All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Huang, Kai" <kai.huang@intel.com>
To: "kirill@shutemov.name" <kirill@shutemov.name>,
	"Sakkinen, Jarkko" <jarkko.sakkinen@intel.com>,
	"Hansen, Dave" <dave.hansen@intel.com>
Cc: "kirill.shutemov@linux.intel.com"
	<kirill.shutemov@linux.intel.com>,
	"peterz@infradead.org" <peterz@infradead.org>,
	"jmorris@namei.org" <jmorris@namei.org>,
	"keyrings@vger.kernel.org" <keyrings@vger.kernel.org>,
	"tglx@linutronix.de" <tglx@linutronix.de>,
	"linux-mm@kvack.org" <linux-mm@kvack.org>,
	"dhowells@redhat.com" <dhowells@redhat.com>,
	"linux-security-module@vger.kernel.org"
	<linux-security-module@vger.kernel.org>,
	"Williams, Dan J" <dan.j.williams@intel.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"hpa@zytor.com" <hpa@zytor.com>,
	"mingo@redhat.com" <mingo@redhat.com>,
	"luto@kernel.org" <luto@kernel.org>,
	"bp@alien8.de" <bp@alien8.de>,
	"Schofield, Alison" <alison.schofield@intel.com>,
	"Nakajima, Jun" <jun.nakajima@intel.com>
Subject: Re: [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Date: Fri, 07 Dec 2018 10:12:47 +0000	[thread overview]
Message-ID: <1544177563.28511.34.camel@intel.com> (raw)
In-Reply-To: <a0a1e0d2-ef32-8378-5363-b730afc99c03@intel.com>
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WARNING: multiple messages have this Message-ID (diff)
From: "Huang, Kai" <kai.huang@intel.com>
To: "kirill@shutemov.name" <kirill@shutemov.name>,
	"Sakkinen, Jarkko" <jarkko.sakkinen@intel.com>,
	"Hansen, Dave" <dave.hansen@intel.com>
Cc: "kirill.shutemov@linux.intel.com"
	<kirill.shutemov@linux.intel.com>,
	"peterz@infradead.org" <peterz@infradead.org>,
	"jmorris@namei.org" <jmorris@namei.org>,
	"keyrings@vger.kernel.org" <keyrings@vger.kernel.org>,
	"tglx@linutronix.de" <tglx@linutronix.de>,
	"linux-mm@kvack.org" <linux-mm@kvack.org>,
	"dhowells@redhat.com" <dhowells@redhat.com>,
	"linux-security-module@vger.kernel.org" 
	<linux-security-module@vger.kernel.org>,
	"Williams, Dan J" <dan.j.williams@intel.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"hpa@zytor.com" <hpa@zytor.com>,
	"mingo@redhat.com" <mingo@redhat.com>,
	"luto@kernel.org" <luto@kernel.org>,
	"bp@alien8.de" <bp@alien8.de>,
	"Schofield, Alison" <alison.schofield@intel.com>,
	"Nakajima, Jun" <jun.nakajima@intel.com>
Subject: Re: [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Date: Fri, 7 Dec 2018 10:12:47 +0000	[thread overview]
Message-ID: <1544177563.28511.34.camel@intel.com> (raw)
In-Reply-To: <a0a1e0d2-ef32-8378-5363-b730afc99c03@intel.com>

On Thu, 2018-12-06 at 06:59 -0800, Dave Hansen wrote:
> On 12/6/18 3:22 AM, Kirill A. Shutemov wrote:
> > > When you say "disable encryption to a page" does the encryption get
> > > actually disabled or does the CPU just decrypt it transparently i.e.
> > > what happens physically?
> > 
> > Yes, it gets disabled. Physically. It overrides TME encryption.
> 
> I know MKTME itself has a runtime overhead and we expect it to have a
> performance impact in the low single digits.  Does TME have that
> overhead?  Presumably MKTME plus no-encryption is not expected to have
> the overhead.
> 
> We should probably mention that in the changelogs too.
> 

I believe in terms of hardware crypto overhead MKTME and TME should have the same (except MKTME no-
encrypt case?). But MKTME might have additional overhead from software implementation in kernel?

