All of lore.kernel.org
 help / color / mirror / Atom feed
From: Tom Lendacky <thomas.lendacky@amd.com>
To: Christoph Hellwig <hch@infradead.org>
Cc: linux-kernel@vger.kernel.org, x86@kernel.org,
	linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org,
	iommu@lists.linux-foundation.org, kvm@vger.kernel.org,
	linux-efi@vger.kernel.org, platform-driver-x86@vger.kernel.org,
	linux-graphics-maintainer@vmware.com,
	amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org,
	kexec@lists.infradead.org, linux-fsdevel@vger.kernel.org,
	Borislav Petkov <bp@alien8.de>,
	Brijesh Singh <brijesh.singh@amd.com>,
	Joerg Roedel <joro@8bytes.org>, Andi Kleen <ak@linux.intel.com>,
	Sathyanarayanan Kuppuswamy 
	<sathyanarayanan.kuppuswamy@linux.intel.com>,
	Tianyu Lan <Tianyu.Lan@microsoft.com>,
	Thomas Gleixner <tglx@linutronix.de>,
	Ingo Molnar <mingo@redhat.com>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	Andy Lutomirski <luto@kernel.org>,
	Peter Zijlstra <peterz@infradead.org>,
	Joerg Roedel <jroedel@suse.de>
Subject: Re: [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has()
Date: Thu, 19 Aug 2021 13:33:09 -0500	[thread overview]
Message-ID: <4272eaf5-b654-2669-62ac-ba768acd6b91@amd.com> (raw)
In-Reply-To: <YR4p9TqKTLdN1A96@infradead.org>

On 8/19/21 4:52 AM, Christoph Hellwig wrote:
> On Fri, Aug 13, 2021 at 11:59:22AM -0500, Tom Lendacky wrote:
>> While the name suggests this is intended mainly for guests, it will
>> also be used for host memory encryption checks in place of sme_active().
> 
> Which suggest that the name is not good to start with.  Maybe protected
> hardware, system or platform might be a better choice?
> 
>> +static inline bool prot_guest_has(unsigned int attr)
>> +{
>> +#ifdef CONFIG_AMD_MEM_ENCRYPT
>> +	if (sme_me_mask)
>> +		return amd_prot_guest_has(attr);
>> +#endif
>> +
>> +	return false;
>> +}
> 
> Shouldn't this be entirely out of line?

I did it as inline originally because the presence of the function will be
decided based on the ARCH_HAS_PROTECTED_GUEST config. For now, that is
only selected by the AMD memory encryption support, so if I went out of
line I could put in mem_encrypt.c. But with TDX wanting to also use it, it
would have to be in an always built file with some #ifdefs or in its own
file that is conditionally built based on the ARCH_HAS_PROTECTED_GUEST
setting (they've already tried building with ARCH_HAS_PROTECTED_GUEST=y
and AMD_MEM_ENCRYPT not set).

To take it out of line, I'm leaning towards the latter, creating a new
file that is built based on the ARCH_HAS_PROTECTED_GUEST setting.

> 
>> +/* 0x800 - 0x8ff reserved for AMD */
>> +#define PATTR_SME			0x800
>> +#define PATTR_SEV			0x801
>> +#define PATTR_SEV_ES			0x802
> 
> Why do we need reservations for a purely in-kernel namespace?
> 
> And why are you overoading a brand new generic API with weird details
> of a specific implementation like this?

There was some talk about this on the mailing list where TDX and SEV may
need to be differentiated, so we wanted to reserve a range of values per
technology. I guess I can remove them until they are actually needed.

Thanks,
Tom

> 

WARNING: multiple messages have this Message-ID (diff)
From: Tom Lendacky via iommu <iommu@lists.linux-foundation.org>
To: Christoph Hellwig <hch@infradead.org>
Cc: linux-efi@vger.kernel.org, Brijesh Singh <brijesh.singh@amd.com>,
	kvm@vger.kernel.org, Peter Zijlstra <peterz@infradead.org>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	dri-devel@lists.freedesktop.org,
	platform-driver-x86@vger.kernel.org, linux-s390@vger.kernel.org,
	Andi Kleen <ak@linux.intel.com>,
	x86@kernel.org, amd-gfx@lists.freedesktop.org,
	Ingo Molnar <mingo@redhat.com>,
	linux-graphics-maintainer@vmware.com,
	Joerg Roedel <jroedel@suse.de>,
	Tianyu Lan <Tianyu.Lan@microsoft.com>,
	Borislav Petkov <bp@alien8.de>, Andy Lutomirski <luto@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	kexec@lists.infradead.org, linux-kernel@vger.kernel.org,
	iommu@lists.linux-foundation.org, linux-fsdevel@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org
Subject: Re: [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has()
Date: Thu, 19 Aug 2021 13:33:09 -0500	[thread overview]
Message-ID: <4272eaf5-b654-2669-62ac-ba768acd6b91@amd.com> (raw)
In-Reply-To: <YR4p9TqKTLdN1A96@infradead.org>

