Re: [RFC Part1 PATCH v3 08/17] x86/efi: Access EFI data as encrypted when SEV is active

2017-08-17 Thread Tom Lendacky
On 7/28/2017 5:31 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:48PM -0500, Brijesh Singh wrote: From: Tom Lendacky EFI data is encrypted when the kernel is run under SEV. Update the page table references to be sure the EFI memory areas are accessed encrypted. Signed-off-by: Tom

Re: [RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes

2017-08-17 Thread Tom Lendacky
On 7/28/2017 3:47 AM, David Laight wrote: From: Borislav Petkov Sent: 27 July 2017 15:59 On Mon, Jul 24, 2017 at 02:07:47PM -0500, Brijesh Singh wrote: From: Tom Lendacky <thomas.lenda...@amd.com> The current code checks only for sme_active() when determining whether to perform the encr

Re: [RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes

2017-08-17 Thread Tom Lendacky
On 7/28/2017 3:47 AM, David Laight wrote: From: Borislav Petkov Sent: 27 July 2017 15:59 On Mon, Jul 24, 2017 at 02:07:47PM -0500, Brijesh Singh wrote: From: Tom Lendacky The current code checks only for sme_active() when determining whether to perform the encryption attribute change

Re: [RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes

2017-08-17 Thread Tom Lendacky
On 7/27/2017 9:58 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:47PM -0500, Brijesh Singh wrote: From: Tom Lendacky <thomas.lenda...@amd.com> The current code checks only for sme_active() when determining whether to perform the encryption attribute change. Include sev_

Re: [RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes

2017-08-17 Thread Tom Lendacky
On 7/27/2017 9:58 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:47PM -0500, Brijesh Singh wrote: From: Tom Lendacky The current code checks only for sme_active() when determining whether to perform the encryption attribute change. Include sev_active() in this check so that memory

Re: [RFC Part1 PATCH v3 06/17] x86/mm: Use encrypted access of boot related data with SEV

2017-08-17 Thread Tom Lendacky
On 7/27/2017 8:31 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:46PM -0500, Brijesh Singh wrote: From: Tom Lendacky <thomas.lenda...@amd.com> When Secure Encrypted Virtualization (SEV) is active, boot data (such as EFI related data, setup data) is encrypted and needs to be ac

Re: [RFC Part1 PATCH v3 06/17] x86/mm: Use encrypted access of boot related data with SEV

2017-08-17 Thread Tom Lendacky
On 7/27/2017 8:31 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:46PM -0500, Brijesh Singh wrote: From: Tom Lendacky When Secure Encrypted Virtualization (SEV) is active, boot data (such as EFI related data, setup data) is encrypted and needs to be accessed as such when mapped

Re: [RFC Part1 PATCH v3 05/17] x86, realmode: Don't decrypt trampoline area under SEV

2017-08-10 Thread Tom Lendacky
On 7/26/2017 11:03 AM, Borislav Petkov wrote: Subject: x86/realmode: ... Done. On Mon, Jul 24, 2017 at 02:07:45PM -0500, Brijesh Singh wrote: From: Tom Lendacky <thomas.lenda...@amd.com> When SEV is active the trampoline area will need to be in encrypted memory so only mark th

Re: [RFC Part1 PATCH v3 05/17] x86, realmode: Don't decrypt trampoline area under SEV

2017-08-10 Thread Tom Lendacky
On 7/26/2017 11:03 AM, Borislav Petkov wrote: Subject: x86/realmode: ... Done. On Mon, Jul 24, 2017 at 02:07:45PM -0500, Brijesh Singh wrote: From: Tom Lendacky When SEV is active the trampoline area will need to be in encrypted memory so only mark the area decrypted if SME is active

Re: [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature

2017-08-09 Thread Tom Lendacky
On 7/25/2017 10:33 AM, Borislav Petkov wrote: On Tue, Jul 25, 2017 at 10:29:40AM -0500, Tom Lendacky wrote: But early_identify_cpu() calls get_cpu_cap() which will check for cpuid leaf 0x8008 support and set x86_phys_bits. Right, but it can't be less than 32, can it? And if it is more

Re: [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature

2017-08-09 Thread Tom Lendacky
On 7/25/2017 10:33 AM, Borislav Petkov wrote: On Tue, Jul 25, 2017 at 10:29:40AM -0500, Tom Lendacky wrote: But early_identify_cpu() calls get_cpu_cap() which will check for cpuid leaf 0x8008 support and set x86_phys_bits. Right, but it can't be less than 32, can it? And if it is more