Thanks,
-Kai

  reply	other threads:[~2018-12-07 10:12 UTC|newest]

Thread overview: 198+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-12-04  7:39 [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME) Alison Schofield
2018-12-04  7:39 ` Alison Schofield
2018-12-04  7:39 ` [RFC v2 01/13] x86/mktme: Document the MKTME APIs Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-05 18:11   ` Andy Lutomirski
2018-12-05 18:11     ` Andy Lutomirski
2018-12-05 19:22     ` Alison Schofield
2018-12-05 19:22       ` Alison Schofield
2018-12-05 23:35       ` Andy Lutomirski
2018-12-05 23:35         ` Andy Lutomirski
2018-12-06  8:04   ` Sakkinen, Jarkko
2018-12-06  8:04     ` Sakkinen, Jarkko
2018-12-06  8:04     ` Sakkinen, Jarkko
2018-12-04  7:39 ` [RFC v2 02/13] mm: Generalize the mprotect implementation to support extensions Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-06  8:08   ` Sakkinen, Jarkko
2018-12-06  8:08     ` Sakkinen, Jarkko
2018-12-06  8:08     ` Sakkinen, Jarkko
2018-12-04  7:39 ` [RFC v2 03/13] syscall/x86: Wire up a new system call for memory encryption keys Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-04  7:39 ` [RFC v2 04/13] x86/mm: Add helper functions for MKTME " Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-04  9:14   ` Peter Zijlstra
2018-12-04  9:14     ` Peter Zijlstra
2018-12-05  5:49     ` Alison Schofield
2018-12-05  5:49       ` Alison Schofield
2018-12-04 15:35   ` Andy Lutomirski
2018-12-04 15:35     ` Andy Lutomirski
2018-12-05  5:52     ` Alison Schofield
2018-12-05  5:52       ` Alison Schofield
2018-12-06  8:31   ` Sakkinen, Jarkko
2018-12-06  8:31     ` Sakkinen, Jarkko
2018-12-06  8:31     ` Sakkinen, Jarkko
2018-12-04  7:39 ` [RFC v2 05/13] x86/mm: Set KeyIDs in encrypted VMAs Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-06  8:37   ` Sakkinen, Jarkko
2018-12-06  8:37     ` Sakkinen, Jarkko
2018-12-06  8:37     ` Sakkinen, Jarkko
2018-12-04  7:39 ` [RFC v2 06/13] mm: Add the encrypt_mprotect() system call Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-06  8:38   ` Sakkinen, Jarkko
2018-12-06  8:38     ` Sakkinen, Jarkko
2018-12-06  8:38     ` Sakkinen, Jarkko
2018-12-04  7:39 ` [RFC v2 07/13] x86/mm: Add helpers for reference counting encrypted VMAs Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-04  8:58   ` Peter Zijlstra
2018-12-04  8:58     ` Peter Zijlstra
2018-12-05  5:28     ` Alison Schofield
2018-12-05  5:28       ` Alison Schofield
2018-12-04  7:39 ` [RFC v2 08/13] mm: Use reference counting for " Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-04  7:39 ` [RFC v2 09/13] mm: Restrict memory encryption to anonymous VMA's Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-04  9:10   ` Peter Zijlstra
2018-12-04  9:10     ` Peter Zijlstra
2018-12-05  5:30     ` Alison Schofield
2018-12-05  5:30       ` Alison Schofield
2018-12-05  9:07       ` Peter Zijlstra
2018-12-05  9:07         ` Peter Zijlstra
2018-12-04  7:39 ` [RFC v2 10/13] keys/mktme: Add the MKTME Key Service type for memory encryption Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-06  8:51   ` Sakkinen, Jarkko
2018-12-06  8:51     ` Sakkinen, Jarkko
2018-12-06  8:51     ` Sakkinen, Jarkko
2018-12-06  8:54     ` Sakkinen, Jarkko
2018-12-06  8:54       ` Sakkinen, Jarkko
