From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757181AbcHVX6L (ORCPT ); Mon, 22 Aug 2016 19:58:11 -0400 Received: from mail-co1nam03on0046.outbound.protection.outlook.com ([104.47.40.46]:16725 "EHLO NAM03-CO1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1755825AbcHVX6C (ORCPT ); Mon, 22 Aug 2016 19:58:02 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; Subject: [RFC PATCH v1 13/28] iommu/amd: AMD IOMMU support for SEV From: Brijesh Singh To: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Date: Mon, 22 Aug 2016 19:26:13 -0400 Message-ID: <147190837333.9523.16962214308407411754.stgit@brijesh-build-machine> In-Reply-To: <147190820782.9523.4967724730957229273.stgit@brijesh-build-machine> References: <147190820782.9523.4967724730957229273.stgit@brijesh-build-machine> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: YQXPR01CA0055.CANPRD01.PROD.OUTLOOK.COM (10.165.103.23) To BLUPR12MB0659.namprd12.prod.outlook.com (10.163.217.29) X-MS-Office365-Filtering-Correlation-Id: fa4e86ef-d05d-43c9-c8ad-08d3cae3ba95 X-Microsoft-Exchange-Diagnostics: 1;BLUPR12MB0659;2:6oJEXIFHV8p4T6BnGr/hWfsZ0ZkyRSJRNFJgM8IbIAFR9/x5Q0oYOwsvCg8xcrG9qCX4BHlYmDmRntt4cdHtLDmpXMOjQagi6TL7TEn220gf0+DoqFLVAC+HuriHhQtoU2hN+wqaKU1hR6EWV1jE/ZM5WYYOx7WfEJq22UGZPbGFmlfplcaKr4cEAjEs108V;3:sHv0lPAGp0IgIARPu0xFoNkfXGCIRo0Ic8QfuHbIc1Bxk143uPykJJPyb/rRR+Vqk8lKOg4b2Ctk1EN0cZsUNvryAGXFlzL3SCWbkX5paXpRYO8bhABeU1UlewbuUKQV;25:Gh+gHxwRSmdwNBNqzdtTopOfmQagUyl2yXy/E7WHtf1oIddhY26tw3QlW6tKll7G+Zjj6PzsciJM7a8TdRq8kpx79TqhjLzG6xgXCF4dnYsVs6dTRmi5zqszzUhcqxApdWv6uyrirZ51I/vjVnCzBEFDFZ+hnnbviiIMAx+k3jvI4DOQVl28+vVf6cYLn5OeY0AV8TietpB6MauFkukWx7LxT7y8JA+9LjlPoQARiE4splE5Wk2OqVlI8eEP/EgZvC5WloEhzFyZ1J/JjNVTLqLcovqAjDpl4+bTlwDi4sb+l7t2hd+NXTD3zEzcxiqvTun6bycT/IOFDpFOzWsKnIQkKC4ZFFUe6oOCGWDV3Band37TRKNvxkelaoCCK3e/r6A9D97esE7ZV72cK4NOFTbtZCGl0k6NNrifRPZxU8U= X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BLUPR12MB0659; X-Microsoft-Exchange-Diagnostics: 1;BLUPR12MB0659;31:pAtsGp8Gy8kYHicY/MS1Xq9R6WSsdxrF5kna0n2arAGeyZV5fl8V/dDeGXtVSNmrUWt1BxYiSJpj+jGlPDKS9IGBZRVoCkUGn6q/ZPbZ8U5wm/Ou0B2mvUXx9haHRoTqFHFl743y9baOKsDA0UIUL2MaUEG+7lR5JAXg0Qj5Hpd4zrv8YIwNH2C3probLcIBQQ3O2NFAzPhaaueCnUDWHtL6jvJHtt0FHxCwxtwiTH8=;20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040176)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(6055026);SRVR:BLUPR12MB0659;BCL:0;PCL:0;RULEID:;SRVR:BLUPR12MB0659; X-Microsoft-Exchange-Diagnostics: 1;BLUPR12MB0659;4:5GAHsk+juzxovKOTnUKu6i0QAF4DKsd0XgQjtQJXvTiN9vtdIx05MrhHd6mXV0+/0uQPUhQGEzWTgoj95sGkWLIeiFXYWAYTzNRqov8O6yIbfxaOQgOr5bhm7Pl3ZaXQCj/qqFxH2cqaLYqLP22r8UW8kduGWLGPW2XwrGX0D8LoMQ+6XBB7XWSjoz0uQqmT5uN749a1VvDe/gjtE/GbE7dQ5CFAh5MTViovcbje/ywNvpI2WJFoP82w5xKD7tnZmzoL2+EsRnuLvlr/gv7XqBp14AW6F7T4InhDsQy2ltUY3D236uV1ZuGq7AeM3mSgLECjJfNWNaaSq9/j0Lumq03UvliL4UyYrU6gKxHDeJj6D7Sax86wAutg69ltjfTnkkSPxUltA90U7TOhiv2FvwdGL1Qp5o6Ol/bffi/3ilDKZtClgq34MTrHpNxUOWZX