From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752491AbdFHQPp (ORCPT ); Thu, 8 Jun 2017 12:15:45 -0400 Received: from mail-bn3nam01on0066.outbound.protection.outlook.com ([104.47.33.66]:17056 "EHLO NAM01-BN3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752422AbdFHQPA (ORCPT ); Thu, 8 Jun 2017 12:15:00 -0400 Authentication-Results: google.com; dkim=none (message not signed) header.d=none;google.com; dmarc=none action=none header.from=amd.com; Subject: Re: [PATCH v6 00/34] x86: Secure Memory Encryption (AMD) To: Nick Sarnie Cc: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org, Thomas Gleixner , Rik van Riel , Brijesh Singh , Toshimitsu Kani , Arnd Bergmann , Jonathan Corbet , Matt Fleming , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Andrey Ryabinin , Ingo Molnar , "Michael S. Tsirkin" , Andy Lutomirski , "H. Peter Anvin" , Borislav Petkov , Paolo Bonzini , Alexander Potapenko , Dave Young , Larry Woodman , Dmitry Vyukov References: <20170607191309.28645.15241.stgit@tlendack-t1.amdoffice.net> From: Tom Lendacky Message-ID: <2dd424fe-0af1-d82f-b608-271ea5e1f62b@amd.com> Date: Thu, 8 Jun 2017 11:14:38 -0500 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.78.1] X-ClientProxiedBy: CY1PR03CA0026.namprd03.prod.outlook.com (10.174.128.36) To CY4PR12MB1141.namprd12.prod.outlook.com (10.168.163.149) X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PR12MB1141: X-MS-Office365-Filtering-Correlation-Id: da995c83-f1f6-490f-244d-08d4ae8978fc X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(48565401081)(201703131423075)(201703031133081);SRVR:CY4PR12MB1141; X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;3:zupBJt5RSMRNGgJEbLq6iR/tKkSKvBG7NGDLuyZIkCNGNZSnokMpgUtSPlkDBdreAw/AURE1qMIkEYGW2TE0gjV5RiLUWsfVBrwRBJ7IX1jfKfSeEmup21oDgaCYN5NWUVmWTCx4uAl89IMc9aCZFS5mLBwfgBMarC9azaiIsJwFza7eUVMJu79cIo6XnlTbjax7aub6ge/6v/PGVIge9tGcb0QXaS1HerZcbS8WDqKZR7e3jHMrEQakVJSjlH/SWeT6Aho4Fkt2XNWJ56/qxLDik+qICYNcpOaE/Qp+xKvDgtntPhGEgoylvgBkfq2xz4JRcCmA2vxqo5ThZj+BeJ6vSziS5kO+Jfz0akASxtg=;25:hc2pFh6BKhrLKtQWSUujxzmUf65SiVfQ/dZwAMd1lOiq/ca/50HdBEUrAiIofXMjIdAx1xrjebHKibO1vVQn1FFLJrECmy6iaelM+BuwhqiksSNJ9tcMjsa1q/Bd0UBQbKbgGMHlLV67eaZGkL+SPZP4AtFRywC3z8IN0zeaqR8AoI/SJ45OFPw4pIvL3BajNPULlgxiFvCVkkpI/Inc+tymYLnLl078UPOJP7tgkbjPHnPw6PjMcmr7P+P7DiFO9RcyEOlhLC16iV2EKoxQWD+Tl4+xqSE/vDD50R1ZfqfPQLUax8aGfp8XN6uDORI0sAJ2Y3xlJtw7Qd0vQ0y2pMk9VhZglF2UzDWcS9Cm8pZxzDbT6PlIK5HhAT81Duw1qZIk3L0KpYen9cwBV0z+Flstz33+X3AZxVwZZ3RAYX0v8ltOeDN7IRWQHm5bUClULRHgYNl08AOVQGaSOLD2ys0ntjiOfBQ5N4j8SbR7KkY= X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;31:i+HXja7ddm6+8v2vpxMj5IC5yctCPDM/+qukAz1TWA1KSkMipAa4MyLgpAPCHR2Ree5PuwWDkGSiiEGc1+BkPHRTFBeqHaQzZ1phb6pUrhbA/q2K8enASDBizz06lh52gFRzossINjwzvEqu5rByEcMrGzylBTmzvYMPFFHVkdSRkY4AGXGAqymjuva4ClziTQ7BgLWDksCS+StqiG3C/9FdREf6qsPd+68nT2+9d2Q=;20:0JvaJv3PKUfJuNEYBk9OCqWvXzSUAtcsF7OOaGBM+15yrm4eeO98zLLuns1ELH7kJILq00c8blCJ4QgHmcOygngKmmafsGj+w3G55jv2iEuQCoHwLEProylszcppYHrziJAX/zkxKwhEC81YEY8cqs4D5hB25X4R7ijdp1tVyOPR6FTIDD+yUFR4HylpDdMl7niBltMHw4+sm6PPbNNMpYTn6+y9fU4cfqnee/nhNUM99ZCZfAWBujLRO/FoNFERxU8lpARrcIxA/8hr6FqjUa219Ea0KFQavxBANTtKexG4/8tRwxZVFG7/27Kc6TD5U95Cq7qxFeDSCNOX/t6jm7DqihUFcw2SaZ0bSpklKVLdfBjiVHN2bCduM1Z3muo5C/QrReaenzYJohZVbH8ewbPQj2BXAbJr2UUh4ckmOhKerlIeYci30PoULgvO1hkS74Xm7GGWpaCCZWIa/9SDNogOaO/zVRbCrqcwKBui+mYU1OcULB28OXKohZ9gRW6I X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(100000703101)(100105400095)(10201501046)(6055026)(6041248)(20161123555025)(20161123558100)(20161123564025)(20161123560025)(20161123562025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:CY4PR12MB1141;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:CY4PR12MB1141; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDWTRQUjEyTUIxMTQxOzQ6SGpWNVVUdGVUUytJVC84ME81U056aW0wMGkx?= =?utf-8?B?YUxPVDdXOUJnMmlsMk5qclpvOStKV0FlUkV1SU45Tmx3UEVXdDRiaThpU3N1?= =?utf-8?B?WkRvZ2d2bVJjZGZIQW9LU3J6UEdzblFJazJJWEdRRTVYK3NaMUpiWHBtendG?= =?utf-8?B?SG43YjljZTB6WldHcXovNGVBL3pSd21oK1VDR0ZPZ2Ntako5SW54QU1mWmlR?= =?utf-8?B?M01pTkcxVWFsaTBCRUNwRFl1cUtpdUdQTVkwM3Rkb29HSmJWYk9TVEM5OTBj?= =?utf-8?B?c0ZSZnBPYWlWSEE1Ynhod21UMDBGK3FwYllOcDBabmE3RVJwcVJoaktFV0pM?= =?utf-8?B?V05iak81dGx1S2lOckl3UkNHL2syY3Y1OXhMZGNsRVVJYVBqc29XaUZyOXdr?= =?utf-8?B?amh1Y2xZSDRwa3AraG5oOG1ydUpTbHRZMzBKTE9LaWpkaTg3dHpIek1jdVJK?= =?utf-8?B?ZEZ6bTZ1RGdCQnVWKzdzWmFRcXFzeW9iN1VCSWxIeHdBMGhaVVlYcWJtWk14?= =?utf-8?B?d2hXVjNrZmM0MnpFdFNPS1B6ZDRISFhsQVlDVWwwWFpPUkZmSFdpemNaUWRy?= =?utf-8?B?RjRLNldLSzc2Y0w5ektyUDMvdnRpdmNBWlVoeFY1eGJjeE1mNTk1QTZVU0hW?= =?utf-8?B?MFgzckV3SG92aGdwVWpiZjRpWGJ0WmpRcXZxbGFML2FkdXdzZFYzK2VmNnJY?= =?utf-8?B?NDQ4c0c2b05pRHUyUThIZzBFdHhDcnZ1TjkwWTFzREpkWmhxdStxTW1aOFVJ?= =?utf-8?B?U0tVSjFhTTAzV0JsQkowQWNsbjdMS0VrRnVMTWJJZ1o2VVYvRVI1ci9pdDZ2?= =?utf-8?B?S3N1UHQraUZEWTJaODFwYTNGMTVZNlBWZWl0cjgzeGgxMkxHQm5VUEtlOWtG?= =?utf-8?B?UitSRlorYU1yMldtNGtzVUNWRU5ib05YaXd2bDJtWjFkM0x0cm9qdlE4bW5x?= =?utf-8?B?RXJkYzZpZG04eU1HcnNhbGtOYWF5Z2J4d1RCT3N1ZkNJeU5yTWRMZVJvUUFW?= =?utf-8?B?djY4WG1IYit4ZmpUSzhJVEJvU0F4WlZ5YkNGZElFWW1DUm1kY1FlcFR0eG1p?