On 8/19/21 4:52 AM, Christoph Hellwig wrote:
> On Fri, Aug 13, 2021 at 11:59:22AM -0500, Tom Lendacky wrote:
>> While the name suggests this is intended mainly for guests, it will
>> also be used for host memory encryption checks in place of sme_active().
> 
> Which suggest that the name is not good to start with.  Maybe protected
> hardware, system or platform might be a better choice?
> 
>> +static inline bool prot_guest_has(unsigned int attr)
>> +{
>> +#ifdef CONFIG_AMD_MEM_ENCRYPT
>> +	if (sme_me_mask)
>> +		return amd_prot_guest_has(attr);
>> +#endif
>> +
>> +	return false;
>> +}
> 
> Shouldn't this be entirely out of line?

I did it as inline originally because the presence of the function will be
decided based on the ARCH_HAS_PROTECTED_GUEST config. For now, that is
only selected by the AMD memory encryption support, so if I went out of
line I could put in mem_encrypt.c. But with TDX wanting to also use it, it
would have to be in an always built file with some #ifdefs or in its own
file that is conditionally built based on the ARCH_HAS_PROTECTED_GUEST
setting (they've already tried building with ARCH_HAS_PROTECTED_GUEST=y
and AMD_MEM_ENCRYPT not set).

To take it out of line, I'm leaning towards the latter, creating a new
file that is built based on the ARCH_HAS_PROTECTED_GUEST setting.

> 
>> +/* 0x800 - 0x8ff reserved for AMD */
>> +#define PATTR_SME			0x800
>> +#define PATTR_SEV			0x801
>> +#define PATTR_SEV_ES			0x802
> 
> Why do we need reservations for a purely in-kernel namespace?
> 
> And why are you overoading a brand new generic API with weird details
> of a specific implementation like this?

There was some talk about this on the mailing list where TDX and SEV may
need to be differentiated, so we wanted to reserve a range of values per
technology. I guess I can remove them until they are actually needed.

Thanks,
Tom

> 
_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

WARNING: multiple messages have this Message-ID (diff)
From: Tom Lendacky <thomas.lendacky@amd.com>
To: Christoph Hellwig <hch@infradead.org>
Cc: Sathyanarayanan Kuppuswamy
	<sathyanarayanan.kuppuswamy@linux.intel.com>,
	linux-efi@vger.kernel.org, Brijesh Singh <brijesh.singh@amd.com>,
	kvm@vger.kernel.org, Peter Zijlstra <peterz@infradead.org>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	dri-devel@lists.freedesktop.org,
	platform-driver-x86@vger.kernel.org, linux-s390@vger.kernel.org,
	Andi Kleen <ak@linux.intel.com>, Joerg Roedel <joro@8bytes.org>,
	x86@kernel.org, amd-gfx@lists.freedesktop.org,
	Ingo Molnar <mingo@redhat.com>,
	linux-graphics-maintainer@vmware.com,
	Joerg Roedel <jroedel@suse.de>,
	Tianyu Lan <Tianyu.Lan@microsoft.com>,
	Borislav Petkov <bp@alien8.de>, Andy Lutomirski <luto@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	kexec@lists.infradead.org, linux-kernel@vger.kernel.org,
	iommu@lists.linux-foundation.org, linux-fsdevel@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org
Subject: Re: [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has()
Date: Thu, 19 Aug 2021 13:33:09 -0500	[thread overview]
Message-ID: <4272eaf5-b654-2669-62ac-ba768acd6b91@amd.com> (raw)
In-Reply-To: <YR4p9TqKTLdN1A96@infradead.org>

On 8/19/21 4:52 AM, Christoph Hellwig wrote:
> On Fri, Aug 13, 2021 at 11:59:22AM -0500, Tom Lendacky wrote:
>> While the name suggests this is intended mainly for guests, it will
>> also be used for host memory encryption checks in place of sme_active().
> 
> Which suggest that the name is not good to start with.  Maybe protected
> hardware, system or platform might be a better choice?
> 
>> +static inline bool prot_guest_has(unsigned int attr)
>> +{
>> +#ifdef CONFIG_AMD_MEM_ENCRYPT
>> +	if (sme_me_mask)
>> +		return amd_prot_guest_has(attr);
>> +#endif
>> +
>> +	return false;
>> +}
> 
> Shouldn't this be entirely out of line?

