypeDiagnostic: BN6PR12MB1137: X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1137; 25: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 X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1137; 31: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 X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1137; 20: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 X-Microsoft-Antispam-PRVS: <BN6PR12MB1137496530F74FFE0B6E884BECAA0@BN6PR12MB1137.namprd12.prod.outlook.com> X-Exchange-Antispam-Report-Test: UriScan:(133145235818549)(236129657087228)(767451399110)(247924648384137); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(2017060910064)(5005006)(8121501046)(100000703101)(100105400095)(10201501046)(93006095)(93001095)(3002001)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123560025)(20161123555025)(20161123562025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BN6PR12MB1137; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BN6PR12MB1137; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjZQUjEyTUIxMTM3OzQ6dVpPdTZqeUtwb0xYV1RoQTFUWEh5d21oM2h6?= =?utf-8?B?cjdTbXJrRzZyWFFsV3BlbUdZVnBBUFFrancyZU02bjN1bnFUbnFMdjdSOERl?= =?utf-8?B?SUFSMVJrY3JRbGdtSVdIdEg3STltVDVPeE80YUozUGJVT1FUdmNXNnV3Vlgr?= =?utf-8?B?NWRVRVpVdlg2WFcwV1F6UmlFYXQ1QXVSNXlKdGMyc0lZNzlubmRtazcrdkM2?= =?utf-8?B?UW1pWjV5M1VDQllHamZaZkxnb3BVclRmK2RTNldhbzNvZDA0KzVBdnd2d2tZ?= =?utf-8?B?TFhLUXdEUy9qSFRkc2I3eTN6WTlGbTZwdVk0VHZJSDRiTWJRcVR4S3FXVXVj?= =?utf-8?B?VTlzWlF3S1AwL1Jtc3JVb1liai9EaHlXY25qOE9KdGUxbzJ3Rk1MVUxhOHFG?= =?utf-8?B?eUQ4dEFRTENKT0xyeHpBMVEzZUI0dUN5Q3JES1JWZWYxbnpJM2ZxZWgweHdK?= =?utf-8?B?OGpob2RzUVdlbEsyZ1lCZTJFemcxY1grbjB3RG0zamN4NVJQS2tDVS9PQWw5?= =?utf-8?B?Qm16YzdHQ2hDK2ZsdU1MRy9zMFU0ZC9LTVdxNGJ6RjR1UHQ4UGhNWTFiMTBE?= =?utf-8?B?TVN2OGNWRkJJTE42SU1tb0M0STVUL1ZLWDZvSm5zcDBoL1RickZGV0lpVkx2?= =?utf-8?B?TktTTHpoaFhQVzQ0S1dwNFQ2NklaMlUxQVRZeDA2bUwzcnpxK1N6dnpuME5v?= =?utf-8?B?RWU0aEQxNmFYdlNCa245WGRwTzQzUmhDSDBTaXpEQml3YVpYVmNPS3Ixajc2?= =?utf-8?B?UHVKcnU4cDljVFFpTlhuM2xsei9QeS9XbmxGWGNzeGIvNEtUQ3JRRGR3NXU4?= =?utf-8?B?eXYxL0lyZ0xvMGY2bnZmVXJ5ZVpwT0UyOXR0VjJhTWpkYXU3UXhJWVBNS3BS?= =?utf-8?B?U0JVVU5hUzNDN2w4bXd3Q016ajZjT3htdjdtOC9LNTUrbUZLZDlnN1REV3Np?= =?utf-8?B?dDB4aXIzMDlac25hVExiTXVUSzdCaWxiM0RjTmhxNFZsWVRXbUFhMnZwZE9W?= =?utf-8?B?KzZGR0dtKzlOUm5Ca0tPNHZFNmJYazdIcjJZbUNoZTQrNmt4aTcvWHFONXZB?