X-Forefront-PRVS: 00429279BA X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6049001)(6009001)(7916002)(189002)(199003)(50986999)(54356999)(19580395003)(66066001)(47776003)(86362001)(2906002)(19580405001)(76176999)(23676002)(105586002)(5660300001)(103116003)(2201001)(50466002)(7846002)(68736007)(101416001)(77096005)(8676002)(2950100001)(81166006)(81156014)(7736002)(92566002)(107886002)(229853001)(33716001)(33646002)(7416002)(106356001)(305945005)(7406005)(189998001)(9686002)(586003)(5001770100001)(83506001)(3846002)(6116002)(230700001)(4001350100001)(97736004)(42186005)(921003)(217873001)(2101003)(1121003)(83996005);DIR:OUT;SFP:1101;SCL:1;SRVR:BLUPR12MB0659;H:[127.0.1.1];FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTFVQUjEyTUIwNjU5OzIzOm9JQUs3dVNmbzNPb3o5ZmRzMlEvRGdYSjlU?= =?utf-8?B?MXZINllGTmxuL2tET0QyQ1B0MlBWcWJVUitYMlgzR2xqM2Z4RmZ4OEVDMjls?= =?utf-8?B?WktaZTgwbU1YdHRVaWFVTG1IU1cyQjJmaFhzaHJ4dDB6LzdydTZjYU41WVMy?= =?utf-8?B?VWRObDZBaUlESlBPVHJ4eEwwZXRJUno0K3VkNHZGV2xnemxXMnpTbjhSODhK?= =?utf-8?B?M1VQa0FNT0pPUG9kdkxOK2dHc2ZOdWZ5RVFSVmM2YkFIWGM5SC92R3FJMzdD?= =?utf-8?B?emg1UXhjbm5ScW5MbVg5MktIWTkxd2lGWlEvSVBieVhFeHpvckVKNCtBUG5y?= =?utf-8?B?MmNlbUt0MFNrVlRJckE2QlczNHVqWTB0Qm5BQ0RROFpYNSs3QUtXSS9hZlZH?= =?utf-8?B?WkhUQnNiL0JVTEVvZ2p0alJvb2szMGpXZ3lOQk9SWFF6eitPNzJtbjJVRWVt?= =?utf-8?B?N3gxT0x3dXJaOGJqQWRSdkdxQjFNVklKK0Y4RWRLcDNzWVgyWnRGZ21HRGd3?= =?utf-8?B?Vyt4ays0enpZWTdhYlR3cU1ENXY0cHY1bUZ2WjZ0MGlmbE15ZmFNWXlxWGI5?= =?utf-8?B?K1Iyb1kvSUpWRzFZaEFVVDRFTldZMWVvTHN5Yi93M2Qwb0s0L0kxc25Wa2Y2?= =?utf-8?B?d1pQajE1Znp2M1ovLytzMjEyNGcrNFphM1p1bTFHSHY2UEMzYU1vRkE3Nmla?= =?utf-8?B?a0F6RmgxcGh3YUpScmRacThOVW1BM0FTK2krdFNUeHMvcFVoZlMxa2ZVanNm?= =?utf-8?B?SGNxZ3labVZJY2EvS0FJak9DTnMzNzhCZmxyQUVZNDJmLzBFRnVXTXpRdjlV?= =?utf-8?B?TGhzK25Pd2JBY2wvYkp6Nnc0RlcrRlFrWWdsMlVKVkNGWklrWW5nNlFBK1U3?= =?utf-8?B?NnY4QUpqWE1RaFRsMVlkZS9meHpIbU9YbmlZeEVFMDlhRWlCL2d3ZGdMZlo3?= =?utf-8?B?SEp1OXZJWXlDaUs4TVJPUjI2cjNWZEJMUWZ4eVlSNVVaSkV5N1g1cVRod3pK?= =?utf-8?B?QVQ1VXpuY3orR3B5RG14djNxTjJXSnNMK1VwOXNHZy8wOENHSlpOeDZBQWhS?= =?utf-8?B?VDlRTWhhbWpOeUZNOHRuOFc0dzU2YnhlQVhBM0ljcEI4czZydmFhOWtFV1lo?= =?utf-8?B?TXcvcC9aaFNjVktZWm1CbVhNZWMrVHZrUXRuVHFoeHFrWThoNnV0RXJkK2tS?= =?utf-8?B?cm9UdjNJMnVrK3lSa21aRFZiS3lXOWp6VmtNYTJVMUVWV0FNeVhWcVJydGYx?= =?utf-8?B?M1dYcThWb1pKaDRCbGV1aWkwZGJEQ0FSMmlJWFBCRzB3RFlubnBuZ0ZqWFVo?= =?utf-8?B?bHJpSENZby9rSE12TFVoa0NBWjV0L2JtM2NTbzM5YUR0cTVtN2hRVEdBSUxT?= =?utf-8?B?RGw1TUNkR0NnWG83N2lmQXNGMGJ0WkxBNG1raURmUDdaRy8vanY0TE8zL0tB?= =?utf-8?B?eEU5emwya0ZRNDFaek94V3FxOGVhZ0NhQTB4N3k3T0RNRlFBc2lhT3ZZWjhl?= =?utf-8?B?OEgyY2E4UDhWbFNKU2lhZ3dlUHd5TDZkT0thVzArYTFrTERVQUxpVnlOOHp3?