I did it as inline originally because the presence of the function will be
decided based on the ARCH_HAS_PROTECTED_GUEST config. For now, that is
only selected by the AMD memory encryption support, so if I went out of
line I could put in mem_encrypt.c. But with TDX wanting to also use it, it
would have to be in an always built file with some #ifdefs or in its own
file that is conditionally built based on the ARCH_HAS_PROTECTED_GUEST
setting (they've already tried building with ARCH_HAS_PROTECTED_GUEST=y
and AMD_MEM_ENCRYPT not set).

To take it out of line, I'm leaning towards the latter, creating a new
file that is built based on the ARCH_HAS_PROTECTED_GUEST setting.

> 
>> +/* 0x800 - 0x8ff reserved for AMD */
>> +#define PATTR_SME			0x800
>> +#define PATTR_SEV			0x801
>> +#define PATTR_SEV_ES			0x802
> 
> Why do we need reservations for a purely in-kernel namespace?
> 
> And why are you overoading a brand new generic API with weird details
> of a specific implementation like this?

There was some talk about this on the mailing list where TDX and SEV may
need to be differentiated, so we wanted to reserve a range of values per
technology. I guess I can remove them until they are actually needed.

Thanks,
Tom

> 

WARNING: multiple messages have this Message-ID (diff)
From: Tom Lendacky <thomas.lendacky@amd.com>
To: Christoph Hellwig <hch@infradead.org>
Cc: linux-kernel@vger.kernel.org, x86@kernel.org,
	linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org,
	iommu@lists.linux-foundation.org, kvm@vger.kernel.org,
	linux-efi@vger.kernel.org, platform-driver-x86@vger.kernel.org,
	linux-graphics-maintainer@vmware.com,
	amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org,
	kexec@lists.infradead.org, linux-fsdevel@vger.kernel.org,
	Borislav Petkov <bp@alien8.de>,
	Brijesh Singh <brijesh.singh@amd.com>,
	Joerg Roedel <joro@8bytes.org>, Andi Kleen <ak@linux.intel.com>,
	Sathyanarayanan Kuppuswamy
	<sathyanarayanan.kuppuswamy@linux.intel.com>,
	Tianyu Lan <Tianyu.Lan@microsoft.com>,
	Thomas Gleixner <tglx@linutronix.de>,
	Ingo Molnar <mingo@redhat.com>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	Andy Lutomirski <luto@kernel.org>,
	Peter Zijlstra <peterz@infradead.org>,
	Joerg Roedel <jroedel@suse.de>
Subject: Re: [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has()
Date: Thu, 19 Aug 2021 13:33:09 -0500	[thread overview]
Message-ID: <4272eaf5-b654-2669-62ac-ba768acd6b91@amd.com> (raw)
In-Reply-To: <YR4p9TqKTLdN1A96@infradead.org>

On 8/19/21 4:52 AM, Christoph Hellwig wrote:
> On Fri, Aug 13, 2021 at 11:59:22AM -0500, Tom Lendacky wrote:
>> While the name suggests this is intended mainly for guests, it will
>> also be used for host memory encryption checks in place of sme_active().
> 
> Which suggest that the name is not good to start with.  Maybe protected
> hardware, system or platform might be a better choice?
> 
>> +static inline bool prot_guest_has(unsigned int attr)
>> +{
>> +#ifdef CONFIG_AMD_MEM_ENCRYPT
>> +	if (sme_me_mask)
>> +		return amd_prot_guest_has(attr);
>> +#endif
>> +
>> +	return false;
>> +}
> 
> Shouldn't this be entirely out of line?

I did it as inline originally because the presence of the function will be
decided based on the ARCH_HAS_PROTECTED_GUEST config. For now, that is
only selected by the AMD memory encryption support, so if I went out of
line I could put in mem_encrypt.c. But with TDX wanting to also use it, it
would have to be in an always built file with some #ifdefs or in its own
file that is conditionally built based on the ARCH_HAS_PROTECTED_GUEST
setting (they've already tried building with ARCH_HAS_PROTECTED_GUEST=y
and AMD_MEM_ENCRYPT not set).

