From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756616AbcHVXJc (ORCPT ); Mon, 22 Aug 2016 19:09:32 -0400 Received: from mail-cys01nam02on0046.outbound.protection.outlook.com ([104.47.37.46]:59760 "EHLO NAM02-CY1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754818AbcHVXJ1 (ORCPT ); Mon, 22 Aug 2016 19:09:27 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Thomas.Lendacky@amd.com; From: Tom Lendacky Subject: [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement To: , , , , , , , , CC: Radim =?utf-8?b?S3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , "Konrad Rzeszutek Wilk" , Andrey Ryabinin , Ingo Molnar , Borislav Petkov , "Andy Lutomirski" , "H. Peter Anvin" , "Paolo Bonzini" , Alexander Potapenko , Thomas Gleixner , Dmitry Vyukov Date: Mon, 22 Aug 2016 17:35:59 -0500 Message-ID: <20160822223559.29880.1502.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: SN2PR17CA0005.namprd17.prod.outlook.com (10.169.188.143) To CY4PR12MB1141.namprd12.prod.outlook.com (10.168.163.149) X-MS-Office365-Filtering-Correlation-Id: 47b8e606-71dc-4cf5-2418-08d3cadcb356 X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;2:/QFT1R4dqyRS3IUUWTnkKlRxUIs41jReu47IaBvD9GNnjWNlIkK6Nqor4YTMTQt4m00VU8fXIkl4wZxmLka57TBTDH/at9y3T54iahakntJb7liPX0is9aClHmRgi1HF4O3AhUmV0ZKE/hD8N8vCcxIG2GnoLYvV8nkpLaqlbvHpkKjWctRgWQmkfFWrQCdu;3:ZFqcbw9zFt/85MPOPXn64Upivbl061zoc12F6hgLBLpDwCOxQIuJBF8CjDo6aEzFknMuHWyJA4vPo7H9KVFQlJBYOM6U++FtYWYbAbIO6u63+OCyiIEW94yuLABFwgpr X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY4PR12MB1141; X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;25: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 X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;31:9gR5BXpRyNfO6QkQ7V+9d8Zr3CT3iSKRWXfJdYEuprGpfMHG4Vg1p+mRbeB0Q7gy4n7dsa+omeJ0y4ml/usztwN/qM3EpfeV4n5XjxUmlQQcC8xkmxOP6rFOuMT1zNuPIwoYOAymP/CN1kbbHC5GRwJG493e1TpaB+nV2e7IKjOoLo5V5+xC0XjdkYahtzv36zzDo/R8x9C5J5CufVMf6wdrZdsYCoTRs0BsLklMnhg=;20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040176)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6055026);SRVR:CY4PR12MB1141;BCL:0;PCL:0;RULEID:;SRVR:CY4PR12MB1141; X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;4:+RLvAC9AxYM5olvShITtQOMPnthaokTmC7J0kd3m7hbwozN7NlGKbx1NZMAoisleSRX73cDgKUpMR6+iOioyXx16z6Dmkl60PojwpYvNs/GvjjwlWBqnuS7MfrXc5Zs41ipYRtHo5cM4d6YcgUInCcHuzMzbIHa+HCC9VbCTCN9DtyRmfBZl2iXys4irvbtivtbuzJvNK4+QibmvfdgRth4xpqOJRgMCa33pTMW5cg7njY9OBb/auJ+tCobL0/qcZc640lZg8C0yf4hpnUvD2ZwnX9TzVTTabjysCxOovy9TS1FoEjmSLmfSnYEB/ua7i5nx2H52NmhA2yAklQG3JD5vdNfzth7B1tD8mpw9Tl5koouf6n+8OS2UOVg4f4Tf3QdvawQe0EQmwm79OOvtSPSkRxvjXDHmLjpbo0UrzWS+5hddIALJ1MkdtqqA3ybW X-Forefront-PRVS: 00429279BA X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6009001)(7916002)(199003)(189002)(23676002)(106356001)(229853001)(105586002)(50986999)(83506001)(33646002)(97746001)(76176999)(54356999)(42186005)(101416001)(2201001)(86362001)(5660300001)(103116003)(66066001)(47776003)(50466002)(19580405001)(97736004)(19580395003)(5001770100001)(4001350100001)(7846002)(53416004)(189998001)(77096005)(305945005)(230700001)(81156014)(4326007)(7416002)(586003)(7736002)(3846002)(6116002)(8676002)(2906002)(81166006)(9686002)(92566002)(68736007)(2950100001)(1076002)(69596002)(71626007)(217873001);DIR:OUT;SFP:1101;SCL:1;SRVR:CY4PR12MB1141;H:tlendack-t1.amdoffice.net;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDWTRQUjEyTUIxMTQxOzIzOlpDV3VOZjZwVFdIZjUzWHgzRFdodVloSXd4?