Received: by 10.223.176.5 with SMTP id f5csp1171773wra; Wed, 31 Jan 2018 02:21:52 -0800 (PST) X-Google-Smtp-Source: AH8x2240kAzeZTQWIvVjImywCZRp1aoKR5vk4VYklPsHBP4xPNqUr6kxsQ4pJnr8TGk5saPoFFiV X-Received: by 2002:a17:902:3084:: with SMTP id v4-v6mr295971plb.131.1517394112523; Wed, 31 Jan 2018 02:21:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517394112; cv=none; d=google.com; s=arc-20160816; b=A+vbCgZ6Uhl+Wp5xuxMLgqMPp8Fvv+bWuGBek+/IGJJrC4NeZb4gt3PDeOpqkYvxvo 1g15/ynNn0BvvskXePv2MUppypDTPvTeuIixugUh3FQ5Til43w4gqUnkih84WwSPhZ3W P8ldND2DCHvXIqQRD9wRKuSVWdjnC1SAP1TFJGBrAhhyDOEfjUAnzjSxZVCT6kVbdUe6 xeKCv2QaCvM1barhi2PjuRerKHCmwwbORuWVBMhenTtY8vawiTmDCM9q+TOLf4YYEz67 QFzsJPYCVVSPPFK49r8s6H6WBBEMxN++pqL3PsCyFHBTe5TGMDRIr6VHOieSFkiIIcdy M9jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=hs6dVlQNK4VueXqmMobPo7Y12ZpFGkurcBTR97JEHB0=; b=nk1WqIru833kfZupEEHhNrTcBwA5MYtzA6oZ1HzqROU+zDUsS5Te/jz+v7c8IAf18X 4+I5ZGbs6ExEmjiECUnvH1uqEiD0LdHw9rJUXRQgxoDPeZd3QP0wMWsdhTFjCFwTFqaF Fs5Zwazej/JD0e3gOyC46wV7emfPaGFxgCygZnmqfAbcmrqI0yRjMJznr8WHVacMcMec LB+TD7vHayOhqwUXDaJMinRPs3j+vUyjZFnUC9TeOuf0fzBE/+x+1U4SC/dPgnznNMkH nF33pCWV9QrrNppiC9e4gm9p3zVAw+iHO7m0cxy1EURoZwBqNQJaO7XCutEGPQrH6hhf hKUg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 84si3118605pgf.252.2018.01.31.02.21.37; Wed, 31 Jan 2018 02:21:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753467AbeAaJQM (ORCPT + 99 others); Wed, 31 Jan 2018 04:16:12 -0500 Received: from mga14.intel.com ([192.55.52.115]:40813 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753014AbeAaJPX (ORCPT ); Wed, 31 Jan 2018 04:15:23 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 31 Jan 2018 01:15:22 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,439,1511856000"; d="scan'208";a="27684238" Received: from black.fi.intel.com ([10.237.72.28]) by orsmga001.jf.intel.com with ESMTP; 31 Jan 2018 01:15:19 -0800 Received: by black.fi.intel.com (Postfix, from userid 1000) id 7EE9D1E4; Wed, 31 Jan 2018 11:15:18 +0200 (EET) From: "Kirill A. Shutemov" To: Ingo Molnar , x86@kernel.org, Thomas Gleixner , "H. Peter Anvin" Cc: Tom Lendacky , Dave Hansen , Kai Huang , linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: [PATCH 1/3] x86/cpufeatures: Add Intel Total Memory Encryption cpufeature Date: Wed, 31 Jan 2018 12:15:07 +0300 Message-Id: <20180131091509.26531-2-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.15.1 In-Reply-To: <20180131091509.26531-1-kirill.shutemov@linux.intel.com> References: <20180131091509.26531-1-kirill.shutemov@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org CPUID.0x7.0x0:ECX[13] indicates whether CPU supports Intel Total Memory Encryption. Signed-off-by: Kirill A. Shutemov --- arch/x86/include/asm/cpufeatures.h | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/include/asm/cpufeatures.h b/arch/x86/include/asm/cpufeatures.h index 14c3aa2b5f90..d3702d9ac012 100644 --- a/arch/x86/include/asm/cpufeatures.h +++ b/arch/x86/include/asm/cpufeatures.h @@ -315,6 +315,7 @@ #define X86_FEATURE_VPCLMULQDQ (16*32+10) /* Carry-Less Multiplication Double Quadword */ #define X86_FEATURE_AVX512_VNNI (16*32+11) /* Vector Neural Network Instructions */ #define X86_FEATURE_AVX512_BITALG (16*32+12) /* Support for VPOPCNT[B,W] and VPSHUF-BITQMB instructions */ +#define X86_FEATURE_TME (16*32+13) /* Intel Total Memory Encryption */ #define X86_FEATURE_AVX512_VPOPCNTDQ (16*32+14) /* POPCNT for vectors of DW/QW */ #define X86_FEATURE_LA57 (16*32+16) /* 5-level page tables */ #define X86_FEATURE_RDPID (16*32+22) /* RDPID instruction */ -- 2.15.1