[tip:x86/mm] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-30 Thread tip-bot for Tom Lendacky
Commit-ID: 4e237903f95db585b976e7311de2bfdaaf0f6e31 Gitweb: http://git.kernel.org/tip/4e237903f95db585b976e7311de2bfdaaf0f6e31 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Fri, 28 Jul 2017 11:01:16 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Sun,

[tip:x86/mm] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-30 Thread tip-bot for Tom Lendacky
Commit-ID: 4e237903f95db585b976e7311de2bfdaaf0f6e31 Gitweb: http://git.kernel.org/tip/4e237903f95db585b976e7311de2bfdaaf0f6e31 Author: Tom Lendacky AuthorDate: Fri, 28 Jul 2017 11:01:16 -0500 Committer: Ingo Molnar CommitDate: Sun, 30 Jul 2017 12:09:12 +0200 x86/mm, kexec: Fix memory

[tip:x86/mm] acpi, x86/mm: Remove encryption mask from ACPI page protection type

2017-07-30 Thread tip-bot for Tom Lendacky
Commit-ID: 57bd1905b228f2a14d7506b0302f69f425131e57 Gitweb: http://git.kernel.org/tip/57bd1905b228f2a14d7506b0302f69f425131e57 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Fri, 28 Jul 2017 11:01:17 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Sun,

[tip:x86/mm] acpi, x86/mm: Remove encryption mask from ACPI page protection type

2017-07-30 Thread tip-bot for Tom Lendacky
Commit-ID: 57bd1905b228f2a14d7506b0302f69f425131e57 Gitweb: http://git.kernel.org/tip/57bd1905b228f2a14d7506b0302f69f425131e57 Author: Tom Lendacky AuthorDate: Fri, 28 Jul 2017 11:01:17 -0500 Committer: Ingo Molnar CommitDate: Sun, 30 Jul 2017 12:09:12 +0200 acpi, x86/mm: Remove

[PATCH v2 0/2] x86: Secure Memory Encryption (SME) fixes 2017-07-26

2017-07-28 Thread Tom Lendacky
infradead.org> Changes since v1: - Patch #1: - Only issue wbinvd if SME is active - Patch #2: - Create a no encryption version of the PAGE_KERNEL protection type and use that in arch_apei_get_mem_attribute() - General comment and patch description clean up Tom Lendacky (2): x86/mm, k

[PATCH v2 0/2] x86: Secure Memory Encryption (SME) fixes 2017-07-26

2017-07-28 Thread Tom Lendacky
- Patch #1: - Only issue wbinvd if SME is active - Patch #2: - Create a no encryption version of the PAGE_KERNEL protection type and use that in arch_apei_get_mem_attribute() - General comment and patch description clean up Tom Lendacky (2): x86/mm, kexec: Fix memory corruption with SME on

[PATCH v2 2/2] acpi, x86: Remove encryption mask from ACPI page protection type

2017-07-28 Thread Tom Lendacky
, that is a no encryption version of PAGE_KERNEL, and return that from arch_apei_get_mem_attributes(). Signed-off-by: Tom Lendacky <thomas.lenda...@amd.com> --- arch/x86/include/asm/acpi.h | 11 ++- arch/x86/include/asm/pgtable_types.h | 1 + 2 files changed, 7 insertions

[PATCH v2 2/2] acpi, x86: Remove encryption mask from ACPI page protection type

2017-07-28 Thread Tom Lendacky
, that is a no encryption version of PAGE_KERNEL, and return that from arch_apei_get_mem_attributes(). Signed-off-by: Tom Lendacky --- arch/x86/include/asm/acpi.h | 11 ++- arch/x86/include/asm/pgtable_types.h | 1 + 2 files changed, 7 insertions(+), 5 deletions(-) diff --git

[PATCH v2 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-28 Thread Tom Lendacky
location to the destination location to clear any possible cache entry conflicts. Cc: <ke...@lists.infradead.org> Signed-off-by: Tom Lendacky <thomas.lenda...@amd.com> --- arch/x86/include/asm/kexec.h | 3 ++- arch/x86/kernel/machine_kexec_64.c | 3 ++- arch/x86/kernel/relocate

