From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751873AbcH3NTV (ORCPT ); Tue, 30 Aug 2016 09:19:21 -0400 Received: from mail-by2nam01on0050.outbound.protection.outlook.com ([104.47.34.50]:8818 "EHLO NAM01-BY2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1750795AbcH3NTO (ORCPT ); Tue, 30 Aug 2016 09:19:14 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Thomas.Lendacky@amd.com; Subject: Re: [RFC PATCH v2 04/20] x86: Secure Memory Encryption (SME) support To: Thomas Gleixner References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> <20160822223610.29880.21739.stgit@tlendack-t1.amdoffice.net> CC: , , , , , , , , , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Dmitry Vyukov From: Tom Lendacky Message-ID: Date: Tue, 30 Aug 2016 08:19:00 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: CY4PR13CA0003.namprd13.prod.outlook.com (10.168.161.141) To BN6PR12MB1139.namprd12.prod.outlook.com (10.168.226.141) X-MS-Office365-Filtering-Correlation-Id: 53a0a13e-2273-4f9f-39de-08d3d0d83a63 X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;2:ciXvGKzwTxMaokIz4T/zHqvhMux1QfKTnjb9aseCHMFir16yDfm/9vt6qb92PiEXQchvJP9gxvxCJbxFVrlxfnZ7+i2xQ/eIWkDgODez/t0pdHdhzxzPA3aWHaJ56ePuhKnI0DizbEjTTqhO25QwgHEVxzZLzQlQE1isp9nPPdjk9Esr+NweqB5DsbuxYWQX;3:JVWjEJhy0/+UaJkokAlBMP+SKiUaaLsAfZ/rC0W1PpX0SVOjCg4BEthXwznR5/wpRtv0eLQh/rXbgC18HK75cajuOPwrhWmu5PDwJBpIilCA0+2camVU3+YzIQTv3/Sq X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN6PR12MB1139; X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;25: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 X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;31:bLTn5HlLsHoAMAlzV28HlFsKBj9glCYb/bNJ/gEHz3UGpmgMOffJ9KhxWowEkQU6FQWzK52Hxha4N3DN25LZ/pmD9ZuAEvNyh4KbMnv+dliV8/q59QLMHyG+Mot1KdXLnVfuphNYkLrIDbWIxQcvLUOHNTWauzC6/5HD842k4S5eArQ9vW5LBN9B5rV1RIiR9MqcMvNJ+kd1KvSw0rbWBXUuL6lNh5e91MhVDBv+3s8=;20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040176)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026);SRVR:BN6PR12MB1139;BCL:0;PCL:0;RULEID:;SRVR:BN6PR12MB1139; X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;4:vjaVq6vRKDBUsUzvQ0r80II5soPIqwmbYggxGmTGkGuIVieYLBi+yl6tPqe6qYf/7SwL4DmTRmya8jc5EqBjQl1kbRYZ3F7YMxhQTG7QMDsN6nVXXKAdNjHmU4xxq+b0m0f/nWlfRX8uBDPJqGnAk7hIx3HtCAMTntrk3K1u9am+jaUDaN/Fj7Mbq6uCJ6UEfEKHJPDqSLUM9se7kqu1319s37O0+BKVUkLh0EVKvikFBQ8WlgAkOaqcVcTGPjNEsE7SuT9wnNTBOu9uIBCRyFPIbTpPTFatOXdfJ/+xBaLUZI/kFaZL7HSZs0CN9an2AtMPJ2DsGirlIgx+PM986RfnyazSvYxzE6f1d2jUsZmqloodcOjY3dOKwOcKTaXWd2I2Pmbo5/uxI319IzKDqQ== X-Forefront-PRVS: 0050CEFE70 