= =?utf-8?B?UmJlQ3JUMlpuazZZYU15VzlpSC9FNzBJeGtxNGpTQnNva0Zsdno2ZzRGcWRn?= =?utf-8?B?UlYvdVY5d3VKSXE1OThLdzNMdWp3cFBLNUZNWlRmald1LytSaXV6OUtlSUtX?= =?utf-8?B?Mzk5U3F4U1hwa2lRTEJWUzM2VTBHVGJVYm9vRzF4MVBEeTIyL1lLTWhsNlgy?= =?utf-8?B?MkFtOGtlMjN3QTJSNTl3OFROQUIvWno3VG9oM1ZibEJqQnppckRpbGJFUllC?= =?utf-8?B?NjdCdElXSFMvQUhZcDhNblo4dmdwZW5UclUrNVNDRnhNdjRiaWJYQTRuR1FK?= =?utf-8?B?UVh4Sy9HZ0Y5M0tuZ1hsbzd4eDJKK3ZzTEoweTVvMUJTOVBteDUyQk15VnNy?= =?utf-8?B?RFNoRThHRHdRM1RMd0ZEVXVoaTc5WlNPZ0ZtemtlTEZwZXBkaW1vL2lUcmMr?= =?utf-8?B?V2NnaWZocjFyS2FTbk5PbnF4RzVRZFFsd3NUMGpaRm94aWtZekh2cGtZd2hs?= =?utf-8?B?NHc2SFRRVHgxKzdUNWtWRmtDM3dXbHZqUnpWNmx1cjlsTzdObS9kT0FOL21W?= =?utf-8?Q?XYmOwdT6pfbtBYi+v7j?= X-Forefront-PRVS: 0332AACBC3 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6049001)(6009001)(39400400002)(39410400002)(39450400003)(39850400002)(39840400002)(39860400002)(24454002)(377454003)(64126003)(230700001)(65826007)(33646002)(1411001)(54906002)(966005)(72206003)(110136004)(77096006)(38730400002)(478600001)(31686004)(42186005)(3846002)(6486002)(90366009)(6246003)(6666003)(53936002)(6306002)(2906002)(189998001)(4326008)(229853002)(53546009)(6916009)(23676002)(36756003)(7416002)(47776003)(5660300001)(66066001)(7736002)(8676002)(305945005)(65806001)(65956001)(81166006)(25786009)(31696002)(86362001)(3260700006)(54356999)(76176999)(50986999)(2950100002);DIR:OUT;SFP:1101;SCL:1;SRVR:CY4PR12MB1141;H:[10.236.64.250];FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDWTRQUjEyTUIxMTQxOzIzOk9QeGRHbDl3SGtUZFZrV3JCOWdrR3pSVUpq?= =?utf-8?B?MnJyOWlVK2NDQlZkcE9pSlp6UWJoM1I5Y2p2d2d0aGRRTWxiR2U1ZVFBNEdB?= =?utf-8?B?TVJnMmFWc3VGSVFSRWFVVDdMSVVmYUllbFRVOVBxZUUrZUtUQmFnN1RZOWN0?= =?utf-8?B?Q0d4UjdwekROS0tTS2NIaHpCTjFMNzdCUGJPOWxiUmZ5YjRpUWJwOVEwbVRJ?= =?utf-8?B?VWpzUDk3dFlzdzNTcHpJZ0lpdlk2QnY3L0tMS0UvTTVNaFl4Z05RQXp3dVVW?= =?utf-8?B?dklIZHVVTEdYQ2VwWWRzdDFPS3Y0QWtBckwxa0hCa3h4STk5RElCdi81MWoz?= =?utf-8?B?Zmdoa3hrNWU1OHhaNUY5SW5iTFRPVWZmNW9nL2tCM0JHZGc0aE80SHc2M0lU?= =?utf-8?B?S2lmTW03NU51cGZhMTFNSTZESUprVmZmUUF5b2Y2MGlyNlFmMCtqbFJjSE1V?= =?utf-8?B?SC9WOUYwL0ZJL0VWTnhOZlI0ZEJhK2JueW1TRUVRSkN5R2VLMWx1dFR1TlRD?= =?utf-8?B?UjJJQkNSZTV4dmlKUXJ6Q0tVMVFqN09mQ0dPTkI5Wkt3MHU3T1c0a1JhZjdp?= =?utf-8?B?VEhrcUVKYzFrd3AxaFlPbngzTEFsVlFNeUNYSWJCRzJoaE1lQVNSN29zcTNy?= =?utf-8?B?M3hobDNPd1kwcVlMTENBV2J2ZzMxbEt4ZTFQVVlqMVBGbkFUR2RiSXZlc2dG?= =?utf-8?B?cGdUM2pIK3djYkhJQ1BPS3ZaNGVMa20zR0ZHVkZ5OEtEUm9xVjVCTDlKb1FP?= =?utf-8?B?ZVkyaW9Fd0RUczlDNHhYdlh4QlBKb1duWGtNY3JUNXJ6MG1xMXh6RUtWSXZM?