[PATCH v2 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-28 Thread Tom Lendacky
location to the destination location to clear any possible cache entry conflicts. Cc: Signed-off-by: Tom Lendacky --- arch/x86/include/asm/kexec.h | 3 ++- arch/x86/kernel/machine_kexec_64.c | 3 ++- arch/x86/kernel/relocate_kernel_64.S | 14 ++ 3 files changed, 18 insertions

Re: [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-27 Thread Tom Lendacky
On 7/27/2017 12:34 PM, Linus Torvalds wrote: On Thu, Jul 27, 2017 at 7:15 AM, Tom Lendacky <thomas.lenda...@amd.com> wrote: I can #ifdef the wbinvd based on whether AMD_MEM_ENCRYPT is configured or not so that the wbinvd is avoided if not configured. I suspect an ifdef will be useless,

Re: [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-27 Thread Tom Lendacky
On 7/27/2017 12:34 PM, Linus Torvalds wrote: On Thu, Jul 27, 2017 at 7:15 AM, Tom Lendacky wrote: I can #ifdef the wbinvd based on whether AMD_MEM_ENCRYPT is configured or not so that the wbinvd is avoided if not configured. I suspect an ifdef will be useless, since things like distro

Re: [PATCH v1 2/2] acpi, x86: Remove encryption mask from ACPI page protection type

2017-07-27 Thread Tom Lendacky
On 7/27/2017 9:41 AM, Borislav Petkov wrote: On Wed, Jul 26, 2017 at 01:04:34PM -0500, Tom Lendacky wrote: The function arch_apei_get_mem_attributes() is used to set the page protection type for ACPI physical addresses. When SME is active, the associated protection type needs to not have

Re: [PATCH v1 2/2] acpi, x86: Remove encryption mask from ACPI page protection type

2017-07-27 Thread Tom Lendacky
On 7/27/2017 9:41 AM, Borislav Petkov wrote: On Wed, Jul 26, 2017 at 01:04:34PM -0500, Tom Lendacky wrote: The function arch_apei_get_mem_attributes() is used to set the page protection type for ACPI physical addresses. When SME is active, the associated protection type needs to not have

Re: [PATCH v1 2/2] acpi, x86: Remove encryption mask from ACPI page protection type

2017-07-27 Thread Tom Lendacky
On 7/27/2017 2:39 AM, Ingo Molnar wrote: * Tom Lendacky <thomas.lenda...@amd.com> wrote: The function arch_apei_get_mem_attributes() is used to set the page protection type for ACPI physical addresses. When SME is active, the associated protection type needs to not have the encryptio

Re: [PATCH v1 2/2] acpi, x86: Remove encryption mask from ACPI page protection type

2017-07-27 Thread Tom Lendacky
On 7/27/2017 2:39 AM, Ingo Molnar wrote: * Tom Lendacky wrote: The function arch_apei_get_mem_attributes() is used to set the page protection type for ACPI physical addresses. When SME is active, the associated protection type needs to not have the encryption mask set since the ACPI tables

Re: [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-27 Thread Tom Lendacky
On 7/27/2017 2:17 AM, Ingo Molnar wrote: * Tom Lendacky <thomas.lenda...@amd.com> wrote: After issuing successive kexecs it was found that the SHA hash failed verification when booting the kexec'd kernel. When SME is enabled, the change from using pages that were marked encrypted

Re: [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-27 Thread Tom Lendacky
On 7/27/2017 2:17 AM, Ingo Molnar wrote: * Tom Lendacky wrote: After issuing successive kexecs it was found that the SHA hash failed verification when booting the kexec'd kernel. When SME is enabled, the change from using pages that were marked encrypted to now being marked as not encrypted

[PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-26 Thread Tom Lendacky
to the destination location to clear any possible cache entry conflicts. Cc: <ke...@lists.infradead.org> Signed-off-by: Tom Lendacky <thomas.lenda...@amd.com> --- arch/x86/kernel/relocate_kernel_64.S | 7 +++ 1 file changed, 7 insertions(+) diff --git a/arch/x86/kernel/relocate_kernel_64.S

[PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-26 Thread Tom Lendacky
to the destination location to clear any possible cache entry conflicts. Cc: Signed-off-by: Tom Lendacky --- arch/x86/kernel/relocate_kernel_64.S | 7 +++ 1 file changed, 7 insertions(+) diff --git a/arch/x86/kernel/relocate_kernel_64.S b/arch/x86/kernel/relocate_kernel_64.S index 98111b3..c11d8bc