To take it out of line, I'm leaning towards the latter, creating a new
file that is built based on the ARCH_HAS_PROTECTED_GUEST setting.

> 
>> +/* 0x800 - 0x8ff reserved for AMD */
>> +#define PATTR_SME			0x800
>> +#define PATTR_SEV			0x801
>> +#define PATTR_SEV_ES			0x802
> 
> Why do we need reservations for a purely in-kernel namespace?
> 
> And why are you overoading a brand new generic API with weird details
> of a specific implementation like this?

There was some talk about this on the mailing list where TDX and SEV may
need to be differentiated, so we wanted to reserve a range of values per
technology. I guess I can remove them until they are actually needed.

Thanks,
Tom

> 

_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec

  parent reply	other threads:[~2021-08-19 18:33 UTC|newest]

Thread overview: 225+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-08-13 16:59 [PATCH v2 00/12] Implement generic prot_guest_has() helper function Tom Lendacky
2021-08-13 16:59 ` Tom Lendacky
2021-08-13 16:59 ` Tom Lendacky
2021-08-13 16:59 ` Tom Lendacky via iommu
2021-08-13 16:59 ` Tom Lendacky
2021-08-13 16:59 ` [PATCH v2 01/12] x86/ioremap: Selectively build arch override encryption functions Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-14 15:25   ` Borislav Petkov
2021-08-14 15:25     ` Borislav Petkov
2021-08-14 15:25     ` Borislav Petkov
2021-08-14 15:25     ` Borislav Petkov
2021-08-14 15:25     ` Borislav Petkov
2021-08-13 16:59 ` [PATCH v2 02/12] mm: Introduce a function to check for virtualization protection features Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 17:19   ` Kuppuswamy, Sathyanarayanan
2021-08-13 17:19     ` Kuppuswamy, Sathyanarayanan
2021-08-13 17:19     ` Kuppuswamy, Sathyanarayanan
2021-08-13 17:19     ` Kuppuswamy, Sathyanarayanan
2021-08-13 17:19     ` Kuppuswamy, Sathyanarayanan
2021-08-14 18:32   ` Borislav Petkov
2021-08-14 18:32     ` Borislav Petkov
2021-08-14 18:32     ` Borislav Petkov
2021-08-14 18:32     ` Borislav Petkov
2021-08-14 18:32     ` Borislav Petkov
2021-08-14 18:49     ` Tom Lendacky
2021-08-14 18:49       ` Tom Lendacky
2021-08-14 18:49       ` Tom Lendacky
2021-08-14 18:49       ` Tom Lendacky
2021-08-14 18:49       ` Tom Lendacky via iommu
2021-08-19  9:46   ` Christoph Hellwig
2021-08-19  9:46     ` Christoph Hellwig
2021-08-19  9:46     ` Christoph Hellwig
2021-08-19  9:46     ` Christoph Hellwig
2021-08-19  9:46     ` Christoph Hellwig
2021-08-19 16:39     ` Tom Lendacky
2021-08-19 16:39       ` Tom Lendacky
2021-08-19 16:39       ` Tom Lendacky
2021-08-19 16:39       ` Tom Lendacky via iommu
2021-08-19 16:39       ` Tom Lendacky
2021-08-13 16:59 ` [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has() Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-14 19:08   ` Borislav Petkov
2021-08-14 19:08     ` Borislav Petkov
2021-08-14 19:08     ` Borislav Petkov
2021-08-14 19:08     ` Borislav Petkov
2021-08-14 19:08     ` Borislav Petkov
2021-08-15 13:53     ` Tom Lendacky
2021-08-15 13:53       ` Tom Lendacky
2021-08-15 13:53       ` Tom Lendacky
2021-08-15 13:53       ` Tom Lendacky
2021-08-15 13:53       ` Tom Lendacky via iommu
2021-08-15 14:39       ` Borislav Petkov
2021-08-15 14:39         ` Borislav Petkov
2021-08-15 14:39         ` Borislav Petkov
2021-08-15 14:39         ` Borislav Petkov
2021-08-15 14:39         ` Borislav Petkov
2021-08-17 15:22         ` Tom Lendacky
2021-08-17 15:22           ` Tom Lendacky