2018-12-06  8:54       ` Sakkinen, Jarkko
2018-12-06 15:11     ` Dave Hansen
2018-12-06 15:11       ` Dave Hansen
2018-12-06 22:56       ` Sakkinen, Jarkko
2018-12-06 22:56         ` Sakkinen, Jarkko
2018-12-04  7:39 ` [RFC v2 11/13] keys/mktme: Program memory encryption keys on a system wide basis Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-04  9:21   ` Peter Zijlstra
2018-12-04  9:21     ` Peter Zijlstra
2018-12-04  9:50     ` Kirill A. Shutemov
2018-12-04  9:50       ` Kirill A. Shutemov
2018-12-05  5:44       ` Alison Schofield
2018-12-05  5:44         ` Alison Schofield
2018-12-05  5:43     ` Alison Schofield
2018-12-05  5:43       ` Alison Schofield
2018-12-05  9:10       ` Peter Zijlstra
2018-12-05  9:10         ` Peter Zijlstra
2018-12-05 17:26         ` Alison Schofield
2018-12-05 17:26           ` Alison Schofield
2018-12-04  7:39 ` [RFC v2 12/13] keys/mktme: Save MKTME data if kernel cmdline parameter allows Alison Schofield
2018-12-04  7:39   ` Alison Schofield
2018-12-04  9:22   ` Peter Zijlstra
2018-12-04  9:22     ` Peter Zijlstra
2018-12-07  2:14   ` Huang, Kai
2018-12-07  2:14     ` Huang, Kai
2018-12-07  3:42     ` Alison Schofield
2018-12-07  3:42       ` Alison Schofield
2018-12-07  6:39     ` Jarkko Sakkinen
2018-12-07  6:39       ` Jarkko Sakkinen
2018-12-07  6:45       ` Jarkko Sakkinen
2018-12-07  6:45         ` Jarkko Sakkinen
2018-12-07 11:47     ` Kirill A. Shutemov
2018-12-07 11:47       ` Kirill A. Shutemov
2018-12-04  7:40 ` [RFC v2 13/13] keys/mktme: Support CPU Hotplug for MKTME keys Alison Schofield
2018-12-04  7:40   ` Alison Schofield
2018-12-04  9:28   ` Peter Zijlstra
2018-12-04  9:28     ` Peter Zijlstra
2018-12-05  5:32     ` Alison Schofield
2018-12-05  5:32       ` Alison Schofield
2018-12-04  9:31   ` Peter Zijlstra
2018-12-04  9:31     ` Peter Zijlstra
2018-12-05  5:36     ` Alison Schofield
2018-12-05  5:36       ` Alison Schofield
2018-12-04  9:25 ` [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME) Peter Zijlstra
2018-12-04  9:25   ` Peter Zijlstra
2018-12-04  9:46   ` Kirill A. Shutemov
2018-12-04  9:46     ` Kirill A. Shutemov
2018-12-05 20:32     ` Sakkinen, Jarkko
2018-12-05 20:32       ` Sakkinen, Jarkko
2018-12-05 20:32       ` Sakkinen, Jarkko
2018-12-06 11:22       ` Kirill A. Shutemov
2018-12-06 11:22         ` Kirill A. Shutemov
2018-12-06 14:59         ` Dave Hansen
2018-12-06 14:59           ` Dave Hansen
2018-12-07 10:12           ` Huang, Kai [this message]
2018-12-07 10:12             ` Huang, Kai
2018-12-06 21:23         ` Sakkinen, Jarkko
2018-12-06 21:23           ` Sakkinen, Jarkko
2018-12-06 21:23           ` Sakkinen, Jarkko
2018-12-07 11:54           ` Kirill A. Shutemov
2018-12-07 11:54             ` Kirill A. Shutemov
2018-12-04 19:19 ` Andy Lutomirski
2018-12-04 19:19   ` Andy Lutomirski
2018-12-04 20:00   ` Andy Lutomirski
2018-12-04 20:00     ` Andy Lutomirski
2018-12-04 20:32     ` Dave Hansen
2018-12-04 20:32       ` Dave Hansen
2018-12-05 22:19   ` Sakkinen, Jarkko
2018-12-05 22:19     ` Sakkinen, Jarkko
2018-12-07  2:05     ` Huang, Kai
2018-12-07  2:05       ` Huang, Kai
2018-12-07  6:48       ` Jarkko Sakkinen
2018-12-07  6:48         ` Jarkko Sakkinen
2018-12-07 11:57     ` Kirill A. Shutemov
