From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932414AbcKJAvu (ORCPT ); Wed, 9 Nov 2016 19:51:50 -0500 Received: from mail-cys01nam02on0073.outbound.protection.outlook.com ([104.47.37.73]:25039 "EHLO NAM02-CY1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932295AbcKJAvl (ORCPT ); Wed, 9 Nov 2016 19:51:41 -0500 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Thomas.Lendacky@amd.com; From: Tom Lendacky Subject: [RFC PATCH v3 14/20] iommu/amd: Disable AMD IOMMU if memory encryption is active To: , , , , , , , , CC: Rik van Riel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , "Paolo Bonzini" , Larry Woodman , "Ingo Molnar" , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Andrey Ryabinin , Alexander Potapenko , "Thomas Gleixner" , Dmitry Vyukov Date: Wed, 9 Nov 2016 18:37:32 -0600 Message-ID: <20161110003731.3280.67205.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> References: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: DM5PR20CA0023.namprd20.prod.outlook.com (10.173.136.161) To CY4PR12MB1141.namprd12.prod.outlook.com (10.168.163.149) X-MS-Office365-Filtering-Correlation-Id: a20a778b-bae4-4add-ba09-08d40901c3f5 X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;2:4vqfwW/GpyfYkzTqBCbZgGtn48hbrtrE7jGzzlITBmjoSZsATmWZa5xHfNsTTDQ2MHW1pFdQNyZ8hfIFQSBsPEiy/SkhTXmikEFwP2rP86cqgeo+InaA8DBHRlVfFVQppljw1m5x1I+CAD6fZc0+mklyMJq8zXdCdsxwRNPTvS7NBHjtDMI0VU4pctdHQeAmPYtK0zJL8FZbnRGEbg08bg==;3:pmSZMw09KKTzSDdPxHK9vrzg6krQzlE6K9pcFj9+8HEmsJRmyvYAMoFxWrrsEEz1RwawWLRwgCq3XJI2ozUfZjKNKAwj++8A0Udb/9PpWctDEGjJD2tUDgnv8Y8rww35CO9cIuC17FeTQEGD2fZ6FQ== X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY4PR12MB1141; X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;25:id6d0I1V2JvMazgZm3V1Y30AlRtMA1oaYqeZJhA5bTT9LZULSZHRvK2ot4g1ZAT927MpwkXYnuyXTTs/5oORY+85vWpByVK6m+a4rBfhTQC3DEjdcXzKjXetnSYhJSn7CKeqf16k1cLsdLWXkhhzJPmWMxx65WewqNqG/Leed5HXlUHOvRE1Gg5Y9HTOx6hvQBCv7B7tN4f7on7wIbOjzpVFOIkepJz1e8BTvhqB4Hx1KKAyJ0VB6BEHQ6Yc1WTU5EFIHKvp5yZoDQTNaOo5wzOsG7RZxoPYxm55W/gQnjcEMmn4bTw4ckRaclQ7VokAxu2tsqThTmtofjo9o3yInUMiTkmiV17VV2/+Voz+S3OioQcMzRqsjGxGNBrmBZb9QhZZ0TAdSn0JpSDKu5lxfYZ/nzG1hOEp31IiA1iQvDLrMZo7givc8qfMsFT0uinjhWzCgd4ISVhnUO5lc/RGgV5rUiNLCOwj9AWVrirFXJNLB8DyVohNW4AUjX/Ng077ghLVAjpbiYF9HztNCNp4s1l4C/GtJncfYLyZP8QDYXD3weLTJxyAjILO7FT4Zs4ave0kr6JSzv1IEg2artbZEH/tABmZY2cYDGRdbSJhtJVJEOjH5BmTRJuoOw70VCxvk2Al9VsECbh3JeFS/UKgG3cnpoK43k+HtFcSXhKQDGdxLOOalicQaD8ktrA+Y5AKt6wwRZsASSmLsxC7FUpqdDxEQ7cJmctVrAyPR1uN6YY= X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;31:epvVMk5phT6cs/SXxToMgWdsPJKS1UNCDBjd2bTpQGseVdElLKFbZPvO2JrAHewvxJVsWqvi012NSANE9Z3Jqx5io9oWqm4MaJjrjxAlQCsLQF9G64sBueRxjsiark4dm++qCxCA+Um0bD+rUbbendjJp2HMvarbZdFFAQ2qOQO1ulcmZ7MjT1bKfMJ+AvrlbvMwn0BXa39bjcWa1TwdEXpkUudIaJBltNLN2XscxUa6vF8mr+rHuKeFEQDruNitetEWwm0yONKGmxZLbWLILw==;20:dupioPKs5z+RyRQ0/0rH9REG0RSWHRXxtG6Rhp4GGmnl2t7HjUCOMLZ06S6C5BxvzRTrWUCTGKIlljer3oDNtofDv6X7nToWnrEZ+K2K89R+IGNSR8etwHRV8LJJ3gg0ZCFx9auvzcdfpmUPrKCjTyhowhlYdy1TKLOitUoGg12EjdQKpRLJdh71LFTO4hA7W/7pI0+PfU1pdLgei9iUZ12T4+/OqQp5fBnBu4O6hs4NutWnMK3Fkp7DWcMWWS5iA1mtatXTWqjJ17kYauyYQb5v4jjtHex8/Rjx65jTf/LHZjIjoKTnqHSxd7pOWYY2iI1B5yBzbSZBG5Kj4s8NQT1uh52lfp8YauCD2ELfA/8DLRrFK/dEBJskWntIC8h7KuWVTRFe8mAigiT+YhqQfMek/7ge+kw0Exhdezz27eDHAFCnfxvhQEnAgqH9pn3FajNkpweSOhN/i7sctqo5ketW+bSiYdYfSM8jke/Rvi9DBHzgYth//eJGb/omfTZh X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040176)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026);SRVR:CY4PR12MB1141;BCL:0;PCL:0;RULEID:;SRVR:CY4PR12MB1141; X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;4:OWiUQULnZ6Qyd6gYJz/2OJsVps2BWy9Z3TMAz7UJKE1R0ROWz7bawpBJV3tthi0wDRT+A9Sr9U4zK4wIln0p7HqN5uMnrjeXNxH5pbuTf7C5ej5DNz1mHRy1I96LhvbFZp6VPPlr5SHLfokQlEsWdQRtsMn0mVzhLpuSWFytdS8STabUPtqpz1qa641LQEBVBJSjaa9wwtSfEHp1UuMMR4bRhnI643DvcrGmJlg1b45CDi/Up/6tvmPZB9uyQwFQ87TDwsyRSDVd7m/SiO4j6jaI2pQeSbwVqQ+UN7RofQzQ+bC6gZPp3TNmiqZ8U164+JwFRiF5FGbatvNsvEe91gcLjDZB2wGgktm5ms4ONkRLIDhYv+j215O9J+iUF4lNJvWmN4j3ixIOQc5HrCHkAYPYkAEJTqwvSPTIIf8y9Sz92TvuxDeCrvwUzKAbrSlKlqwEQXXp9ay+6SqevIulzA== X-Forefront-PRVS: 01221E3973 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6009001)(7916002)(199003)(189002)(103116003)(92566002)(47776003)(23676002)(8676002)(7736002)(69596002)(50466002)(189998001)(81166006)(66066001)(9686002)(305945005)(5660300001)(77096005)(7846002)(101416001)(86362001)(2201001)(2950100002)(5001770100001)(50986999)(4001350100001)(76176999)(54356999)(97736004)(1076002)(81156014)(53416004)(105586002)(42186005)(4326007)(83506001)(7416002)(97746001)(6116002)(230700001)(3846002)(586003)(68736007)(106356001)(33646002)(2906002)(71626007)(217873001);DIR:OUT;SFP:1101;SCL:1;SRVR:CY4PR12MB1141;H:tlendack-t1.amdoffice.net;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDWTRQUjEyTUIxMTQxOzIzOkRvU08zUjZGbzRTOWNOT25pWXlRSkZib0lq?= =?utf-8?B?ZTBYUTJNcCtmYzJrcFJVZzl2dVhrZExNRVZZdFExSWZmMDMzMGF1VXFBbFo0?= =?utf-8?B?QkVsbXJ3cXVDdUtiZXVDQzZ3bHJpY0JjcGRxRW1GcEsvSmZZcmh0d2gxQzJv?= =?utf-8?B?WC9MZklway9OdURHTGlNVS9jNTZ6VWQvbjhIdlMwM3d1Zmc4c2pNNGhVTWhq?= =?utf-8?B?aXIrM2pTNVF2SVJVbk9BOTZHL1VwRENLQkNHSHh4ZXk2bzFSN0FRWC9XTW1w?= =?utf-8?B?UUFqYmNONjIzTmppK3p5WkF0TUZTbWcwZmlIVzVVMktMejAvUVIxNDVtRXl5?= =?utf-8?B?NXJzbjNudldMUDY2U3d6TDVvSDRSL2ZiNS9xeWtWMFVrNmUya09Ic2I2MmtG?= =?utf-8?B?c2txWmZQTklEMnBGdWlyZ2Z0MHlKam5nQnpQODN3S0NjZ3BuL1ZzWHJsMXR4?= =?utf-8?B?ekRhaTU4YllUU08wRWZZd21JZDBMTW5xdDNXOXRuMkpEUFVRNnhWTzlHd0Q5?= =?utf-8?B?d3VkSGFrdUNGUExlczB3aDV6L1VHVDg2S1RyRzRDTmdRWnp3NTVjOUx6VnVO?