= =?utf-8?B?OWRYWTdmWjVIUWdiTGMzSDY2WmVOSGRCTHJSbWhZTFUxayttVTJPSVlDUEhl?= =?utf-8?B?NllSMXY1dWFaMW45VEozdFpmZ3RPQ21hK3h2TkZKZEJQaFlZYlFiNmVYS0hH?= =?utf-8?B?Qm42NnJIOHJqNngrSVl5dVNwU3NzZWRKNDNHS0w1aDUxV1BBamw0VUZkdlVa?= =?utf-8?B?NXE4MmVSTS85dVREMUt4MGV3TVZWcUNXa0UyZzZ0RFBrMEpTajdpR0JxdURE?= =?utf-8?B?bmRmbFJkRG1ua0c1eXdxMEJ0WGJtTkEwVG1lUFg3VE5vMFc4Rk1uNHNIWGxx?= =?utf-8?B?VlN2WEhBVU5qMDZORU1pQVVIek5JbzNuYWdaWTlnZ3Nvb092QWpsdHdFWHhR?= =?utf-8?B?SEpqbGpwb25Fdi9veUpPazhJc1cyZ3Fzbk55TFFBRkI2WjQvMGgzZUNvN3Ev?= =?utf-8?B?c0NZNS9VU1RRMmprb3FFdXFKMVNKUkx0TlJwLzFQOVhLWU1abVNjVkFLWFIz?= =?utf-8?B?YWEwRFY4M1k3UktrTlA1QTdnd2tmeURxSGVFTU82UGdVK3c5ditBVUVhR0lm?= =?utf-8?B?K3AwRVBzTXFKNVRVQjBiMG5uNVdtUEtFcTZZU0xENDBFdXR4cXAwTFQwMDNs?= =?utf-8?B?L1hPRmxhUi94eGI5Ri8xN203MDd3R0RDSzJLQW5IVlhyelBPM1A2bFdXRlpM?= =?utf-8?B?N3BQU2t4dE9oRk5zMDRyaGEvWHkxL1AxOXRlcTJBNFE1Z3djdDlyOVRNT2hU?= =?utf-8?B?SEhpL09CdDEyZVF3ODU1QzhYUU5vK0dlMWpVdjNBQ2hYMDYxOS9aYWFDYXFV?= =?utf-8?B?S0J3aTFMYUJsd0s3UERMWVFhR1VBdTNNSy9OZXY2cWxMcUFONmpzNXBqNWkv?= =?utf-8?B?MXJ3QS9XenNnVW1qd0xEVWRFcEIxa2ZiNHpqdFhqQ2M3WWtsV29KWnBLc2g1?= =?utf-8?B?Q3N2UnFVMisrQi9xejRkRi9HVG9adTZwdmp3V1hOaUhJTEQyak9kZVpIQW4z?= =?utf-8?B?Qml1TlFsSWp4ejJpUzBCVHlNeVFvN3padG9ZaVZVb0NLWU4yZ1htek9tOUx3?= =?utf-8?Q?wwUoC+Td0y6Xwx2f6HUwr7yxSleQRTYe?= X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;6: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 X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;5: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;24:fGLZi7F2ZCVldYUUhyMb5Mh840mTVcNslitNNuLrJQ7KNL/U6IrjPIIVMnuBrfNImwHstRWX+LnBXQD2w0PaeBrazKJhI5yBBf8sf86YbLY= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1141;7:80CUG1l1M1CLw1ShnFeduPEtpLbQPNYLqNSGXhiaSbbyNgOJIavjFlZoRYmqqr6xk+8Ja/qEVzxtP2MovU7HdrW/01kEYxJqIyBiOb6GftG3YGgnoUUsa3lgnVbm87y1eQXmnccDkNJhea6RCYX0AFvR5xphufey2NwGXvhpS7Hj42USaPwcGvips0mxBdp/82+V/9e7cQ1WNBOBCd0uFn4RVyui30hcnH865ERtCPMqbHKqNbghP2B4Y5DhKdvFxS6j6fS8OLk545Ona8kfyoyOb2qOuXngE3ZMIPBpN3yOj4ElnSn+nb/8MlhDm5JQuKOmJxeVWe8YURw0RI3LDQ==;20:qdH8Zuas7AN9GC7Wm/hGWTKnsYoq37DhB1U+0uxkgaWYa27THCZASt1carkREJ3Q6scRz30ZVcgsns7XgDGAoR8UOIXBV7dvasEWvaLkZFkuHJHVetn1zIBMjsEuXYRJnNw+HJbkmvbt2NhFPAfPXY3Abs8OMPs9L52wXNm25u+SuvaWqnTLelOxNleLX8jRU8VQdAMERCZwoDGDVN2+6WXrqr1WuGr9aa8RjCoKAsyKdQ78hDstFt7yUHvZBjQN X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Jun 2017 16:14:41.5562 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1141 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/7/2017 9:40 PM, Nick Sarnie