= =?utf-8?B?dFFPTGdHVHhkNWRLUHlGcnc3TWN4SFhGN2s0V2gvOXJnVFZrbEM5ZlZQS2My?= =?utf-8?B?aEZrYmNoa1I2KytSRmRLY3R2MkVZN1FXZW54emZQSDhWQkRNVHBJYkhveGtO?= =?utf-8?B?RzNFMHlMdUF0T1A4cnFURVVKTFc0UVVIdXV2VEsrYUFxYzJDMXNZZlVoV0dZ?= =?utf-8?B?b1dnTEdlbnJqMGpFRm8rSE1lVUZWSllFU0s3dHM4eDBjWlJVU0dSZ1Z5Znhl?= =?utf-8?B?K1VNTG8rR1NBekFqaHlpV2I2blVlYTdyT2lFWVg3Y1VsNWRYUkVuejRQV0hT?= =?utf-8?B?RUt5a080WUY2UVIydE5PS1BZV1h0OGEyYWcwZHowWE9WN0NzZXBEU3BZa2ZP?= =?utf-8?B?a3lIV2laMnNqUjdaT29GcUlPZUpqNk5QVWt0STM3WHA4RzBFNENOaUJnNEMx?= =?utf-8?B?d3hQa0IxMkJnTEFJNC9yQ0VxZ0lsQ2RIVS9lS01WTFZHU2wwRmZGQVN5dnda?= =?utf-8?B?NXNqc21OVHZnMS93OXM4QmlLRXA3TTV2R2w1UzhsM3VwVnVManR4RWZoQnJw?= =?utf-8?B?T2s4aUE0akN6ZVJjdTlJSmNmMEVJNGZEYTN5dVU0L1MrbGQ0VC9LVFJhd3NX?= =?utf-8?B?enVnWmZDUnBxMkFSdi9VVXhqSGh2RVlmazJuNm9SbktuN1NYWDk2M2pYVzkv?= =?utf-8?B?cUd6eUxucFBTUFlOS1I4MU9FczVrcUV0aFpxanVOZ1NIa0NtUkwvd1V5d0hj?= =?utf-8?Q?6xu7U8Y1g+Ms?= X-Forefront-PRVS: 0361212EA8 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39860400002)(39450400003)(39840400002)(39410400002)(39400400002)(39850400002)(2906002)(97746001)(66066001)(7736002)(47776003)(81166006)(8676002)(103116003)(86362001)(50466002)(189998001)(42186005)(4326008)(53936002)(2950100002)(55016002)(6666003)(9686003)(38730400002)(110136004)(23676002)(53416004)(33646002)(6506006)(54906002)(25786009)(6116002)(7406005)(478600001)(72206003)(3846002)(230700001)(54356999)(1076002)(305945005)(76176999)(83506001)(50986999)(7416002)(5660300001)(921003)(1121003); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR12MB1137; H:tlendack-t1.amdoffice.net; FPR:; SPF:None; MLV:sfv; LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjZQUjEyTUIxMTM3OzIzOm9WSENLOEJZdjZmWW96eVFlUW5HTFlicTZN?= =?utf-8?B?M1VQeHNoWVV2d1JxQ0xHZ3NsMEFvQjY5UmxUc2dmY0xzR0pwUjdDNjBBd1dT?= =?utf-8?B?YkZORStOQndJWkR1WWYvMHFKSU9rS2MxN05pWS8rWWVNT3kxVlh1ZGpwM3Ra?= =?utf-8?B?bm5vRkc2ZHlNYWNHR3JhdTNXZDQ2U1lxdkpmaVpDZ1cxNnhyV2JaVlFQMXAy?= =?utf-8?B?RFV0bVFmVEVSckFoN2NlK29DdGdkYS9WcWxDbHRiWkszaE40NitDaTV0bVRk?= =?utf-8?B?bXFZTHpHVjRYcTFNWjJwcmZkYVZWY0NoWEpQSlpkRVpyS2pzbm93Z3BldW8x?= =?utf-8?B?eXhNMjRTazBOL1R5c3MrNEVhUXgxdlloYnFtSUFkWUJHUlBaVTE0cUdTalM0?= =?utf-8?B?d1FkczJMQkdWcEk1MUdvOE1KUnRJZGN0b0NnUktLdXpQVllybzh1VitOVGRT?= =?utf-8?B?VDY3UFNTZ3pHSVpGSWozMnQ3TlVVUUZXYTZGdVpRL2tKR2planhRVHBWd3Zy?= =?utf-8?B?K0YrN1JpL3BDV3ZzRkRuMVZwbzlmbHhpTjNTaFdEZVZOR2xDeU1CMFlRNkJV?