[PATCH v1 0/2] x86: Secure Memory Encryption (SME) fixes 2017-07-26

2017-07-26 Thread Tom Lendacky
properties returned by arch_apei_get_mem_attribute() when SME is active --- This patch series is based off of the master branch of tip: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git master Commit 8333bcad393c ("Merge branch 'x86/asm'") Cc: <ke...@lists.infrad

[PATCH v1 2/2] acpi, x86: Remove encryption mask from ACPI page protection type

2017-07-26 Thread Tom Lendacky
() function to remove the encryption mask when SME is active by returning the PAGE_KERNEL_IO protection type. Signed-off-by: Tom Lendacky <thomas.lenda...@amd.com> --- arch/x86/include/asm/acpi.h | 7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/arch/x86/include/asm/ac

[PATCH v1 0/2] x86: Secure Memory Encryption (SME) fixes 2017-07-26

2017-07-26 Thread Tom Lendacky
properties returned by arch_apei_get_mem_attribute() when SME is active --- This patch series is based off of the master branch of tip: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git master Commit 8333bcad393c ("Merge branch 'x86/asm'") Cc: Tom Lendacky (2): x86

[PATCH v1 2/2] acpi, x86: Remove encryption mask from ACPI page protection type

2017-07-26 Thread Tom Lendacky
() function to remove the encryption mask when SME is active by returning the PAGE_KERNEL_IO protection type. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/acpi.h | 7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/arch/x86/include/asm/acpi.h b/arch/x86/include/asm

Re: [RFC Part1 PATCH v3 03/17] x86/mm: Secure Encrypted Virtualization (SEV) support

2017-07-26 Thread Tom Lendacky
On 7/25/2017 11:28 PM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:43PM -0500, Brijesh Singh wrote: From: Tom Lendacky <thomas.lenda...@amd.com> Provide support for Secure Encyrpted Virtualization (SEV). This initial Your subject misses a verb and patch subjects shoul

Re: [RFC Part1 PATCH v3 03/17] x86/mm: Secure Encrypted Virtualization (SEV) support

2017-07-26 Thread Tom Lendacky
On 7/25/2017 11:28 PM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:43PM -0500, Brijesh Singh wrote: From: Tom Lendacky Provide support for Secure Encyrpted Virtualization (SEV). This initial Your subject misses a verb and patch subjects should have an active verb denoting what

Re: [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature

2017-07-25 Thread Tom Lendacky
On 7/25/2017 10:13 AM, Borislav Petkov wrote: On Tue, Jul 25, 2017 at 09:58:54AM -0500, Tom Lendacky wrote: True, but it is more about being accurate and making sure the value is correct where ever it may be used. So early_identify_cpu() initializes phys_bits to 32 on 32-bit. Subtracting

Re: [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature

2017-07-25 Thread Tom Lendacky
On 7/25/2017 10:13 AM, Borislav Petkov wrote: On Tue, Jul 25, 2017 at 09:58:54AM -0500, Tom Lendacky wrote: True, but it is more about being accurate and making sure the value is correct where ever it may be used. So early_identify_cpu() initializes phys_bits to 32 on 32-bit. Subtracting

Re: [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature

2017-07-25 Thread Tom Lendacky
On 7/25/2017 9:36 AM, Borislav Petkov wrote: On Tue, Jul 25, 2017 at 09:29:40AM -0500, Tom Lendacky wrote: Yup, we can do something like that. I believe the only change that would be needed to your patch would be to move the IS_ENABLED() check to after the physical address space reduction

Re: [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature

2017-07-25 Thread Tom Lendacky
On 7/25/2017 9:36 AM, Borislav Petkov wrote: On Tue, Jul 25, 2017 at 09:29:40AM -0500, Tom Lendacky wrote: Yup, we can do something like that. I believe the only change that would be needed to your patch would be to move the IS_ENABLED() check to after the physical address space reduction

Re: [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature

2017-07-25 Thread Tom Lendacky
On 7/25/2017 5:26 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:42PM -0500, Brijesh Singh wrote: From: Tom Lendacky <thomas.lenda...@amd.com> Update the CPU features to include identifying and reporting on the Secure Encrypted Virtualization (SEV) feature. SME is iden