= =?utf-8?B?WUVWMDl2Um4vZlFCa2xyVGJTSG00VmRDR3hjRkUvZlZ3TCt1MkVhMGNLbjUz?= =?utf-8?B?WmRlUTBpQzBVQStkbVBpdG9YS1NoYmZQcFp4SnVYU3NBK3oyYnlWMmYyaUZP?= =?utf-8?B?VGxMbktBd0ZLdnkrTTFxLzhxOEgwMjJsUUcvbXJKVWp5dVhuWXp1M3I1cGpG?= =?utf-8?B?elVzbGpDMWdqRUQxSzliRGMxWFRyZEluaFJPSm41dFZzb1BuZEdMWlJ5ZnNF?= =?utf-8?Q?mY1jmBcqxIF66?= X-Microsoft-Exchange-Diagnostics: 1;BLUPR12MB0659;6:DdwH9JIE112unTJaITFYNGalVAivPNzySFWt6bJEq5cUJ5HJfYTg971M5ja1wLaq/EvbHBxMXvNKTm+HPMhvkiBSkt9Av883UafERlVagZtXu4TDFnRsI/erlhKtf0wRx9Jddh6s+0b7/okflyhz/KV3mmHo64gpki7S0nG85DoDEsPKmBOSqBpBi3sf7ZguGJi/dExg6KoaExjkVi7SvG2wuOZsD7IZwSWzq79Q/JaXU8fGdDYzOS1vDGkCMRqZKtBO+jkBTS3fGACkUnXWU/2SLHF6Tl9odWJkJT/ScKXqMD9DJ7alPp5BHxX11sUgT41rhSzhbJ0zUNkwz3gZqg==;5:8mrGiu4nFsMwU5CUM8MkfJNyKdrh9OfCLBhaHeixp/mHJX0t3baq1/yF3c2htgKc5pE3XCcGW7u9+Dxh+ayqCRz9TPCq+lIW8CqsM4IR8nQID5loxAYB9twsTmB/HdwsacfZzbKCdJWmIQ8ACIh1mw==;24:r83NMGmGGbzxokOE6cOtsxeHZ2DtAwwjDIXkJb130T7yBLS/bRbZfzn+uaxkm9Y+6eqb2SztiP/iv74IO3UuLob61dRtEtr55otuuFJv7yM=;7:eaV/u9BffrS36jFwlf3kctc3c4AHMjy11rbl8zsMHvJ/r6qo1gRlEa9ARfo+s4ViTGg+GOKydCUGENi7Tz+t1JN4jXN3ia2mjqaOBW+D/PQfLR3tgvlNPytvA8kB3TztWJot7C4Aw5oWn+F1sfh4AbTiMVTzK4u8SjZQGv8XQpxBOzjFg7fmVjqT2HVpgWmD1BU99M7XH40KxxJyIDpzlge4/gjGBNwu/YzCW9idDSfciQEZXtrkaYy3frbSY0dW SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;BLUPR12MB0659;20:I//8rDgZPeKyYCVOwRClXSj/uZkIhFMEElJ7OAhoyq20Ze9kuuFLJvHHDQ/zToUB3MX+4Mzfq/T/xTXlVOOhNZovZ8NNKjQ830QovpPELA3qwBt8xBsTtBB2cHgxnLWqfmANr0p4CA/+Fydair/qzmWd4K+u7Nr7ETpHJ1HLYySjQBre57I9u4MThFk29L4QtGS0qbI/r1A1cxL6oB8Dz7+WKfz6ze9mdXrjtnSSJ7hyvlsYWsI/G35bIfMrtK7k X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Aug 2016 23:26:18.5009 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR12MB0659 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tom Lendacky DMA must be performed to memory that is not mapped encrypted when running with SEV active. So if SEV is active, do not return the encryption mask to the IOMMU. Signed-off-by: Tom Lendacky --- arch/x86/mm/mem_encrypt.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/mm/mem_encrypt.c b/arch/x86/mm/mem_encrypt.c index ce6e3ea..d6e9f96 100644 --- a/arch/x86/mm/mem_encrypt.c +++ b/arch/x86/mm/mem_encrypt.c @@ -237,7 +237,7 @@ void __init mem_encrypt_init(void) unsigned long amd_iommu_get_me_mask(void) { - return sme_me_mask; + return sev_active ? 0 : sme_me_mask; } unsigned long swiotlb_get_me_mask(void) From mboxrd@z Thu Jan 1 00:00:00 1970 From: Brijesh Singh Subject: [RFC PATCH v1 13/28] iommu/amd: AMD IOMMU support for SEV Date: Mon, 22 Aug 2016 19:26:13 -0400 Message-ID: <147190837333.9523.16962214308407411754.stgit@brijesh-build-machine> References: <147190820782.9523.4967724730957229273.stgit@brijesh-build-machine> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <147190820782.9523.4967724730957229273.stgit@brijesh-build-machine> Sender: owner-linux-mm@kvack.org To: simon.guinot@sequanux.org, linux-efi@vger.kernel.org, brijesh.singh@amd.com, kvm@vger.kernel.org, rkrcmar@redhat.com, matt@codeblueprint.co.uk, linus.walleij@linaro.org, linux-mm@kvack.org, paul.gortmaker@windriver.com, hpa@zytor.com, dan.j.williams@intel.com, aarcange@redhat.com, sfr@canb.auug.org.au, andriy.shevchenko@linux.intel.com, herbert@gondor.apana.org.au, bhe@redhat.com, xemul@parallels.com, joro@8bytes.org, x86@kernel.org, mingo@redhat.com, msalter@redhat.com, ross.zwisler@linux.intel.com, bp@suse.de, dyoung@redhat.com, thomas.lendacky@amd.com, jroedel@suse.de, keescook@chromium.org, toshi.kani@hpe.com, mathieu.desnoyers@efficios.com, devel@linuxdriverproject.org, tglx@linutronix.de, mchehab@kernel.org, iamjoonsoo.kim@lge.com, labbott@fedoraproject.org, tony.luck@intel.com, alexandre.bounin List-Id: linux-efi@vger.kernel.org From: Tom Lendacky DMA must be performed to memory that is not mapped encrypted when running with SEV active. So if SEV is active, do not return the encryption mask to the IOMMU. Signed-off-by: Tom Lendacky --- arch/x86/mm/mem_encrypt.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/mm/mem_encrypt.c b/arch/x86/mm/mem_encrypt.c index ce6e3ea..d6e9f96 100644 --- a/arch/x86/mm/mem_encrypt.c +++ b/arch/x86/mm/mem_encrypt.c @@ -237,7 +237,7 @@ void __init mem_encrypt_init(void) unsigned long amd_iommu_get_me_mask(void) { - return sme_me_mask; + return sev_active ? 0 : sme_me_mask; } unsigned long swiotlb_get_me_mask(void) -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org From mboxrd@z Thu Jan 1 00:00:00 1970 From: Brijesh Singh Subject: [RFC PATCH v1 13/28] iommu/amd: AMD IOMMU support for SEV Date: Mon, 22 Aug 2016 19:26:13 -0400 Message-ID: <147190837333.9523.16962214308407411754.stgit@brijesh-build-machine> References: <147190820782.9523.4967724730957229273.stgit@brijesh-build-machine> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , In-Reply-To: <147190820782.9523.4967724730957229273.stgit@brijesh-build-machine> Sender: owner-linux-mm@kvack.org List-Id: kvm.vger.kernel.org From: Tom Lendacky DMA must be performed to memory that is not mapped encrypted when running with SEV active. So if SEV is active, do not return the encryption mask to the IOMMU. Signed-off-by: Tom Lendacky --- arch/x86/mm/mem_encrypt.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/mm/mem_encrypt.c b/arch/x86/mm/mem_encrypt.c index ce6e3ea..d6e9f96 100644 --- a/arch/x86/mm/mem_encrypt.c +++ b/arch/x86/mm/mem_encrypt.c @@ -237,7 +237,7 @@ void __init mem_encrypt_init(void) unsigned long amd_iommu_get_me_mask(void) { - return sme_me_mask; + return sev_active ? 