= =?utf-8?B?MTBGdGpVMU9BakpEWGJiRnY4YnZiTVpWd2IyZkxySFNqb2VyRWhpalZzWUdy?= =?utf-8?B?d04yd2hhSTR3bkRmQkpvcGJYVGxRcE1kTWh0VjdFaUNSb2IweCtLTlg3QW1Q?= =?utf-8?B?ajloSVcwYy92VDBOSVJWSmg4eXdGbHpjZ0hISzUzdngwcURXcEVablltQk5Z?= =?utf-8?B?RC9NcCtFN3dPa2hDMithSElHYU5KTjZ2aGN6ZVovQ1hGU3l6L1ZDdE5LUUVw?= =?utf-8?B?OUszcWh2dU40WGRvUWFqVjN3TUs4L3I0b2ZDQXZRR2M0VjZOTk4yY3V2L2FV?= =?utf-8?B?RkxIYXFJUkhkbzFTVUtPSjRRUVpFSDBDTkRRY3ZzdkwxRnB3TUJ1eWxPeG13?= =?utf-8?B?Y2dPZkN1eTUxYzNBUE1vNUViQStGUG80RFlFMWNqQm9WaU5TVU15ajYrVFJT?= =?utf-8?B?QllvOXJxazlsSFk3VEdHYlJQb1c2eW5jWDVFVXY4bU4xYWFHMnVUQ28venNL?= =?utf-8?B?MjN1QllIS3NoVzRRYWdRUXdodHVBOXYzVHUrVEtaOWc1MUVTSkRjUm4wN0pH?= =?utf-8?B?Ly9Va1JOQXFxQjgrc00xL3pqM0NJQ3RERDI3WWs5RFZwaDlycmZJbzhaWDVy?= =?utf-8?B?L3VZYXJUR0ZIZzU3ZWEvZWt4OXdabnhjMG9SK25oam5qNGFRTHF6eW5PU2lw?= =?utf-8?B?UHU3cHVUMFVlTUdNelRTSWdZQzNzSlVVeDBMYkFPbWZ4YStYN0xDVHlUNzd3?= =?utf-8?B?MDRjUmdwU2RmTVlFMG9sUVBoZUZNcUdXL1VKTU9xUGt1Q2xGS3NLZ3ovTGdP?= =?utf-8?B?d1lyeExnblI1OU5ZNVlpY2tONkU0eGJidU5iN3JQRlhMdjgrNnBmZE1zb0xQ?= =?utf-8?B?bHUyTERwckhyQzRMeWRORWpUMDUvZnZXeHhhNXNkM1NUaFd3M3N1Y1FXUTc2?= =?utf-8?B?YVlvbElnZ25TS2JLOXdidWhERVVWK2N3SHU4UUVRY1ByVmJzOHV4STM1Rkx0?= =?utf-8?B?TTlYZkJUclRHTVlISWltTUthYzZ1eEU3bnA4TFh1bnVRTVZJMDFqc3NaSXE0?= =?utf-8?B?SmdwT0liY2JPaU04cU81d0lRLzUxdXBBMmgzSU9PWkxVRGpYcDUwU2xBPT0=?= X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjZQUjEyTUIxMTM3OzY6bFJaYk5NRlYzbTVzV1YxUTVVNmZqcEdMZy9i?= =?utf-8?B?OCtoZnFnSGRCNEFMeUdadzkremtRaW9ZTFlWNFdzRUhyLy9UNWtiSjZUT3dH?= =?utf-8?B?ZWl6ZWFySzNNeE9sNXBxa0grWkhIMG5ycThzWEJXSjc5N0RYaGllWUNwYTgr?= =?utf-8?B?UzN1REkvT3BXQUpOZ1N2bDY1TjczOUFUMEZGZ1dsSVRGaXhMcU5jSERyZ2RG?= =?utf-8?B?UFhiZ0IxaWlqRjArMkFPNFRqSHRDcGp3SVlHcEtkUVBOQ3hmei9MYUNhejNJ?= =?utf-8?B?aWN5Ti9xZjh3TURsbTJDMHhBT1lDeTFxamtiR2M5VkFtaXpnMDRsZ1BtQXc5?= =?utf-8?B?RWVTaENjdC9vekpENkZRKzM2ZFFyWThyVFU4K0pWR2wvTS9VTWpHK3VMWmR3?= =?utf-8?B?dnZmQUt1UUUxVjhxeEJUUFV2bmQwSzRqOE1GNWVLWTBoMzRUVllpWmJ3RFc4?= =?utf-8?B?VG1DeUZBem5YdG9zNDYzM3ZaM3h1TFF0NmpRMDhmSElYOGpSR0g3WFh2R0JU?= =?utf-8?B?Q25JS1IxUTFJamI1V1FTbGdMOHBmSnFvbDZyb04zdW01NUFPSWtLdklyMWda?= =?utf-8?B?TDZGaGtuWGRkTmFWVDJQWFBjWEtMMHZrcCs4TWNMTmlKckJHbmdxaUxKdDAr?= =?utf-8?B?MW9iZFVZdVZ4M2Ezb0RSWGhmMGRPT1dwSGtheDdjVE9ONDUyTzROcTlYVlB0?= =?utf-8?B?MEhIZHl4RlFmRUtOaHRLSC9jREV5cTJHd0d3eXh5K3pJZm0zNHJTbm05ZnNI?= =?utf-8?B?MWQwTHJPaTBBS0huQTVYemdqU0VBU2U5WXltTmx0ZHNIaTY1WWZFSGpsRlA5?