= =?utf-8?B?RlhWeEszcXFPZ1ZudGpuQ3JqZHMvNTJiWUpoMmVtWGpjUmhNam45Q0RaQ1l1?= =?utf-8?B?MERFNWo1eFBCN1FTZ2Z5QWpKSHlTeFR0WTJwaWJ3TTVuMWtKbi9CWXd0a1NE?= =?utf-8?B?dENQMWtpRVN5c3JjYnRYVGMzR3FrNTFaaXBJUUp2ZytTRXo4ZTdIaUF2cXBC?= =?utf-8?B?dDk2aFg2QkZFaTR3aWlib3Y5ZVJoVVRsTktrdnZIbzBCZ3h6SllaeG5jdFlk?= =?utf-8?B?a09jREhXMDQzK2l5YktrNHNGR1ZVdytKRitOdElySXFaWXFUU2RNZWpHOUF0?= =?utf-8?B?OWpFeGpWcVUrN2hCL0oyUHZkRWFlKytuZ0c3U1o2VGNBT0lzd1ZnWmZhV3Bm?= =?utf-8?B?dVZMTVNESzVJZzRybzhySk5FUFBHRGRDb0xONkoyRllEeVk2RlFnbnphT1hF?= =?utf-8?B?L3RBZ09JUURJNnBoUTdPbnJ2QW1tRjBoUnp2b2hNekxHOSsyRnB0cU5TR2lY?= =?utf-8?B?YVZVOUJqcDhrZ1dER0xidnd4VzJZTEpaelVVamNacW93QU9mR01zWk1vYkZo?= =?utf-8?B?VTV6SElLZHl2ODJuWU9mT3diWjdhNnNrQWJQYi9aMDVLNGNvUFBpN2VmRzdY?= =?utf-8?B?TVA1TkY1MDRTSW82cy8vUmxRejlYdTBGaTZaeWV1cTJmVHN5czlVT01yV2ox?= =?utf-8?B?bHdOV2RFcGNpNGNKRmxTRzcvemNEb2FLNkU4dWdPaEtlYWk1eThkWnFMM1N6?= =?utf-8?B?Tk1UTjVhazZBU1lERGZnUmFQeDgyL053L1d3UXdyOUoyMXhhY1FlcWc4RWRI?= =?utf-8?B?UUw3ekxjVzBvNkdJZVZFODBvdnFhVkJDUHhzczBtNDNoYmlLVHpkcDhZWHBC?= =?utf-8?B?TG1NSHFLdjNpcWhFQkQwNC84RUlMTmFnT1ZmVytXZ0tKeEpVUDlPd3FwWVd6?= =?utf-8?B?Q1MrZUdUV1AvZGdZVmFnZ05KWFNidWFvUlhvaG9naDMzcENEZEY0MzNRZk1D?= =?utf-8?B?Z3dlWGpQZStla0x3aUhvcHpnalhPcjRicSswcUdvY0hJaUxxVngxMnVDMXJK?= =?utf-8?B?ZGdQNlUzWVZsb2hDSTdRQ2V1THMrUTViclJDMHJzenRUWXN0amlYVFBnPT0=?= X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;6:iPXu10TwaaX1rqq/0p1f5gcUVU7BcOhMM+nIEOzfAbPYyiYrP2FeA2jIz1qSIDhKuNLIlNEKmKU+C4zU0+A4sgeV+35o8Vx2jRZ49lEHX14lAtJZXQ4sGlENdLRZMDl3D2EjbrrJhy24hr5YoMEk11U9BsrOCsmef0PHCXdDg7r8QD/dIq4Fr3ljjEgV1E147sWgQ4cAd3lijoscE0bc460Jfj7+GgIq6VuCsbo2VSYGN+Wzz8q6T+XPnNRBxI50xGrduoLMcTHPH7FoXUmOyv/B9Iye3SaUYxwaSmMS9PO+FwCMZ1bYrrZWEzX58aNBmMRJqFAKSZuLs3OpK6k/1A==;5:S/FBg7DVCth3rEZ4AmrvFtlUdcq7yNU2HFb8ZI25C2R7jB0A9zP55ab+bvpl1PkyMGpXdKlM/bJk12ZJYCH37Mk+1JrAWjg7YJGGU/fMtEVE80/BKQ0qllg/eQGWjoSmIF75bYIMwLSBI1Bd3mEN/A==;24:6S+9EMTF3UUgF8rUCLMzEc4lrOhM0zF6vtNJ5okKWUdjQKdb8fz6pt3vXLSHNiSFLFo0Oe8w+6coLm5LsQjvNBKPvMYKlt5DNcEeXdLx+F4= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;7:UYWU/zOMk9BM3RtKl/fNgBtvZARKkAt0Jov0i/VQg3pO8zisFRMJ+avRpQUuGwoAAY7pbKnYYrO4hZ9j02yrAY8evQQvdL1eTgwuKLD67nOQhpszphyWYlrRAJyHAdJVIo4f3IZPVFUZ3YLl9GteeF2ZRgMEgVwQ5uLufq2GN29lCtvSRdAJa9kYNFbjJ4jM2/kU3Z5gpFCkUKDx2gxlNMUfEQSz8CbEXUmht9AqF/kbO2+gUtXkqqvnK38A3AoQYaGttC036ETYzwAdKo/U2uoM+UxHa7oSVHLbaLZCfyU3MhuUAuL6vbV9K2zmfU86J2hp0FCzUE7uUi/nWLFEGNujkBaCCxDUlpjHVU0M2xU=;20:p2z2leQiezLE0iXfJF49dv0dp+zZyTD2SNrZmKajAZdvI64AmOHwacaThFqW0c4xaxAkYda9KuLyeze2HoV+lgU6fiVzGsgnPrhf9TtQle5rH7LIwEt9CrHqEYmK7zREX9Fk2tfaq+HR37/pTs1uM53m3TmQ7RxKEY21bF8IBufE/nmaVDRrslwhY0LkU8yy34IPPVhGQHpvo2LEfHxZXIYz6Apr/1ngo+NsGpGfG8xY4lOyzUVBqoy53qebbiKV X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Nov 2016 00:37:34.2631 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1141 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For now, disable the AMD IOMMU if memory encryption is active. A future patch will re-enable the function with full memory encryption support. Signed-off-by: Tom Lendacky --- drivers/iommu/amd_iommu_init.