From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757449AbcIGOEG (ORCPT ); Wed, 7 Sep 2016 10:04:06 -0400 Received: from mail-by2nam01on0048.outbound.protection.outlook.com ([104.47.34.48]:48544 "EHLO NAM01-BY2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1756625AbcIGOEC (ORCPT ); Wed, 7 Sep 2016 10:04:02 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Thomas.Lendacky@amd.com; Subject: Re: [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement To: Borislav Petkov References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> <20160822223559.29880.1502.stgit@tlendack-t1.amdoffice.net> <20160902110351.GA22559@nazgul.tnic> CC: , , , , , , , , , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Thomas Gleixner , Dmitry Vyukov From: Tom Lendacky Message-ID: <5a8e2455-ef08-9e3f-2847-082fd3e01e67@amd.com> Date: Wed, 7 Sep 2016 09:03:46 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: <20160902110351.GA22559@nazgul.tnic> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: YTXPR01CA0019.CANPRD01.PROD.OUTLOOK.COM (10.165.183.157) To DM5PR12MB1147.namprd12.prod.outlook.com (10.168.236.142) X-MS-Office365-Filtering-Correlation-Id: 01926cee-1eec-4d90-f2a2-08d3d727ccef X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1147;2:1ah1JN0H1ma+olfYjTQ1khKq/Stx4OMvfyGe7Df+v6Kg3XsrKSS04xkA8Y49vl7sHBs6Tj/W5xRNX44gK/2mATmsXJ3DRhuQ4mDFChMm6zUWi2k8Gysk57q+QJPP4jysLsB7fRlRY1NSjXfCkfl4MeT2MRIPj/W5n3+4swEZqY5ghxOeQpfNlOwdmJL/EzNn;3:Za+Rqi4FBYBW9C9URYmyZfLCttwA3kkUVJz86GR6pIQtbJs0kSqUdRil1VPjG+U7LmrrFfj9dN4AHKY1awr0tpOd757Pg+KkHNlfhDz+pK51fhvx0JRSLpZS/YKUiohK X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:DM5PR12MB1147; X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1147;25: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 X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1147;31:uRG3gNmYTizPfNX47z7js8NbS5sYBik1X+7ifbZDRoS8zGS/dpGj9HiHswE+7Db7V8WwKyJUVxB625i2xxlp4q8I/QMsMcJzakTWALRkRwOB070dK57qSDAYalg4oNMKt+mvIUrltlMNpurpNZvhCaOzdN1wa8gHiB4n0j2QyYK4DccXV8nvm5SrVEWZv/ifzSeC9A03nztyk49XAMYAzyJVNT7NGKZl7tHsYK2HDcY=;20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040176)(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026);SRVR:DM5PR12MB1147;BCL:0;PCL:0;RULEID:;SRVR:DM5PR12MB1147; X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1147;4:LVopTP0GqX0UHQWD7rA2QhNLlxgvQlhZmQW9+7WvuHVrBB4Me0AQXAgsQVzHv6MCx2TbpKNCtxLb1ngF2ebWJ8lQL0czaiq5IgZ0XBuKNcLdAfj6CMLKfX2EK1OnBJUPJi8oZAqO6VBhnDbvqzdTjmc+3JAUpDUuOR30TOiY+OOK6abXuwpfCd6n1FqrxTemQ1XUWClSwfG2Bku5TdWAdLR40V84SCaUsYlf90Hkfsek75KCy0nI/cIx2SWMqwh87JSnawbhTLyZOirVZK6PJSO++CPycGXAu1TyidZbDFJmI82WqSSGOrO67SbSU1ivh1qSxRvaFlcroSl96hyvylQfwPqWTGviV52+YDHtLR0sj9F91cExuXvPlEiX3ZaFOTz2KQ/KF5jFc4lniwv1ZLmEAjzDwHkkX6p4VOnNT2nNKZ+yCpTJiDfbe7sCOS8H