= =?utf-8?B?Q3FXSitET3gwUjRMZXZ4d2ZIcHpGYUVGVHlocVA2NU9mRjJFS3lRelJMYnlQ?= =?utf-8?B?K1hLcWphWTFUQW5tWW91b0FMdEp0ZjNrNXlUVkd0enJwUUQyeDhDN2dzR1NE?= =?utf-8?B?cDBBNVdQc3czU2lEQzBNbVAreko4eHdCaU5DdCtrREV4M2ZWSkg1VjZESzIw?= =?utf-8?B?MTVTVzdSVlJ4TGxWM1dNN0VXbG1ndFdZVVVZVExGZlRMS2hlWjhkQmp1K1ZN?= =?utf-8?B?U1JrMUwxbDJpZEV4T0laMGUrUXpwcTJVUVZrSGdveDZvY2xUYzVvekJ2OCtZ?= =?utf-8?B?OHpPVkVMVFJ4bW0xQzZlWEdxYTdSRnFwRlE4Y2doRVF0QjNybkplMm0wWWJB?= =?utf-8?B?YUs4cERLcmZLRVhsTzBtSkpwcVB3dlRHQzdGRDNIeDlmUjN0dWhWYU1LS0dr?= =?utf-8?B?dFBVRzVVL2kxZWpzMzFKNDU2TXNFcDBBeS9zbHM0ekNOMERWaWtUQVhHUzRX?= =?utf-8?B?S0dZK3BMK2ZJV3Z1eWJ6VG5JK0NXSGlWb2MreE1HSXNrM3FoUG9FV3B4bkNa?= =?utf-8?Q?pnnIDBt?= X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1137; 5:K/vFR7hGISMSFggAwutuz/wMRRJ7cJMFQyIuNeRCNnVMAPMNXmdGa9b+m8RYpz79lPdtYj9alFFCQPQXf2YUNnVB/BTmg/bI1Hb5PR1llFq9M+Pzr8PeLJAKkiDaTNL1U/2y5FYGHzwTSyUs7Xz7cfqYcN1qGqxVCiQJ+hbb+tn4KJTDKL/0NgiU1ORkjS+amkIDwjExdQzEeTzxEjlfofAHFt4kCegHMSt+zbk7r9G7Mtpezy/TlyHRQqbO85/Z7pRGpoiVy5pSseuQDoB/9VHD9N0ySaNuBQ/RK9Il8s7EFAHlkythcUYQPo1QOAx1pScE6p3IiOyeHXgoqGC6J4wtrtG1VqpVhipWOf7HYGk5uwRfT696udLgNJK6UxMwPpCsfgy1hQlogQ5thxuj/qe4ysGYSFlb3S4G84H9zlvywH0ypICb3vEChgqwGsTJKRJQTYOV54gFzpkxs9iHKeXP7MM6CirtArjTmtQhUQ+KCTUpiwka1k+h+wRWGxZS; 24:USL/NEQ3Y2DN18AOW/VIE9vT9X5ObiiDHKOXaPhSj8V+nklPBfF0P7s3r7UsOJOmg/6QRitEj4+3I5WJLuVUMF30lpIWPbWYhQC6aMFxAe4= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1137; 7:oBJa78UqU7ddgoCG7LNw0NqiIqseIJwZ+w6n3RxtWRcgQeMAJO4w50v4pQwZPOQztuSjleWf5Gf3ms+NnmgQR0C0Z2tVHz+GUig9PyCHbWLWefHdSMn54/0H0mFaN8Kzs5/4W3Mb4GXjKX0mU3ygHVEBs0Xn650syEAlkzg73Gf78aN75KB58cV59AHZBNwggVwaCFeDGlThUyNBJURg8b+aE/WCeOkuG7VAjlMD2INcwC4gvSR6U198uPdX6Qa24YwrwGWTNx59vjQWBVEKTv6cyViGb0VCZW8h4RG2L0QipPuQLY+e6kY9SwO8yP00HnBJeoxUYYxu1p6OgFNgeX8qlveV8mRaDBDI5zsAM4UxrAJioyteBi1c297nk2zqVC2ZFXvgPs/xIzI1l5tc95r+rv50xbGpgDPo7FfzvvcjzMKu9qAAYWeg0Gw0j6niLQMy6ulZW9ys+dEx3UPEUrxAevy8r2Pm2GVHyoM0Fb8wUy6pj4p1IP0kGo+qGT6K1hidOD1bX1l1I74R5ZnCTQ6YrbweiRHibkaaA1H7wJ1XnpGu97mHuQGB0RLz4N7yetxBR/4Ddgbz/1Ev4wZo4tk8D7QkuHH+QqSuYehZ0/lp8cNpMpodDBY39qA7xEhvkORWgJA00veovo3clGuiAQt46X8p4iQvUVumjH/bF/sL47YCsVYTseUL6uuZNrxsWpFBwu6PebrH6DQXdMBpl9V/vLqIWg7NxxbJaFgZO8+9gOoga6KsHmCPblroAKjw8uZzlf49fEMO5oXA1PHWEIu2ztGWhzsMSvf4qZY75uQ= X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1137; 