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/iommu/amd_iommu_init.c b/drivers/iommu/amd_iommu_init.c index 59741ea..136a24e 100644 --- a/drivers/iommu/amd_iommu_init.c +++ b/drivers/iommu/amd_iommu_init.c @@ -27,6 +27,7 @@ #include #include #include +#include #include #include #include @@ -2388,6 +2389,10 @@ int __init amd_iommu_detect(void) if (amd_iommu_disabled) return -ENODEV; + /* For now, disable the IOMMU if SME is active */ + if (sme_me_mask) + return -ENODEV; + ret = iommu_go_to_state(IOMMU_IVRS_DETECTED); if (ret) return ret; From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Lendacky Subject: [RFC PATCH v3 14/20] iommu/amd: Disable AMD IOMMU if memory encryption is active Date: Wed, 9 Nov 2016 18:37:32 -0600 Message-ID: <20161110003731.3280.67205.stgit@tlendack-t1.amdoffice.net> References: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20161110003426.3280.2999.stgit-qCXWGYdRb2BnqfbPTmsdiZQ+2ll4COg0XqFh9Ls21Oc@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Errors-To: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org To: linux-arch-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, linux-doc-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, x86-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org, linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, kasan-dev-/JYPxA39Uh5TLH3MbocFFw@public.gmane.org, linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org, iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Cc: Rik van Riel , Thomas Gleixner , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Radim =?utf-8?b?S3LEjW3DocWZ?= , Andrey Ryabinin , Ingo Molnar , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Larry Woodman , Dmitry Vyukov List-Id: linux-efi@vger.kernel.org For now, disable the AMD IOMMU if memory encryption is active. A future patch will re-enable the function with full memory encryption support. Signed-off-by: Tom Lendacky --- drivers/iommu/amd_iommu_init.