Re: [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature

2017-07-25 Thread Tom Lendacky
On 7/25/2017 5:26 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:42PM -0500, Brijesh Singh wrote: From: Tom Lendacky Update the CPU features to include identifying and reporting on the Secure Encrypted Virtualization (SEV) feature. SME is identified by CPUID 0x801f

[tip:x86/mm] x86/mm: Add support to make use of Secure Memory Encryption

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: aca20d5462149333ba8b24a4a352be5b7a00dfd2 Gitweb: http://git.kernel.org/tip/aca20d5462149333ba8b24a4a352be5b7a00dfd2 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:35 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm: Add support to make use of Secure Memory Encryption

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: aca20d5462149333ba8b24a4a352be5b7a00dfd2 Gitweb: http://git.kernel.org/tip/aca20d5462149333ba8b24a4a352be5b7a00dfd2 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:35 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 20:23:26 +0200 x86/mm: Add support

[tip:x86/mm] compiler-gcc.h: Introduce __nostackprotector function attribute

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 7375ae3a0b79ea072f4c672039f08f5db633b9e1 Gitweb: http://git.kernel.org/tip/7375ae3a0b79ea072f4c672039f08f5db633b9e1 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:34 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] compiler-gcc.h: Introduce __nostackprotector function attribute

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 7375ae3a0b79ea072f4c672039f08f5db633b9e1 Gitweb: http://git.kernel.org/tip/7375ae3a0b79ea072f4c672039f08f5db633b9e1 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:34 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 20:23:20 +0200 compiler-gcc.h: Introduce

Re: [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)

2017-07-18 Thread Tom Lendacky
On 7/18/2017 7:03 AM, Thomas Gleixner wrote: On Mon, 17 Jul 2017, Tom Lendacky wrote: This patch series provides support for AMD's new Secure Memory Encryption (SME) feature. SME can be used to mark individual pages of memory as encrypted through the page tables. A page of memory

Re: [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)

2017-07-18 Thread Tom Lendacky
On 7/18/2017 7:03 AM, Thomas Gleixner wrote: On Mon, 17 Jul 2017, Tom Lendacky wrote: This patch series provides support for AMD's new Secure Memory Encryption (SME) feature. SME can be used to mark individual pages of memory as encrypted through the page tables. A page of memory

Re: [PATCH v10 37/38] compiler-gcc.h: Introduce __nostackp function attribute

2017-07-18 Thread Tom Lendacky
On 7/18/2017 4:36 AM, Ingo Molnar wrote: * Tom Lendacky <thomas.lenda...@amd.com> wrote: Create a new function attribute, __nostackp, that can used to turn off stack protection on a per function basis. Signed-off-by: Tom Lendacky <thomas.lenda...@amd.com> --- include/linux/co

Re: [PATCH v10 37/38] compiler-gcc.h: Introduce __nostackp function attribute

2017-07-18 Thread Tom Lendacky
On 7/18/2017 4:36 AM, Ingo Molnar wrote: * Tom Lendacky wrote: Create a new function attribute, __nostackp, that can used to turn off stack protection on a per function basis. Signed-off-by: Tom Lendacky --- include/linux/compiler-gcc.h | 2 ++ include/linux/compiler.h | 4 2

[tip:x86/mm] x86/boot/realmode: Check for memory encryption on the APs

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 46d010e04a637ca5bbdd0ff72554d9c06f2961c9 Gitweb: http://git.kernel.org/tip/46d010e04a637ca5bbdd0ff72554d9c06f2961c9 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:25 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/boot/realmode: Check for memory encryption on the APs

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 46d010e04a637ca5bbdd0ff72554d9c06f2961c9 Gitweb: http://git.kernel.org/tip/46d010e04a637ca5bbdd0ff72554d9c06f2961c9 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:25 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:04 +0200 x86/boot/realmode: Check

[tip:x86/mm] x86/mm: Add support to make use of Secure Memory Encryption

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 99192ce65da54280d2137655706d280b6913bee9 Gitweb: http://git.kernel.org/tip/99192ce65da54280d2137655706d280b6913bee9 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:35 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm: Add support to make use of Secure Memory Encryption

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 99192ce65da54280d2137655706d280b6913bee9 Gitweb: http://git.kernel.org/tip/99192ce65da54280d2137655706d280b6913bee9 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:35 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:48:16 +0200 x86/mm: Add support