2021-08-17 15:22           ` Tom Lendacky
2021-08-17 15:22           ` Tom Lendacky
2021-08-17 15:22           ` Tom Lendacky via iommu
2021-08-17 18:39           ` Borislav Petkov
2021-08-17 18:39             ` Borislav Petkov
2021-08-17 18:39             ` Borislav Petkov
2021-08-17 18:39             ` Borislav Petkov
2021-08-17 18:39             ` Borislav Petkov
2021-08-19  9:52   ` Christoph Hellwig
2021-08-19  9:52     ` Christoph Hellwig
2021-08-19  9:52     ` Christoph Hellwig
2021-08-19  9:52     ` Christoph Hellwig
2021-08-19  9:52     ` Christoph Hellwig
2021-08-19 17:26     ` Borislav Petkov
2021-08-19 17:26       ` Borislav Petkov
2021-08-19 17:26       ` Borislav Petkov
2021-08-19 17:26       ` Borislav Petkov
2021-08-19 17:26       ` Borislav Petkov
2021-08-19 18:33     ` Tom Lendacky [this message]
2021-08-19 18:33       ` Tom Lendacky
2021-08-19 18:33       ` Tom Lendacky
2021-08-19 18:33       ` Tom Lendacky
2021-08-19 18:33       ` Tom Lendacky via iommu
2021-08-19 19:57       ` Kuppuswamy, Sathyanarayanan
2021-08-19 19:57         ` Kuppuswamy, Sathyanarayanan
2021-08-19 19:57         ` Kuppuswamy, Sathyanarayanan
2021-08-19 19:57         ` Kuppuswamy, Sathyanarayanan
2021-08-19 19:57         ` Kuppuswamy, Sathyanarayanan
2021-08-24  7:14       ` Christoph Hellwig
2021-08-24  7:14         ` Christoph Hellwig
2021-08-24  7:14         ` Christoph Hellwig
2021-08-24  7:14         ` Christoph Hellwig
2021-08-24  7:14         ` Christoph Hellwig
2021-08-13 16:59 ` [PATCH v2 04/12] powerpc/pseries/svm: Add a powerpc " Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-17  8:35   ` Borislav Petkov
2021-08-17  8:35     ` Borislav Petkov
2021-08-17  8:35     ` Borislav Petkov
2021-08-17  8:35     ` Borislav Petkov
2021-08-17  8:35     ` Borislav Petkov
2021-08-17 14:11     ` Tom Lendacky
2021-08-17 14:11       ` Tom Lendacky
2021-08-17 14:11       ` Tom Lendacky
2021-08-17 14:11       ` Tom Lendacky
2021-08-17 14:11       ` Tom Lendacky via iommu
2021-08-17 12:38   ` Michael Ellerman
2021-08-17 12:38     ` Michael Ellerman
2021-08-17 12:38     ` Michael Ellerman
2021-08-17 12:38     ` Michael Ellerman
2021-08-17 12:38     ` Michael Ellerman
2021-08-19  9:55   ` Christoph Hellwig
2021-08-19  9:55     ` Christoph Hellwig
2021-08-19  9:55     ` Christoph Hellwig
2021-08-19  9:55     ` Christoph Hellwig
2021-08-19  9:55     ` Christoph Hellwig
2021-08-19 18:34     ` Tom Lendacky
2021-08-19 18:34       ` Tom Lendacky
2021-08-19 18:34       ` Tom Lendacky
2021-08-19 18:34       ` Tom Lendacky
2021-08-19 18:34       ` Tom Lendacky via iommu
2021-08-13 16:59 ` [PATCH v2 05/12] x86/sme: Replace occurrences of sme_active() with prot_guest_has() Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-17  9:00   ` Borislav Petkov
2021-08-17  9:00     ` Borislav Petkov
2021-08-17  9:00     ` Borislav Petkov
2021-08-17  9:00     ` Borislav Petkov
2021-08-17  9:00     ` Borislav Petkov
2021-08-17 14:46     ` Tom Lendacky
2021-08-17 14:46       ` Tom Lendacky
2021-08-17 14:46       ` Tom Lendacky via iommu
2021-08-17 14:46       ` Tom Lendacky
2021-08-17 14:46       ` Tom Lendacky
2021-08-17 18:41       ` Borislav Petkov
2021-08-17 18:41         ` Borislav Petkov
2021-08-17 18:41         ` Borislav Petkov
2021-08-17 18:41         ` Borislav Petkov
2021-08-17 18:41         ` Borislav Petkov
2021-08-13 16:59 ` [PATCH v2 06/12] x86/sev: Replace occurrences of sev_active() " Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-17 10:02   ` Borislav Petkov