wrote: > On Wed, Jun 7, 2017 at 3:13 PM, Tom Lendacky wrote: >> This patch series provides support for AMD's new Secure Memory Encryption (SME) >> feature. >> >> SME can be used to mark individual pages of memory as encrypted through the >> page tables. A page of memory that is marked encrypted will be automatically >> decrypted when read from DRAM and will be automatically encrypted when >> written to DRAM. Details on SME can found in the links below. >> >> The SME feature is identified through a CPUID function and enabled through >> the SYSCFG MSR. Once enabled, page table entries will determine how the >> memory is accessed. If a page table entry has the memory encryption mask set, >> then that memory will be accessed as encrypted memory. The memory encryption >> mask (as well as other related information) is determined from settings >> returned through the same CPUID function that identifies the presence of the >> feature. >> >> The approach that this patch series takes is to encrypt everything possible >> starting early in the boot where the kernel is encrypted. Using the page >> table macros the encryption mask can be incorporated into all page table >> entries and page allocations. By updating the protection map, userspace >> allocations are also marked encrypted. Certain data must be accounted for >> as having been placed in memory before SME was enabled (EFI, initrd, etc.) >> and accessed accordingly. >> >> This patch series is a pre-cursor to another AMD processor feature called >> Secure Encrypted Virtualization (SEV). The support for SEV will build upon >> the SME support and will be submitted later. Details on SEV can be found >> in the links below. >> >> The following links provide additional detail: >> >> AMD Memory Encryption whitepaper: >> http://amd-dev.wpengine.netdna-cdn.com/wordpress/media/2013/12/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf >> >> AMD64 Architecture Programmer's Manual: >> http://support.amd.com/TechDocs/24593.pdf >> SME is section 7.10 >> SEV is section 15.34 >> >> --- >> ... > > > Hi Tom, > > Thanks for your work on this. This may be a stupid question, but is > using bounce buffers for the GPU(s) expected to reduce performance in > any/a noticeable way? I'm hitting another issue which I've already > sent mail about so I can't test it for myself at the moment, That all depends on the workload, how much DMA is being performed, etc. But it is extra overhead to use bounce buffers. Thanks, Tom > > Thanks, > Sarnex >