X-Forefront-PRVS: 0058ABBBC7 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6049001)(6009001)(7916002)(377454003)(199003)(189002)(24454002)(86362001)(47776003)(66066001)(65956001)(42186005)(92566002)(83506001)(101416001)(64126003)(31696002)(76176999)(50986999)(5660300001)(81156014)(7736002)(65806001)(50466002)(8676002)(54356999)(7416002)(106356001)(19580405001)(36756003)(33646002)(586003)(31686004)(77096005)(230700001)(6116002)(68736007)(4001350100001)(4326007)(23676002)(65826007)(2950100001)(3846002)(7846002)(305945005)(97736004)(110136002)(189998001)(19580395003)(2906002)(81166006)(105586002)(217873001);DIR:OUT;SFP:1101;SCL:1;SRVR:DM5PR12MB1147;H:[10.236.18.82];FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTVQUjEyTUIxMTQ3OzIzOnZvRUszTzFIdjhNMHpBQ0J6d3pRWjlpeFJl?= =?utf-8?B?YWFPLzBPcTJuWlNxcXdqQjRFQ1hWL0Rib0U5OXQ3QXhmZ2E2ZElacHFPN2Q0?= =?utf-8?B?YzBienJCdFNTZWtNYWdZbW54YnpKQjZxSlZHejlkdHlNV2VqWkx6TytPdE9q?= =?utf-8?B?enp4aWN6UUdic0lvWG9zQTBpbEdOSDU5Rk1YYjN4a3oxMWpCdCtGY0N5SXpC?= =?utf-8?B?RWRhRFZSRk9YTlJsU1laOU00czhxa2EyV3ExYWtjQkV0OVVPaTVRaThzZitZ?= =?utf-8?B?Nk13Rm1udW1GYjVscXFENWw0TElsdDA2TE1PMFBFQ29WeE52K1cwT2JobmhK?= =?utf-8?B?eVpJMGpXbUtBLzRvT1luNFVRekF6cXZvTFJnMXB2Z1RIRENZK3FJQWZDUHpT?= =?utf-8?B?M3dEd1FlU0hSTGFZSVNtV2ZzU3pIQW9IRVhsS04vS0RRSjBXcVdJdEhDbjkv?= =?utf-8?B?dXNjWWo1NGR1dm9HTXJHMWY4TmdZK3VyczlTNGp0U3lpR1YxcFg5bU42cERY?= =?utf-8?B?UGY2MWgrT2VUc3BzUzYwQUxSM29SOE9YMGxzWUFOSEJzbTQzbW9ST0UvYkNs?= =?utf-8?B?RTgzUmZXQ1pSUjJvOHNyTklSd0ZyVXJOMDZSNGNIMW41MUdoTVM4bk9KMTBu?= =?utf-8?B?NlZycmZ3cnVlQkhmdDJKbkI0R2k4eUdrWE4ydkZvN2tWOUFMYjUyMDVITlVX?= =?utf-8?B?MTkwUVVVelUrUWh5QVVpSUVlU21XS0k5dnUydXl0OG9ML01YNk52ekN6Nlhk?= =?utf-8?B?T2h2RnNqQXh5SU9wQzdZNjVtcDU1TFpSbU9pNHQ5MEJkR0tJL21IaWlPN3dt?= =?utf-8?B?QTAxT0J1d2c1MzZDa3MvSS9XQWl4dWl5eENUbzlFM09CVklpenAxZmQ2T3Fw?= =?utf-8?B?bkliTVdzY2d5bms2MjJKMVlqbUh5dDBtMDI2c1o1K1BzUTJXUmFVWUpBS2Rj?= =?utf-8?B?VmNUSXNjME5zWmhBWWdoZkFaY0U1bHhsY3FSNlVuRlhPUkpTT0dNVE05Y2kw?= =?utf-8?B?UzBmemo5WGpOc0Q0NnR0NDNUMyt5RlQ1N2RHYTNiR1l0UkdoVHByV1pnQzE0?= =?utf-8?B?aFpuYmhWY1F3Z3JReG5YZ0NJdXZFYWtWZFBuZzg2MlUrNCtFZi9CNk1JQWhs?= =?utf-8?B?UzhTWVE5YXlucGVyemhsd0Z1VStaV3ZRMVhlRkNXUzVUTnhUUGxzVng3cHpM?= =?utf-8?B?UmpoMGhza3BPaEE4YVBHZjBWQmE1bFloSGN5V3ZVeUJCNHp3YlJHUzlqMmgy?= =?utf-8?B?QkVPbGZsQ3FkT1Z0YklSNVBvaXliZGhoaEVLUmhGdElzSVlDNkZJMEtLbjlP?