20:z2vUSdvVNALL4rmGyeZD5SK9tO7qamhZXrRL0jWYPj9EEWYRXHMxT//coWtZPBazujE2/kn+n1lY9IOqBWx1BUqLgaWLZ1ZHIhvXktOXMlT9ikAUE1tIjuTPjVSG/IFXhiMyrmvqls6w9YeroOxsNbYMfZKHn2h/XC5KmlyjrhnxR29qc/juLIoRSmlEtzdI+sKBPVLCDXtpvncZl8SqN44vrMn7mKFldP81CJwOlOWwkHuz+GJtNhek3kkANVHq X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Jul 2017 13:42:14.2760 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1137 Cc: Brijesh Singh <brijesh.singh@amd.com>, Toshimitsu Kani <toshi.kani@hpe.com>, "Michael S. Tsirkin" <mst@redhat.com>, Matt Fleming <matt@codeblueprint.co.uk>, Alexander Potapenko <glider@google.com>, "H. Peter Anvin" <hpa@zytor.com>, Boris Ostrovsky <boris.ostrovsky@oracle.com>, Jonathan Corbet <corbet@lwn.net>, Joerg Roedel <joro@8bytes.org>, Radim =?utf-8?b?S3LEjW3DocWZ?= <rkrcmar@redhat.com>, Larry Woodman <lwoodman@redhat.com>, Ingo Molnar <mingo@redhat.com>, Andrey Ryabinin <aryabinin@virtuozzo.com>, Dave Young <dyoung@redhat.com>, Rik van Riel <riel@redhat.com>, Arnd Bergmann <arnd@arndb.de>, Borislav Petkov <bp@alien8.de>, Andy Lutomirski <luto@kernel.org>, Thomas Gleixner <tglx@linutronix.de>, Dmitry Vyukov <dvyukov@google.com>, Juergen Gross <jgross@suse.com>, Paolo Bonzini <pbonzini@redhat.com> Subject: [Xen-devel] [PATCH v9 22/38] x86/mm: Add support for changing the memory encryption attribute X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion <xen-devel.lists.xen.org> List-Unsubscribe: <https://lists.xen.org/cgi-bin/mailman/options/xen-devel>, <mailto:xen-devel-request@lists.xen.org?subject=unsubscribe> List-Post: <mailto:xen-devel@lists.xen.org> List-Help: <mailto:xen-devel-request@lists.xen.org?subject=help> List-Subscribe: <https://lists.xen.org/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xen.org?subject=subscribe> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" <xen-devel-bounces@lists.xen.org> X-Virus-Scanned: ClamAV using ClamSMTP |
diff --git a/arch/x86/include/asm/set_memory.h b/arch/x86/include/asm/set_memory.h index eaec6c3..cd71273 100644 --- a/arch/x86/include/asm/set_memory.h +++ b/arch/x86/include/asm/set_memory.h @@ -11,6 +11,7 @@ * Executability : eXeutable, NoteXecutable * Read/Write : ReadOnly, ReadWrite * Presence : NotPresent + * Encryption : Encrypted, Decrypted * * Within a category, the attributes are mutually exclusive. * @@ -42,6 +43,8 @@ int set_memory_wb(unsigned long addr, int numpages); int