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6009001)(6049001)(7916002)(189002)(199003)(24454002)(377454003)(64126003)(97736004)(8676002)(31686004)(7416002)(92566002)(77096005)(105586002)(2950100001)(76176999)(65826007)(586003)(4001350100001)(50986999)(7846002)(110136002)(4326007)(31696002)(86362001)(33646002)(54356999)(65806001)(47776003)(81166006)(50466002)(7736002)(42186005)(66066001)(65956001)(3846002)(23746002)(189998001)(6116002)(5660300001)(36756003)(2906002)(68736007)(305945005)(83506001)(230700001)(106356001)(81156014)(101416001)(217873001);DIR:OUT;SFP:1101;SCL:1;SRVR:BN6PR12MB1139;H:[10.236.18.82];FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1;BN6PR12MB1139;23:TeqGwgi5wULqTy0aw9211Iyav/e/4LMdLQG0l?= =?Windows-1252?Q?2g3UJTIaClrf/9LTphWEuwVIgyxKXRih7gIKTsFkX7Y7AJhljakmWGFx?= =?Windows-1252?Q?70BePn0T0lxT3QEWOjwbmZzutw7flQUPv+a46PC/O+aoTGH8s+eNyJ0b?= =?Windows-1252?Q?c89gccTBYURf67x0KNqPSdoAblsincQy1FwmP/NwOHcKRLC62rHGRiHc?= =?Windows-1252?Q?vInaWVEdZAFzCdPPbJypzQK2cqZOUntJ9bOAWKxDAXEG/Adep96drz7e?= =?Windows-1252?Q?H5bFCqIkQqKMM3jHSiDasIsZXUc7RgJsrvmhnO8Onzw8fSwPV8By3mRL?= =?Windows-1252?Q?tiKBihrCrvwI5Ac1fQzqzdFI3XNLrOduX3CG28mZA8yKBFIabUDfmW3h?= =?Windows-1252?Q?IR6p6eTiTVdXwmUZs8oj8Wo1ppccqdURNSD9Ve9TRW3PiSIC+66qQta5?= =?Windows-1252?Q?T4RZzLJ6QrEBkwecUElollsos0kVOI6w7mHvAdrCPiKam5RMidXKqyzH?= =?Windows-1252?Q?TiKKHWKsGdc462GF5pNNZ+M0FDilBDucteOxaWBGam6TPFzwHUsL5Erb?= =?Windows-1252?Q?t01O/3n2b/6WPZnncI7hvF+2ndU+UKBAV07R6/xmo+TIjVS4djWsJALS?= =?Windows-1252?Q?nBfENdfU87HfnqmKvF4XIZ2iE/AgBNkOZg/3PMlMbtMJCYtG5E3a/BJ2?= =?Windows-1252?Q?9xPKI8dshvHcq5fXHASWnrIHFF7XdXQnO4ofQvdZyLxDDyLYri96qQ/I?= =?Windows-1252?Q?IMv0CAFkFSLerTnKvp1+6Wy5HgYyGETZAq2509AdIfdNRSNE/ZX7bgsk?= =?Windows-1252?Q?OGG/IrfIKo7EkyIOsi7G0BJxwHbv3ewCS9+6rL4QYboD02zokvYRPsfG?= =?Windows-1252?Q?xaQHAfwqQAGbfQgTel1Q5pp+xHK8oKbKxlC2WFouPvgAXDIxQUCbbAhA?= =?Windows-1252?Q?YCowyyzjqMHqWbBIFCX07bPy/LHh6b4Eqk7xgCVm6CtYcLPO7/1U2rhQ?= =?Windows-1252?Q?j+Uw1yFJk6TyfEhazvC5y3ine9xLJS07eWF9DR4I0EU81IYZ8nWADHAu?= =?Windows-1252?Q?lBgwid+dg1IL9aNcRk00zpzOn8+i/8flR59QlNXyigWRLgej0DkaoebV?= =?Windows-1252?Q?7mWAxYfQ8a3DZGgPpgBIZwa/Ujfhh7s4tKAjmUrEGwueo+f8La3E1rGG?= =?Windows-1252?Q?YuId6WJ/IVJuPdKDzaUJN65SkaYBooJaGYf/kwtIFyijcn1XQ+I8L0F+?= =?Windows-1252?Q?LOFyLwYGne2cbTOy7XsYWp4JrAxuEyC+vHoIKMh4fM6ygjCmdjSyciEU?= =?Windows-1252?Q?TIxKzJ8Wb25AUSOUccM9eXGRRaDHejGQNEdn2mafDmh2fukMYGD76JXv?= =?Windows-1252?Q?V7N+f9X7nfQ?= X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;6:0c6okvr98O6Yz7Wvp3uojssaWhFYjTzm4ufmBDAGc0fxJAxCAeVf/amIxL6siU7NNQy0GBhugXv6cRsUu38av6pQyhp5k3orxxHA30wlGIjX9poBF3ZRSAChBoIAKh58dgYDuEV1xHAU5VkupJyDXY4nKNmgWae6M4mUxybf9rI60U5HxqhAJliJ3zxNbEUtyIz13y1IIBEE96vk1pNjR1WgRWv60U9HWjK5Y5+c1IM+fJoCUhd1IaF9QSjCpWd/vXIMCKvrAkWBKZQ0tY9bDcgNGW7vHt/XctyxW/60655otE5DYGg2ftklmaBka5w7gznSZpPJH6yY1VT3+TYGNw==;5:z6lxv71zjvGD9Fbdmy8YWOCmOfM1XLS1/DEACXaOrxXeyyenPtRjSbInRgibSdoT2Gf8WYsPyvMv5sUn0fjHviJPGHsy4v+1eXpNlQvojn1a4I0L/wSneBW269ImZp9s4Y5gcFCo80R2t67J5TEcEA==;24:mDZqoYkwdTEQ9BToOKfGGd1cguagWw8OMBTQ8cuwhERkYQDCKvXkFPUOfW1btR8opMaCgWjY4QI+wsNyKshCPBbcdYbnlpuDmx3DsrWU4jU=;7:Pxh87Qpnfc2u42rlfu70inXJwcqVRKokokxakJvHuU0G7fRYAmoRSalP91yjjWa5hcrYn8j4E8TqdwfAkQBeon7lpNn8NPoxcFSJGn/RG6lt9NZCzwh/FK+L2oGX+seWiHp/fifNANVXURgmmlgqKRHZQSYQCr+MDRXQicj9uPv6J//xHuZL5XuCfcbqf5bDCRoB8AUW4KbQtG8PeMrdsugNncrmlcnxkdxnY46xnHZmRxuL9ImS9Fkek2T7bxAl SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;20:QEUM4UcMG8sW8XQYZ+Sj/Z/gw83bESlP4Gu808CYENJXiNKMUT789R0sGxxN3N66KK1YzYd9nGvMci742LIrenrTaCN3hThZYUQUpAs+GW2ap6X6LjQnezb3rQSortV5Wbdxqv0TCvtT0rlWjHcVce6ObUFTzpgRpr21nzIoqXArdvB08CS+0H4CMObobeZSBUc6e5Ap+l5eYlENJzZZQYokMXWkpY8omM3t1VRXNm+VXiFxtYPzw9MFpRY6Qwl1 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Aug 2016 13:19:07.6096 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1139 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/25/2016 08:04 AM, Thomas Gleixner wrote: > On Mon, 22 Aug 2016, Tom Lendacky wrote: > >> Provide support for Secure Memory Encryption (SME). This initial support >> defines the memory encryption mask as a variable for quick access and an >> accessor for retrieving the number of physical addressing bits lost if >> SME is enabled. > > What is the reason that this needs to live in assembly code? In later patches this code is expanded and deals with a lot of page table manipulation, cpuid/rdmsr instructions, etc. and so I thought it was best to do it this way. Thanks, Tom > > Thanks, > > tglx > From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Lendacky Subject: Re: [RFC PATCH v2 04/20] x86: Secure Memory Encryption (SME) support Date: Tue, 30 Aug 2016 08:19:00 -0500 Message-ID: References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> <20160822223610.29880.21739.stgit@tlendack-t1.amdoffice.net> Mime-Version: 1.0 Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: Sender: owner-linux-mm@kvack.org To: Thomas Gleixner Cc: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org, =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Dmitry Vyukov List-Id: linux-efi@vger.kernel.org On 08/25/2016 08:04 AM, Thomas Gleixner wrote: > On Mon, 22 Aug 2016, Tom Lendacky wrote: > >> Provide support for Secure Memory Encryption (SME). This initial support >> defines the memory encryption mask as a variable for quick access and an >> accessor for retrieving the number of physical addressing bits lost if >> SME is enabled. > > What is the reason that this needs to live in assembly code? In later patches this code is expanded and deals with a lot of page table manipulation, cpuid/rdmsr instructions, etc. and so I thought it was best to do it this way. Thanks, Tom > > Thanks, > > tglx > -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org