= =?utf-8?B?bUlINmUzcDVodENpMTdvMk43Qjk2bDVneXpwK2xpOTNKZnMrMG82a29TR3Y2?= =?utf-8?B?ZENBdWxmaWhZU2c3T1Z5Q09YR0pWQUNUSW9HdUxHa2N3aEk1d3IzY0pQdFJo?= =?utf-8?B?ei9rcTVOT1VWREwxR29MbEFzN2habFdYb0NGRzZLMlNac0VCd3RRTHpQbks3?= =?utf-8?B?T0VKNUVpSVQvZnpYR0p2QWN3WWdpNnJBUVl3a3lGVFZBaUFDdURiOHBwR2dS?= =?utf-8?B?S3d0cGxNUEI0cnZhbXJtaWtKV1NXekkwQ1NlY1dCTTBLV0dqODdQSVIzcTFD?= =?utf-8?B?V1JlMmZjcmVoVm15VHJBbjNlckt0TXNyREpuNXd4Z2VKWUpLMjNzcEwxWmRQ?= =?utf-8?B?T3pzc1FocVM1ekVtckx3VjRiWXQ4Qi85QTA0dnA1d2ZZMjlRUk9vaEswMW4x?= =?utf-8?B?UFBiYmlLbWk1eU5iMjhTRDN3QjRwL2R6TVV1OTdtcGlkS01XMkdkOUlIQ2Qy?= =?utf-8?Q?JLU+9imLecCtc?= X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1147;6:O5mytUFbPJE1dmnHxSqa+hBXN5UWY4vTMIs7ZuqOlPS15ICW8LHiUE2x5HCXtfv8R/vM0unYi0X4VeQ6CHzYAu3QYv1gNCtbzt90hFiEbhNLmuezYMTI2/RycZc4AItsqOTtX/g/xrPGMKP5G0jMoxdUzHbZ512w+dUwx/qEbGZaCmcWjLkVBa946QOFqJaKx0WM7M9TC7lKSu4P/VTLcbbq9kKx0uuOZVkgBHDjFos15fuod3XHQkuMPcaW72NFdL3vG8n8Ewur6ST5dM7Lj3ymCHoFVHl+d+FAI+PqoNHdr6Lrxma5Gt4EjUZeZbs9TLkTKIPZ84uPP0KOn+RPqg==;5:LPyQW2PIPIAMWOgboMeJQjNe7Dz8mvh5zuSWU3KbsJrc42Uvb0i9vCgXkRJYCBJRRRhZpU12dW0C6IgFecrNAWGj32j5HC8+e6CiB7HVfQfRfICRJubvOe7vrttKDXyc8a95uZMpr3gCh1Yjg+FAtw==;24:J0mXpBZDb8JTHPo/h0uiAUanqmsG5UYcU5qrXW29DC64kF3oDVz/UEM3xqN4imF9GLbld/Y2zmO7VUnJ2JPCPQ7jwrMtPKsAwxc3dDXZW/8=;7:N6mNOEwp0tpwZtoUCAhdYjtVspLBTAnhz9sYZD4TYBDjkMNGYm+SLicNhVdSjHKHnYFNktLw0G9+3uCV06Ih8BZTAlAlqz5pU9L4JlXqJcI8bHKUqX653L0kdTQ69Rz8JbPt1fxEJuIGDktnPyKgRAuxQbpNlLlU0j0XRjbvbMbLgKoME8GGd8U6vLpaR9fJrZ9nUwQa5On15doYcJQ92AMOdgzPtoFtje/RXXp7ACs2V5E33hb5tpsZHuZomQNC SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1147;20:16j1pYEsr25hrdjS5CyIycA0itBGDbBKE3kZhpfudIY2DYlsibgmB0euyofyWf1XzuYAQMUsewNwKALBEcCTfCsBNvcz7jt7FhqhnISpjBn+77eNpCo16RUoFtFbWOfKikr9NM71StDZj327oKruwVHgTaoOYKrNZx7KOYUkqiGpvwOuHENRCjwkJ/sx0p21vPFVY+sR2wDQeKTZYrUhPJkeNc6gPPOH4AlEUqtqua0txOqCK1PN/VlpUkMea7MO X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Sep 2016 14:03:51.0097 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB1147 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/02/2016 06:03 AM, Borislav Petkov wrote: > On Mon, Aug 22, 2016 at 05:35:59PM -0500, Tom Lendacky wrote: >> Provide the Kconfig support to build the SME support in the kernel. >> >> Signed-off-by: Tom Lendacky >> --- >> arch/x86/Kconfig | 9 +++++++++ >> 1 file changed, 9 insertions(+) >> >> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig >> index c580d8c..131f329 100644 >> --- a/arch/x86/Kconfig >> +++ b/arch/x86/Kconfig >> @@ -1357,6 +1357,15 @@ config X86_DIRECT_GBPAGES >> supports them), so don't