[tip:x86/mm] compiler-gcc.h: Introduce __nostackprotector function attribute

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f11988d59f8e1e6f0941e94bd634911f648622ca Gitweb: http://git.kernel.org/tip/f11988d59f8e1e6f0941e94bd634911f648622ca Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:34 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] compiler-gcc.h: Introduce __nostackprotector function attribute

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f11988d59f8e1e6f0941e94bd634911f648622ca Gitweb: http://git.kernel.org/tip/f11988d59f8e1e6f0941e94bd634911f648622ca Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:34 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:06 +0200 compiler-gcc.h: Introduce

[tip:x86/mm] x86/mm, kexec: Allow kexec to be used with SME

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: bba4ed011a52d494aa7ef5e08cf226709bbf3f60 Gitweb: http://git.kernel.org/tip/bba4ed011a52d494aa7ef5e08cf226709bbf3f60 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:28 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm, kexec: Allow kexec to be used with SME

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: bba4ed011a52d494aa7ef5e08cf226709bbf3f60 Gitweb: http://git.kernel.org/tip/bba4ed011a52d494aa7ef5e08cf226709bbf3f60 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:28 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:04 +0200 x86/mm, kexec: Allow kexec

[tip:x86/mm] x86/boot: Add early cmdline parsing for options with arguments

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: e505371dd83963caae1a37ead9524e8d997341be Gitweb: http://git.kernel.org/tip/e505371dd83963caae1a37ead9524e8d997341be Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:33 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm: Add support to encrypt the kernel in-place

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 6ebcb060713f614c92216482eed501b31cee74ec Gitweb: http://git.kernel.org/tip/6ebcb060713f614c92216482eed501b31cee74ec Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:32 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/boot: Add early cmdline parsing for options with arguments

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: e505371dd83963caae1a37ead9524e8d997341be Gitweb: http://git.kernel.org/tip/e505371dd83963caae1a37ead9524e8d997341be Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:33 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:06 +0200 x86/boot: Add early

[tip:x86/mm] x86/mm: Add support to encrypt the kernel in-place

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 6ebcb060713f614c92216482eed501b31cee74ec Gitweb: http://git.kernel.org/tip/6ebcb060713f614c92216482eed501b31cee74ec Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:32 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:05 +0200 x86/mm: Add support

[tip:x86/mm] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: db516997a985b461f021d594e78155bbc7fc3e7e Gitweb: http://git.kernel.org/tip/db516997a985b461f021d594e78155bbc7fc3e7e Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:31 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: db516997a985b461f021d594e78155bbc7fc3e7e Gitweb: http://git.kernel.org/tip/db516997a985b461f021d594e78155bbc7fc3e7e Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:31 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:05 +0200 x86/mm: Create

[tip:x86/mm] xen/x86: Remove SME feature in PV guests

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f2f931c6819467af5260a21c59fb787ce2863f92 Gitweb: http://git.kernel.org/tip/f2f931c6819467af5260a21c59fb787ce2863f92 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:29 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] xen/x86: Remove SME feature in PV guests

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f2f931c6819467af5260a21c59fb787ce2863f92 Gitweb: http://git.kernel.org/tip/f2f931c6819467af5260a21c59fb787ce2863f92 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:29 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:05 +0200 xen/x86: Remove SME

[tip:x86/mm] x86/mm: Use proper encryption attributes with /dev/mem

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 8458bf94b0399cd1bca6c437366bcafb29c230c5 Gitweb: http://git.kernel.org/tip/8458bf94b0399cd1bca6c437366bcafb29c230c5 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:30 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm: Use proper encryption attributes with /dev/mem

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 8458bf94b0399cd1bca6c437366bcafb29c230c5 Gitweb: http://git.kernel.org/tip/8458bf94b0399cd1bca6c437366bcafb29c230c5 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:30 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:05 +0200 x86/mm: Use proper

[tip:x86/mm] kvm/x86/svm: Support Secure Memory Encryption within KVM

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: d0ec49d4de90806755e17289bd48464a1a515823 Gitweb: http://git.kernel.org/tip/d0ec49d4de90806755e17289bd48464a1a515823 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:27 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] kvm/x86/svm: Support Secure Memory Encryption within KVM

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: d0ec49d4de90806755e17289bd48464a1a515823 Gitweb: http://git.kernel.org/tip/d0ec49d4de90806755e17289bd48464a1a515823 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:27 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:04 +0200 kvm/x86/svm: Support