= =?utf-8?B?d1FLU2p2ZHN1dTNXRzkvR3JueFVhZ0FFRzRZMkcyM3JIU2JLNjZrZEFmOGRx?= =?utf-8?B?VWlvU1F6bDdFZnFRcjdTT2R1QTRYSnhma0RCZDVTQzhaYlNhSHAwckVmYTNC?= =?utf-8?B?RXJoSGpVZkdEYUo0YVNHalAxcHgwcXdTNDQ5WnZyeGtjdjR6ZU1oU1VlamZw?= =?utf-8?B?L0kzOTFRSGZHcW5mRVFTYU9rcytodWtSUDJmTkJHWm5JWDI5NCtHTGtVR0Jn?= =?utf-8?B?eC8rWUtvK205VFFOY29DMWJhMXpubm9tcExIbW1qTGVaVWYrSUNCNkZIR25I?= =?utf-8?B?NEZaNFhyenU2VUFzV01ac3EzOFF1WEVYS0hhOE84WXMrOWh6MUU3dmtYY3FP?= =?utf-8?B?MnRXc1hEOVlha3dwL0Y2czN1azUxK3M0cS9ld3hocDZobXRmOG9mR2dMdGJK?= =?utf-8?B?SytwY0xnMS8xb1hWRHpnUm9BWjZmRzNDbk9RWTVYclBFTEp2QXhRWGhaOUtz?= =?utf-8?B?S3FNN1ppZC9Cb3U2cEUwUHMyVy8wK1crLzl6WDJxcjVOaWNXa1JYYjZEYUY4?= =?utf-8?B?RTJPS3dGS2lDZllnK1FxN09SeU9MNmxndDRwMlJseU1aaFAvbnRpTGdYeFZy?= =?utf-8?B?SXlEODdZUjBHWm9sanZkTVpyTWZtcW9DQkJRYVlSMllqZ2sycXBUT0xibVdx?= =?utf-8?B?UFVTMS8rRllDeDdpREpHNHhJbmxTKzZoZWtkeUlMRGVqVk9nK25KYkNsOFEr?= =?utf-8?B?eG5RMUwyYU05SXNYNWhLTzhDa2JNak5yK0pSa2JNUUE1Q25KMGRFZCt4WDlP?= =?utf-8?B?czhhZGQvRktLazFUNzV6NStEaXhpMVZ1amVnUURhWFpkcDlBcWxIeG9wZHM2?= =?utf-8?B?VkRxcmloM3pSd3RKSGlNTTFJb21adG1yMEtWSnZGOVBVL215YmM5aUtJV21Y?= =?utf-8?B?bWswZytwVkN1b0hxVWltRVY0NncyYVU0NW1PVXkxMWZxTFdsS1lsSTB0NGMv?= =?utf-8?B?VVU2L3hnQTdiZFVnbGZuZlZVdC9RVVVoN2xnVyt2QVJmajF6SWYvMllDSW42?= =?utf-8?B?SWN6N3ZqeGc3U255Q0FtZCtQVk9UcU9YSmt2cXlodUJXdFhjeEkvWHFJQ2di?= =?utf-8?B?OU84VE81akdPT1d6dnNKUjNhbE5XTGpTbk90SlZEeVh0ZXhPcC9UbkloUi9Q?= =?utf-8?B?Q1JtTVdtd2N0WGExY1NGdmJFcGFWUy81NVJneFNuUEV1b0tyNVk5bUlEZlpZ?= =?utf-8?B?eEpRQnVMd3I3QmhFbmsxZHpXMmlHYXByOU4xVHhsYWx0MnNvcWdndXVFQVB4?= =?utf-8?B?UXlrRXM1b0xlTG9oYTU2eERLalZtaFhjUXVMcjQ4RWxxM1dCMFRuN0NCakJ0?= =?utf-8?B?SUE3QktYQ2VPYVcyajlsZUs2VWdla21tZWdjT2hzbkU4WFFWWVFuREpTdUt5?= =?utf-8?B?UmU0WTNJN3M3ck9KWnhHM3ErN0FaS0xPOUlyWS8vcm5QeUFQU3pLUFpkV3Nj?= =?utf-8?B?MUxLOFR0ZFU0Z0RTYjVPZ0t3cmY2Z2l5VEZodXBzNjRPSGJLcTZMemJHeWtk?= =?utf-8?B?SU1VTzVLTUNBZkZKckZxd1JUR3RxT0toM1FCVHlhZE1ndGpwVnkxVGRQc3RM?= =?utf-8?B?QTVvT2p2MEFyRHlQRC96TGM4OEg0OGYxYzVLdVJjdUFjSTlTNjQ0SE8vYU9w?= =?utf-8?B?OEhFdE9TaWU4MXpNa0c5c1VBbzdYMVVZTEJHUU8vNjgyYXo5Z1F2eFlNZnIy?= =?utf-8?Q?PR8ZI09/CplMZ6bU6wkPZCXDLsF6VSxwJJSps=3D?= X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;6:BQzd1JS4/G9Vzw6wX008Bd6EAhP++8jRmAd9eZoRX2cDDXaRrAyFOswKacmjdl3YnkZXG+bJr4LrtPtTm/zlV43JFeazbvSiCfMwhZNpgiz6MpYTgVI99FcYLmN1JqT1p+qjDCH+C4A/OOZYDQBdVjRxlkkbASPrV3UVC07h7TDFQpuGxfa07/qivgHVICpB5LVUpjrv57TJijmKFLc//iH8DzwIEZG0BZug4jH3l1wyAmGeFFTybEbtzecME+DS/4G0d7FFMB27YzWzZi0ooZ0U4iNK4zFRPsrjXAkoADEVk9UTW9pNOs6C/E9GIZZPgfXSjwz/UlEUUkVPq1cn5Q==;5:P2xn9eiqSMDxCEZnYahgSsFfvOdpYg4oeFLMwzGnKdIrL8AoLih86gUkb2R0y3Q/IME1A/rH2O0eeKZgN8fpij+TqzdujZ3RiiWThWMxZRWzHihFr5/2RlsVqUEKdo93KvZts91bgRKapwn5gR+nwg==;24:c7w5qreOxzQrAVV/OqPcs35TGSOSb9n63mMhHQXZrUwUzKyYNrY6Ckwa0loW84iuKerjD9rIXGoUrbFmTwTvv6IcaEyuhdFIONzzLtI1odo=;7:QgDrdahYPL0M1Dc0F0RHYHuy8TGtu718yM3ciBEJaMFxYNgOSjSi7r6loI436XbAEp40bA2AWMIrRmFCCDOVAIONnZMUI4jGadXOuFI0+O+dtU9oWVXQq63PJkum412CPSkgzEcPwQwLRNZoVJH9vfDX4VwQUNunTN/MViJc5fBn5DQb2+qu1uBrs67SK0dh8Z1obP95K9j1p0EST3zKogsrgfGU018ZA/SmKW9HlGtdOwhA1uE15WXSey0E/qt+ SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;20:YxJ9HQtKO15UWFkzt6xu2GzQQVhE+ACijTLBKAKdzfFuVwqDwzeGJ4pDgJsnf2PAZeM+Zo41SF7u+kLeystijmi7wIGdUh4Khga+J8eOoQbVF1NeV4xRgG2bUaw65MCvP+67w89xcd7jcB+1wp+ztg6GIUayQQ5H0kGVZ2lycS8vGXENG8v9VzeVuvcpQW3YLNzC5AVKw+bRcL0lNUiaIXF1uvuvTGlBauLXYyLFaKV56FdjO+DrTWGtUSU9KlEk X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Aug 2016 22:36:02.8875 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1141 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Provide the Kconfig support to build the SME support in the kernel. Signed-off-by: Tom Lendacky --- arch/x86/Kconfig | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index c580d8c..131f329 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1357,6 +1357,15 @@ config X86_DIRECT_GBPAGES supports them), so don't confuse the user by printing that we have them enabled. +config AMD_MEM_ENCRYPT + bool "Secure Memory Encryption support for AMD" + depends on X86_64 && CPU_SUP_AMD + ---help--- + Say yes to enable the encryption of system memory. This requires + an AMD processor that supports Secure Memory Encryption (SME). + The encryption of system memory is disabled by default but can be + enabled with the mem_encrypt=on command line option. + # Common NUMA Features config NUMA bool "Numa Memory Allocation and Scheduler Support" From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Lendacky Subject: [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement Date: Mon, 22 Aug 2016 17:35:59 -0500 Message-ID: <20160822223559.29880.1502.stgit@tlendack-t1.amdoffice.net> References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> Sender: owner-linux-mm@kvack.org To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org Cc: Radim =?utf-8?b?S3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Thomas Gleixner , Dmitry Vyukov List-Id: linux-efi@vger.kernel.org Provide the Kconfig support to build the SME support in the kernel. Signed-off-by: Tom Lendacky --- arch/x86/Kconfig | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index c580d8c..131f329 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1357,6 +1357,15 @@ config X86_DIRECT_GBPAGES supports them), so don't confuse the user by printing that we have them enabled. +config AMD_MEM_ENCRYPT + bool "Secure Memory Encryption support for AMD" + depends on X86_64 && CPU_SUP_AMD + ---help--- + Say yes to enable the encryption of system memory. This requires + an AMD processor that supports Secure Memory Encryption (SME). + The encryption of system memory is disabled by default but can be + enabled with the mem_encrypt=on command line option. + # Common NUMA Features config NUMA bool "Numa Memory Allocation and Scheduler Support" -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-cys01nam02on0046.outbound.protection.outlook.com ([104.47.37.46]:59760 "EHLO NAM02-CY1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754818AbcHVXJ1 (ORCPT ); Mon, 22 Aug 2016 19:09:27 -0400 From: Tom Lendacky Subject: [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement Date: Mon, 22 Aug 2016 17:35:59 -0500 Message-ID: <20160822223559.29880.1502.