Re: [RFC PATCH v3 20/20] x86: Add support to make use of Secure Memory Encryption

2016-11-29 Thread Borislav Petkov
On Tue, Nov 29, 2016 at 12:48:17PM -0600, Tom Lendacky wrote: > > One more thing: just like we're adding an =on switch, we'd need an =off > > switch in case something's wrong with the SME code. IOW, if a user > > supplies "mem_encrypt=off", we do not encrypt. > > Well, we can document "off", but i

Re: [RFC PATCH v3 20/20] x86: Add support to make use of Secure Memory Encryption

2016-11-29 Thread Tom Lendacky
On 11/26/2016 2:47 PM, Borislav Petkov wrote: > On Wed, Nov 09, 2016 at 06:38:38PM -0600, Tom Lendacky wrote: >> This patch adds the support to check if SME has been enabled and if the >> mem_encrypt=on command line option is set. If both of these conditions >> are true, then the encryption mask is

Re: [RFC PATCH v3 20/20] x86: Add support to make use of Secure Memory Encryption

2016-11-26 Thread Borislav Petkov
On Wed, Nov 09, 2016 at 06:38:38PM -0600, Tom Lendacky wrote: > This patch adds the support to check if SME has been enabled and if the > mem_encrypt=on command line option is set. If both of these conditions > are true, then the encryption mask is set and the kernel is encrypted > "in place." > >

Re: [RFC PATCH v3 20/20] x86: Add support to make use of Secure Memory Encryption

2016-11-22 Thread Borislav Petkov
On Wed, Nov 09, 2016 at 06:38:38PM -0600, Tom Lendacky wrote: > This patch adds the support to check if SME has been enabled and if the > mem_encrypt=on command line option is set. If both of these conditions > are true, then the encryption mask is set and the kernel is encrypted > "in place." Som

[RFC PATCH v3 20/20] x86: Add support to make use of Secure Memory Encryption

2016-11-09 Thread Tom Lendacky
This patch adds the support to check if SME has been enabled and if the mem_encrypt=on command line option is set. If both of these conditions are true, then the encryption mask is set and the kernel is encrypted "in place." Signed-off-by: Tom Lendacky --- arch/x86/kernel/head_64.S |