[tip:x86/mm] x86, drm, fbdev: Do not specify encrypted memory for video mappings

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 95cf9264d5f36c291c1c50c00349f83348e6f9c7 Gitweb: http://git.kernel.org/tip/95cf9264d5f36c291c1c50c00349f83348e6f9c7 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:26 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86, drm, fbdev: Do not specify encrypted memory for video mappings

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 95cf9264d5f36c291c1c50c00349f83348e6f9c7 Gitweb: http://git.kernel.org/tip/95cf9264d5f36c291c1c50c00349f83348e6f9c7 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:26 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:04 +0200 x86, drm, fbdev: Do

[tip:x86/mm] x86/cpu/AMD: Make the microcode level available earlier in the boot

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f655e6e6b992a2fb0d0334db2620607b98df39e7 Gitweb: http://git.kernel.org/tip/f655e6e6b992a2fb0d0334db2620607b98df39e7 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:23 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] iommu/amd: Allow the AMD IOMMU to work with memory encryption

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 2543a786aa25258451f3418b87a038c7ddaa2e85 Gitweb: http://git.kernel.org/tip/2543a786aa25258451f3418b87a038c7ddaa2e85 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:24 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/cpu/AMD: Make the microcode level available earlier in the boot

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f655e6e6b992a2fb0d0334db2620607b98df39e7 Gitweb: http://git.kernel.org/tip/f655e6e6b992a2fb0d0334db2620607b98df39e7 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:23 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:03 +0200 x86/cpu/AMD: Make

[tip:x86/mm] iommu/amd: Allow the AMD IOMMU to work with memory encryption

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 2543a786aa25258451f3418b87a038c7ddaa2e85 Gitweb: http://git.kernel.org/tip/2543a786aa25258451f3418b87a038c7ddaa2e85 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:24 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:03 +0200 iommu/amd: Allow the AMD

[tip:x86/mm] swiotlb: Add warnings for use of bounce buffers with SME

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 648babb7078c6310d2af5b8aa01f086030916968 Gitweb: http://git.kernel.org/tip/648babb7078c6310d2af5b8aa01f086030916968 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:22 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] swiotlb: Add warnings for use of bounce buffers with SME

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 648babb7078c6310d2af5b8aa01f086030916968 Gitweb: http://git.kernel.org/tip/648babb7078c6310d2af5b8aa01f086030916968 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:22 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:03 +0200 swiotlb: Add warnings

[tip:x86/mm] x86, swiotlb: Add memory encryption support

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: c7753208a94c73d5beb1e4bd843081d6dc7d4678 Gitweb: http://git.kernel.org/tip/c7753208a94c73d5beb1e4bd843081d6dc7d4678 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:21 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86, swiotlb: Add memory encryption support

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: c7753208a94c73d5beb1e4bd843081d6dc7d4678 Gitweb: http://git.kernel.org/tip/c7753208a94c73d5beb1e4bd843081d6dc7d4678 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:21 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:03 +0200 x86, swiotlb: Add memory

[tip:x86/mm] x86/realmode: Decrypt trampoline area if memory encryption is active

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 163ea3c83aeeb3908a51162c79cb3a7c374d92b4 Gitweb: http://git.kernel.org/tip/163ea3c83aeeb3908a51162c79cb3a7c374d92b4 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:20 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/realmode: Decrypt trampoline area if memory encryption is active

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 163ea3c83aeeb3908a51162c79cb3a7c374d92b4 Gitweb: http://git.kernel.org/tip/163ea3c83aeeb3908a51162c79cb3a7c374d92b4 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:20 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:03 +0200 x86/realmode: Decrypt

[tip:x86/mm] x86/mm: Add support to access persistent memory in the clear

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 1de328628cd06b5efff9195b57bdc1a64680814d Gitweb: http://git.kernel.org/tip/1de328628cd06b5efff9195b57bdc1a64680814d Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:18 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm: Add support to access persistent memory in the clear

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 1de328628cd06b5efff9195b57bdc1a64680814d Gitweb: http://git.kernel.org/tip/1de328628cd06b5efff9195b57bdc1a64680814d Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:18 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:02 +0200 x86/mm: Add support

[tip:x86/mm] x86/mm: Add support for changing the memory encryption attribute

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 77bd2342d4304bda7896c953d424d15deb314ca3 Gitweb: http://git.kernel.org/tip/77bd2342d4304bda7896c953d424d15deb314ca3 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:19 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm: Add support for changing the memory encryption attribute