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/iommu/amd_iommu_init.c b/drivers/iommu/amd_iommu_init.c index 59741ea..136a24e 100644 --- a/drivers/iommu/amd_iommu_init.c +++ b/drivers/iommu/amd_iommu_init.c @@ -27,6 +27,7 @@ #include #include #include +#include #include #include #include @@ -2388,6 +2389,10 @@ int __init amd_iommu_detect(void) if (amd_iommu_disabled) return -ENODEV; + /* For now, disable the IOMMU if SME is active */ + if (sme_me_mask) + return -ENODEV; + ret = iommu_go_to_state(IOMMU_IVRS_DETECTED); if (ret) return ret; From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-cys01nam02on0073.outbound.protection.outlook.com ([104.47.37.73]:25039 "EHLO NAM02-CY1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932295AbcKJAvl (ORCPT ); Wed, 9 Nov 2016 19:51:41 -0500 From: Tom Lendacky Subject: [RFC PATCH v3 14/20] iommu/amd: Disable AMD IOMMU if memory encryption is active Date: Wed, 9 Nov 2016 18:37:32 -0600 Message-ID: <20161110003731.3280.67205.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> References: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-arch-owner@vger.kernel.org List-ID: To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org Cc: Rik van Riel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Paolo Bonzini , Larry Woodman , Ingo Molnar , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Andrey Ryabinin , Alexander Potapenko , Thomas Gleixner , Dmitry Vyukov Message-ID: <20161110003732.c9veQnCYBhUdHIBUGhoWl85plMK9XrujT6k7a5P6DOk@z> For now, disable the AMD IOMMU if memory encryption is active. A future patch will re-enable the function with full memory encryption support. Signed-off-by: Tom Lendacky --- drivers/iommu/amd_iommu_init.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/iommu/amd_iommu_init.c b/drivers/iommu/amd_iommu_init.c index 59741ea..136a24e 100644 --- a/drivers/iommu/amd_iommu_init.c +++ b/drivers/iommu/amd_iommu_init.c @@ -27,6 +27,7 @@ #include #include #include +#include #include #include #include @@ -2388,6 +2389,10 @@ int __init amd_iommu_detect(void) if (amd_iommu_disabled) return -ENODEV; + /* For now, disable the IOMMU if SME is active */ + if (sme_me_mask) + return -ENODEV; + ret = iommu_go_to_state(IOMMU_IVRS_DETECTED); if (ret) return ret; From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Lendacky Subject: [RFC PATCH v3 14/20] iommu/amd: Disable AMD IOMMU if memory encryption is active Date: Wed, 9 Nov 2016 18:37:32 -0600 Message-ID: <20161110003731.3280.67205.stgit@tlendack-t1.amdoffice.net> References: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: Rik van Riel , Thomas Gleixner , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Radim =?utf-8?b?S3LEjW3DocWZ?= , Andrey Ryabinin , Ingo Molnar , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Larry Woodman , Dmitry Vyukov To: , , , , , , , , Return-path: In-Reply-To: <20161110003426.3280.2999.stgit-qCXWGYdRb2BnqfbPTmsdiZQ+2ll4COg0XqFh9Ls21Oc@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Errors-To: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org List-Id: kvm.vger.kernel.org For now, disable the AMD IOMMU if memory encryption is active. A future patch will re-enable the function with full memory encryption support. Signed-off-by: Tom Lendacky --- drivers/iommu/amd_iommu_init.