2018-12-07 11:57       ` Kirill A. Shutemov
2018-12-07 21:59       ` Sakkinen, Jarkko
2018-12-07 21:59         ` Sakkinen, Jarkko
2018-12-07 21:59         ` Sakkinen, Jarkko
2018-12-07 23:45         ` Sakkinen, Jarkko
2018-12-07 23:45           ` Sakkinen, Jarkko
2018-12-07 23:45           ` Sakkinen, Jarkko
2018-12-07 23:48           ` Andy Lutomirski
2018-12-07 23:48             ` Andy Lutomirski
2018-12-08  1:33           ` Huang, Kai
2018-12-08  1:33             ` Huang, Kai
2018-12-08  1:33             ` Huang, Kai
2018-12-08  3:53             ` Sakkinen, Jarkko
2018-12-08  3:53               ` Sakkinen, Jarkko
2018-12-08  3:53               ` Sakkinen, Jarkko
2018-12-12 15:31           ` Sakkinen, Jarkko
2018-12-12 15:31             ` Sakkinen, Jarkko
2018-12-12 15:31             ` Sakkinen, Jarkko
2018-12-12 16:29             ` Andy Lutomirski
2018-12-12 16:29               ` Andy Lutomirski
2018-12-12 16:43               ` Sakkinen, Jarkko
2018-12-12 16:43                 ` Sakkinen, Jarkko
2018-12-12 23:27                 ` Huang, Kai
2018-12-12 23:27                   ` Huang, Kai
2018-12-13  5:49                   ` Sakkinen, Jarkko
2018-12-13  5:49                     ` Sakkinen, Jarkko
2018-12-13  5:52                     ` Sakkinen, Jarkko
2018-12-13  5:52                       ` Sakkinen, Jarkko
2018-12-12 23:24               ` Huang, Kai
2018-12-12 23:24                 ` Huang, Kai
2018-12-07 23:35       ` Eric Rannaud
2018-12-07 23:35         ` Eric Rannaud
2018-12-05 23:49   ` Dave Hansen
2018-12-05 23:49     ` Dave Hansen
2018-12-06  1:09     ` Andy Lutomirski
2018-12-06  1:09       ` Andy Lutomirski
2018-12-06  1:25       ` Dan Williams
2018-12-06  1:25         ` Dan Williams
2018-12-06 15:39       ` Dave Hansen
2018-12-06 15:39         ` Dave Hansen
2018-12-06 19:10         ` Andy Lutomirski
2018-12-06 19:10           ` Andy Lutomirski
2018-12-06 19:31           ` Dave Hansen
2018-12-06 19:31             ` Dave Hansen
2018-12-07  1:55       ` Huang, Kai
2018-12-07  1:55         ` Huang, Kai
2018-12-07  1:55         ` Huang, Kai
2018-12-07  4:23         ` Dave Hansen
2018-12-07  4:23           ` Dave Hansen
2018-12-07 23:53         ` Andy Lutomirski
2018-12-07 23:53           ` Andy Lutomirski
2018-12-08  1:11           ` Dave Hansen
2018-12-08  1:11             ` Dave Hansen
2018-12-08  2:07           ` Huang, Kai
2018-12-08  2:07             ` Huang, Kai
2018-12-05 20:30 ` Sakkinen, Jarkko
2018-12-05 20:30   ` Sakkinen, Jarkko
2018-12-05 20:30   ` Sakkinen, Jarkko

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1544177563.28511.34.camel@intel.com \
    --to=kai.huang@intel.com \
    --cc=alison.schofield@intel.com \
    --cc=bp@alien8.de \
    --cc=dan.j.williams@intel.com \
    --cc=dave.hansen@intel.com \
    --cc=dhowells@redhat.com \
    --cc=hpa@zytor.com \
    --cc=jarkko.sakkinen@intel.com \
    --cc=jmorris@namei.org \
    --cc=jun.nakajima@intel.com \
    --cc=keyrings@vger.kernel.org \
    --cc=kirill.shutemov@linux.intel.com \
    --cc=kirill@shutemov.name \
    --cc=linux-mm@kvack.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=luto@kernel.org \
    --cc=mingo@redhat.com \
    --cc=peterz@infradead.org \
    --cc=tglx@linutronix.de \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.