confuse the user by printing >> that we have them enabled. >> >> +config AMD_MEM_ENCRYPT >> + bool "Secure Memory Encryption support for AMD" > > "AMD Secure Memory Encryption support" Ok. Thanks, Tom > >> + depends on X86_64 && CPU_SUP_AMD >> + ---help--- >> + Say yes to enable the encryption of system memory. This requires >> + an AMD processor that supports Secure Memory Encryption (SME). >> + The encryption of system memory is disabled by default but can be >> + enabled with the mem_encrypt=on command line option. >> + >> # Common NUMA Features >> config NUMA >> bool "Numa Memory Allocation and Scheduler Support" > From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Lendacky Subject: Re: [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement Date: Wed, 7 Sep 2016 09:03:46 -0500 Message-ID: <5a8e2455-ef08-9e3f-2847-082fd3e01e67@amd.com> References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> <20160822223559.29880.1502.stgit@tlendack-t1.amdoffice.net> <20160902110351.GA22559@nazgul.tnic> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20160902110351.GA22559@nazgul.tnic> Sender: owner-linux-mm@kvack.org To: Borislav Petkov Cc: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org, =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Thomas Gleixner , Dmitry Vyukov List-Id: linux-efi@vger.kernel.org On 09/02/2016 06:03 AM, Borislav Petkov wrote: > On Mon, Aug 22, 2016 at 05:35:59PM -0500, Tom Lendacky wrote: >> Provide the Kconfig support to build the SME support in the kernel. >> >> Signed-off-by: Tom Lendacky >> --- >> arch/x86/Kconfig | 9 +++++++++ >> 1 file changed, 9 insertions(+) >> >> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig >> index c580d8c..131f329 100644 >> --- a/arch/x86/Kconfig >> +++ b/arch/x86/Kconfig >> @@ -1357,6 +1357,15 @@ config X86_DIRECT_GBPAGES >> supports them), so don't confuse the user by printing >> that we have them enabled. >> >> +config AMD_MEM_ENCRYPT >> + bool "Secure Memory Encryption support for AMD" > > "AMD Secure Memory Encryption support" Ok. Thanks, Tom > >> + depends on X86_64 && CPU_SUP_AMD >> + ---help--- >> + Say yes to enable the encryption of system memory. This requires >> + an AMD processor that supports Secure Memory Encryption (SME). >> + The encryption of system memory is disabled by default but can be >> + enabled with the mem_encrypt=on command line option. >> + >> # Common NUMA Features >> config NUMA >> bool "Numa Memory Allocation and Scheduler Support" > -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org