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/iommu/amd_iommu_init.c b/drivers/iommu/amd_iommu_init.c index 59741ea..136a24e 100644 --- a/drivers/iommu/amd_iommu_init.c +++ b/drivers/iommu/amd_iommu_init.c @@ -27,6 +27,7 @@ #include #include #include +#include #include #include #include @@ -2388,6 +2389,10 @@ int __init amd_iommu_detect(void) if (amd_iommu_disabled) return -ENODEV; + /* For now, disable the IOMMU if SME is active */ + if (sme_me_mask) + return -ENODEV; + ret = iommu_go_to_state(IOMMU_IVRS_DETECTED); if (ret) return ret; From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pa0-f69.google.com (mail-pa0-f69.google.com [209.85.220.69]) by kanga.kvack.org (Postfix) with ESMTP id 9F3B36B026F for ; Wed, 9 Nov 2016 19:37:37 -0500 (EST) Received: by mail-pa0-f69.google.com with SMTP id hr10so83948723pac.2 for ; Wed, 09 Nov 2016 16:37:37 -0800 (PST) Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0046.outbound.protection.outlook.com. [104.47.38.46]) by mx.google.com with ESMTPS id s5si1822068pfj.271.2016.11.09.16.37.36 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 09 Nov 2016 16:37:36 -0800 (PST) From: Tom Lendacky Subject: [RFC PATCH v3 14/20] iommu/amd: Disable AMD IOMMU if memory encryption is active Date: Wed, 9 Nov 2016 18:37:32 -0600 Message-ID: <20161110003731.3280.67205.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> References: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org Cc: Rik van Riel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Paolo Bonzini , Larry Woodman , Ingo Molnar , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Andrey Ryabinin , Alexander Potapenko , Thomas Gleixner , Dmitry Vyukov For now, disable the AMD IOMMU if memory encryption is active. A future patch will re-enable the function with full memory encryption support. Signed-off-by: Tom Lendacky --- drivers/iommu/amd_iommu_init.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/iommu/amd_iommu_init.c b/drivers/iommu/amd_iommu_init.c index 59741ea..136a24e 100644 --- a/drivers/iommu/amd_iommu_init.c +++ b/drivers/iommu/amd_iommu_init.c @@ -27,6 +27,7 @@ #include #include #include +#include #include #include #include @@ -2388,6 +2389,10 @@ int __init amd_iommu_detect(void) if (amd_iommu_disabled) return -ENODEV; + /* For now, disable the IOMMU if SME is active */ + if (sme_me_mask) + return -ENODEV; + ret = iommu_go_to_state(IOMMU_IVRS_DETECTED); if (ret) return ret; -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org