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-arch-owner@vger.kernel.org List-ID: To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org Cc: Radim =?utf-8?b?S3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Thomas Gleixner , Dmitry Vyukov Message-ID: <20160822223559.GXRpj9MwZRDj5C2h2JP0zrbZ2Gu1Y5oVfYVobqDoHn0@z> Provide the Kconfig support to build the SME support in the kernel. Signed-off-by: Tom Lendacky --- arch/x86/Kconfig | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index c580d8c..131f329 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1357,6 +1357,15 @@ config X86_DIRECT_GBPAGES supports them), so don't confuse the user by printing that we have them enabled. +config AMD_MEM_ENCRYPT + bool "Secure Memory Encryption support for AMD" + depends on X86_64 && CPU_SUP_AMD + ---help--- + Say yes to enable the encryption of system memory. This requires + an AMD processor that supports Secure Memory Encryption (SME). + The encryption of system memory is disabled by default but can be + enabled with the mem_encrypt=on command line option. + # Common NUMA Features config NUMA bool "Numa Memory Allocation and Scheduler Support" From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Lendacky Subject: [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement Date: Mon, 22 Aug 2016 17:35:59 -0500 Message-ID: <20160822223559.29880.1502.stgit@tlendack-t1.amdoffice.net> References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Cc: Radim =?utf-8?b?S3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , "Konrad Rzeszutek Wilk" , Andrey Ryabinin , Ingo Molnar , Borislav Petkov , "Andy Lutomirski" , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , "Thomas Gleixner" , Dmitry Vyukov To: , , , , , , , , Return-path: In-Reply-To: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> Sender: owner-linux-mm@kvack.org List-Id: kvm.vger.kernel.org Provide the Kconfig support to build the SME support in the kernel. Signed-off-by: Tom Lendacky --- arch/x86/Kconfig | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index c580d8c..131f329 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1357,6 +1357,15 @@ config X86_DIRECT_GBPAGES supports them), so don't confuse the user by printing that we have them enabled. +config AMD_MEM_ENCRYPT + bool "Secure Memory Encryption support for AMD" + depends on X86_64 && CPU_SUP_AMD + ---help--- + Say yes to enable the encryption of system memory. This requires + an AMD processor that supports Secure Memory Encryption (SME). + The encryption of system memory is disabled by default but can be + enabled with the mem_encrypt=on command line option. + # Common NUMA Features config NUMA bool "Numa Memory Allocation and Scheduler Support" -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org