set_memory_np(unsigned long addr, int numpages); int set_memory_4k(unsigned long addr, int numpages); +int set_memory_encrypted(unsigned long addr, int numpages); +int set_memory_decrypted(unsigned long addr, int numpages); int set_memory_array_uc(unsigned long *addr, int addrinarray); int set_memory_array_wc(unsigned long *addr, int addrinarray); diff --git a/arch/x86/mm/pageattr.c b/arch/x86/mm/pageattr.c index e7d3866..d9e09fb 100644 --- a/arch/x86/mm/pageattr.c +++ b/arch/x86/mm/pageattr.c @@ -1769,6 +1769,68 @@ int set_memory_4k(unsigned long addr, int numpages) __pgprot(0), 1, 0, NULL); } +static int __set_memory_enc_dec(unsigned long addr, int numpages, bool enc) +{ + struct cpa_data cpa; + unsigned long start; + int ret; + + /* Nothing to do if the SME is not active */ + if (!sme_active()) + return 0; + + /* Should not be working on unaligned addresses */ + if (WARN_ONCE(addr & ~PAGE_MASK, "misaligned address: %#lx\n", addr)) + addr &= PAGE_MASK; + + start = addr; + + memset(&cpa, 0, sizeof(cpa)); + cpa.vaddr = &addr; + cpa.numpages = numpages; + cpa.mask_set = enc ? __pgprot(_PAGE_ENC) : __pgprot(0); + cpa.mask_clr = enc ? __pgprot(0) : __pgprot(_PAGE_ENC); + cpa.pgd = init_mm.pgd; + + /* Must avoid aliasing mappings in the highmem code */ + kmap_flush_unused(); + vm_unmap_aliases(); + + /* + * Before changing the encryption attribute, we need to flush caches. + */ + if (static_cpu_has(X86_FEATURE_CLFLUSH)) + cpa_flush_range(start, numpages, 1); + else + cpa_flush_all(1); + + ret = __change_page_attr_set_clr(&cpa, 1); + + /* + * After changing the encryption attribute, we need to flush TLBs + * again in case any speculative TLB caching occurred (but no need + * to flush caches again). We could just use cpa_flush_all(), but + * in case TLB flushing gets optimized in the cpa_flush_range() + * path use the same logic as above. + */ + if (static_cpu_has(X86_FEATURE_CLFLUSH)) + cpa_flush_range(start, numpages, 0); + else + cpa_flush_all(0); + + return ret; +} + +int set_memory_encrypted(unsigned long addr, int numpages) +{ + return __set_memory_enc_dec(addr, numpages, true); +} + +int set_memory_decrypted(unsigned long addr, int numpages) +{ + return __set_memory_enc_dec(addr, numpages, false); +} + int set_pages_uc(struct page *page, int numpages) { unsigned long addr = (unsigned long)page_address(page);