0 : sme_me_mask; } unsigned long swiotlb_get_me_mask(void) -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-oi0-f69.google.com (mail-oi0-f69.google.com [209.85.218.69]) by kanga.kvack.org (Postfix) with ESMTP id 49D966B026A for ; Mon, 22 Aug 2016 19:26:27 -0400 (EDT) Received: by mail-oi0-f69.google.com with SMTP id w136so39356699oie.2 for ; Mon, 22 Aug 2016 16:26:27 -0700 (PDT) Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0040.outbound.protection.outlook.com. [104.47.34.40]) by mx.google.com with ESMTPS id e2si155141oic.121.2016.08.22.16.26.26 for (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 22 Aug 2016 16:26:26 -0700 (PDT) Subject: [RFC PATCH v1 13/28] iommu/amd: AMD IOMMU support for SEV From: Brijesh Singh Date: Mon, 22 Aug 2016 19:26:13 -0400 Message-ID: <147190837333.9523.16962214308407411754.stgit@brijesh-build-machine> In-Reply-To: <147190820782.9523.4967724730957229273.stgit@brijesh-build-machine> References: <147190820782.9523.4967724730957229273.stgit@brijesh-build-machine> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: simon.guinot@sequanux.org, linux-efi@vger.kernel.org, brijesh.singh@amd.com, kvm@vger.kernel.org, rkrcmar@redhat.com, matt@codeblueprint.co.uk, linus.walleij@linaro.org, linux-mm@kvack.org, paul.gortmaker@windriver.com, hpa@zytor.com, dan.j.williams@intel.com, aarcange@redhat.com, sfr@canb.auug.org.au, andriy.shevchenko@linux.intel.com, herbert@gondor.apana.org.au, bhe@redhat.com, xemul@parallels.com, joro@8bytes.org, x86@kernel.org, mingo@redhat.com, msalter@redhat.com, ross.zwisler@linux.intel.com, bp@suse.de, dyoung@redhat.com, thomas.lendacky@amd.com, jroedel@suse.de, keescook@chromium.org, toshi.kani@hpe.com, mathieu.desnoyers@efficios.com, devel@linuxdriverproject.org, tglx@linutronix.de, mchehab@kernel.org, iamjoonsoo.kim@lge.com, labbott@fedoraproject.org, tony.luck@intel.com, alexandre.bounine@idt.com, kuleshovmail@gmail.com, linux-kernel@vger.kernel.org, mcgrof@kernel.org, linux-crypto@vger.kernel.org, pbonzini@redhat.com, akpm@linux-foundation.org, davem@davemloft.net From: Tom Lendacky DMA must be performed to memory that is not mapped encrypted when running with SEV active. So if SEV is active, do not return the encryption mask to the IOMMU. Signed-off-by: Tom Lendacky --- arch/x86/mm/mem_encrypt.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/mm/mem_encrypt.c b/arch/x86/mm/mem_encrypt.c index ce6e3ea..d6e9f96 100644 --- a/arch/x86/mm/mem_encrypt.c +++ b/arch/x86/mm/mem_encrypt.c @@ -237,7 +237,7 @@ void __init mem_encrypt_init(void) unsigned long amd_iommu_get_me_mask(void) { - return sme_me_mask; + return sev_active ? 0 : sme_me_mask; } unsigned long swiotlb_get_me_mask(void) -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org