2021-08-17 10:02     ` Borislav Petkov
2021-08-17 10:02     ` Borislav Petkov
2021-08-17 10:02     ` Borislav Petkov
2021-08-17 10:02     ` Borislav Petkov
2021-08-17 15:26     ` Tom Lendacky
2021-08-17 15:26       ` Tom Lendacky
2021-08-17 15:26       ` Tom Lendacky
2021-08-17 15:26       ` Tom Lendacky
2021-08-17 15:26       ` Tom Lendacky via iommu
2021-08-17 18:43       ` Borislav Petkov
2021-08-17 18:43         ` Borislav Petkov
2021-08-17 18:43         ` Borislav Petkov
2021-08-17 18:43         ` Borislav Petkov
2021-08-17 18:43         ` Borislav Petkov
2021-08-13 16:59 ` [PATCH v2 07/12] x86/sev: Replace occurrences of sev_es_active() " Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-17 10:06   ` Borislav Petkov
2021-08-17 10:06     ` Borislav Petkov
2021-08-17 10:06     ` Borislav Petkov
2021-08-17 10:06     ` Borislav Petkov
2021-08-17 10:06     ` Borislav Petkov
2021-08-13 16:59 ` [PATCH v2 08/12] treewide: Replace the use of mem_encrypt_active() " Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59 ` [PATCH v2 09/12] mm: Remove the now unused mem_encrypt_active() function Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-17 10:22   ` Borislav Petkov
2021-08-17 10:22     ` Borislav Petkov
2021-08-17 10:22     ` Borislav Petkov
2021-08-17 10:22     ` Borislav Petkov
2021-08-17 10:22     ` Borislav Petkov
2021-08-17 10:24     ` Borislav Petkov
2021-08-17 10:24       ` Borislav Petkov
2021-08-17 10:24       ` Borislav Petkov
2021-08-17 10:24       ` Borislav Petkov
2021-08-17 10:24       ` Borislav Petkov
2021-08-17 15:30       ` Tom Lendacky
2021-08-17 15:30         ` Tom Lendacky
2021-08-17 15:30         ` Tom Lendacky
2021-08-17 15:30         ` Tom Lendacky
2021-08-17 15:30         ` Tom Lendacky via iommu
2021-08-13 16:59 ` [PATCH v2 10/12] x86/sev: " Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59 ` [PATCH v2 11/12] powerpc/pseries/svm: " Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59 ` [PATCH v2 12/12] s390/mm: " Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 16:59   ` Tom Lendacky via iommu
2021-08-13 16:59   ` Tom Lendacky
2021-08-13 17:22 ` [PATCH v2 00/12] Implement generic prot_guest_has() helper function Tom Lendacky
2021-08-13 17:22   ` Tom Lendacky
2021-08-13 17:22   ` Tom Lendacky
2021-08-13 17:22   ` Tom Lendacky via iommu
2021-08-13 17:22   ` Tom Lendacky

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4272eaf5-b654-2669-62ac-ba768acd6b91@amd.com \
    --to=thomas.lendacky@amd.com \
    --cc=Tianyu.Lan@microsoft.com \
    --cc=ak@linux.intel.com \
    --cc=amd-gfx@lists.freedesktop.org \
    --cc=bp@alien8.de \
    --cc=brijesh.singh@amd.com \
    --cc=dave.hansen@linux.intel.com \
    --cc=dri-devel@lists.freedesktop.org \
    --cc=hch@infradead.org \
    --cc=iommu@lists.linux-foundation.org \
    --cc=joro@8bytes.org \
    --cc=jroedel@suse.de \
    --cc=kexec@lists.infradead.org \
    --cc=kvm@vger.kernel.org \
    --cc=linux-efi@vger.kernel.org \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=linux-graphics-maintainer@vmware.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-s390@vger.kernel.org \
    --cc=linuxppc-dev@lists.ozlabs.org \
    --cc=luto@kernel.org \
    --cc=mingo@redhat.com \
    --cc=peterz@infradead.org \
    --cc=platform-driver-x86@vger.kernel.org \
    --cc=sathyanarayanan.kuppuswamy@linux.intel.com \
    --cc=tglx@linutronix.de \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.