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 77bd2342d4304bda7896c953d424d15deb314ca3 Gitweb: http://git.kernel.org/tip/77bd2342d4304bda7896c953d424d15deb314ca3 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:19 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:02 +0200 x86/mm: Add support

[tip:x86/mm] x86/mm: Add support to access boot related data in the clear

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 8f716c9b5febf6ed0f5fedb7c9407cd0c25b2796 Gitweb: http://git.kernel.org/tip/8f716c9b5febf6ed0f5fedb7c9407cd0c25b2796 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:16 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/boot: Use memremap() to map the MPF and MPC data

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 5997efb967565e858259401af394e8449629c1f0 Gitweb: http://git.kernel.org/tip/5997efb967565e858259401af394e8449629c1f0 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:17 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm: Add support to access boot related data in the clear

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 8f716c9b5febf6ed0f5fedb7c9407cd0c25b2796 Gitweb: http://git.kernel.org/tip/8f716c9b5febf6ed0f5fedb7c9407cd0c25b2796 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:16 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:02 +0200 x86/mm: Add support

[tip:x86/mm] x86/boot: Use memremap() to map the MPF and MPC data

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 5997efb967565e858259401af394e8449629c1f0 Gitweb: http://git.kernel.org/tip/5997efb967565e858259401af394e8449629c1f0 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:17 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:02 +0200 x86/boot: Use memremap

[tip:x86/mm] x86/efi: Update EFI pagetable creation to work with SME

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 38eecccdf488e38ee93690cfe9ec1914b73f512f Gitweb: http://git.kernel.org/tip/38eecccdf488e38ee93690cfe9ec1914b73f512f Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:15 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/efi: Update EFI pagetable creation to work with SME

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 38eecccdf488e38ee93690cfe9ec1914b73f512f Gitweb: http://git.kernel.org/tip/38eecccdf488e38ee93690cfe9ec1914b73f512f Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:15 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:02 +0200 x86/efi: Update EFI

[tip:x86/mm] efi: Update efi_mem_type() to return an error rather than 0

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f99afd08a45fbbd9ce35a7624ffd1d850a1906c0 Gitweb: http://git.kernel.org/tip/f99afd08a45fbbd9ce35a7624ffd1d850a1906c0 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:14 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] efi: Update efi_mem_type() to return an error rather than 0

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f99afd08a45fbbd9ce35a7624ffd1d850a1906c0 Gitweb: http://git.kernel.org/tip/f99afd08a45fbbd9ce35a7624ffd1d850a1906c0 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:14 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:01 +0200 efi: Update efi_mem_type

[tip:x86/mm] x86/mm: Add support for early encryption/decryption of memory

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 7f8b7e7f4ccbbd1fb8badddfabd28c955aea87b4 Gitweb: http://git.kernel.org/tip/7f8b7e7f4ccbbd1fb8badddfabd28c955aea87b4 Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:10 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] x86/mm: Add support for early encryption/decryption of memory

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: 7f8b7e7f4ccbbd1fb8badddfabd28c955aea87b4 Gitweb: http://git.kernel.org/tip/7f8b7e7f4ccbbd1fb8badddfabd28c955aea87b4 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:10 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:01 +0200 x86/mm: Add support

[tip:x86/mm] efi: Add an EFI table address match function

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: a19d66c56af1c52b8b463bf94d21116ae8c1aa5a Gitweb: http://git.kernel.org/tip/a19d66c56af1c52b8b463bf94d21116ae8c1aa5a Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:13 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

[tip:x86/mm] efi: Add an EFI table address match function

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: a19d66c56af1c52b8b463bf94d21116ae8c1aa5a Gitweb: http://git.kernel.org/tip/a19d66c56af1c52b8b463bf94d21116ae8c1aa5a Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:13 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017 11:38:01 +0200 efi: Add an EFI table

[tip:x86/mm] x86/boot/e820: Add support to determine the E820 type of an address

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: d68baa3fa6e4d703fd0c7954ee5c739789e7242f Gitweb: http://git.kernel.org/tip/d68baa3fa6e4d703fd0c7954ee5c739789e7242f Author: Tom Lendacky <thomas.lenda...@amd.com> AuthorDate: Mon, 17 Jul 2017 16:10:12 -0500 Committer: Ingo Molnar <mi...@kernel.org> CommitDate: Tue,

<    5   6   7   8   9   10   11   12   13   14   >