Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp6913820yba; Thu, 2 May 2019 00:13:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqz89iPpmFSsQpM8RCnFqMEKpcOyAu1WQPVS/je1Yraoic8sFD2AWb684GFEMwrsOdE400N7 X-Received: by 2002:a63:d803:: with SMTP id b3mr2387617pgh.267.1556781223685; Thu, 02 May 2019 00:13:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556781223; cv=none; d=google.com; s=arc-20160816; b=b6CWdJAPfZH2TxJah+Il/WMUnDDVILvdjOnMRkGRJghmNIRJovdpKlxoNzcHfbiVhP 2x6x7twWri3/e3hDz9yREvBWmvgVKP/ddNraNn/2CVIqrvBimP/470EVzOVTn7Ug3XK3 N4Aaqps8371o+6Yy4FmQWjDvlRrW1PKmLScGqOwZ7NLcH/QXvjcfwLghH+E0dT573kMV sWP912/VnkdbgQhWP0ICNAKGHASCxlmrX6ZhS6A4XjmfvxAcUYd/RNKjSVZlkW7cebX7 smzq/VxVCtyeb0zM0YIAsAR+IKiO35jozyVpQac1pN4veXq1CbCSylFgDT7figBcHxcK kHdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=NC8m/jDpU0Uzaq9jOe9QnHWhLNtfwXpLgED1uBMCHW4=; b=XmJgh9bn/Lq5k94rl5iMlxV3TLBh31ZFQM+bGKuHlJpiWAbidtpvo8ubjqis5DD5cH WTdyo5DU0RkNDb4BaqZHx/lKsDYSuXirIiRrb71JoF5TfxpR1uj+E02ziyCGdc0UwxaW Lb+SdDWglFzrB7kEnJT+c7x3kPO0FRj20xO25Cz6ki+k6YP7EE4GpVVl9TlC9YNWdsgG ZsMOpU6JOlyn4h/mhXntwFxTaGoBTHQjLez5Pxg7kHsoZy6GvrFvBqk1Rp9u2hGpJtaz 1Ik1dFqrKEz8mee5n+lcLneW2nHvX4ZeIrsqtSy9z4O++34m9STuf/9jMTfi17I6y5Hl 2vwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=hkLWdaWr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o64si43536339pfa.274.2019.05.02.00.13.28; Thu, 02 May 2019 00:13:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=hkLWdaWr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726722AbfEBHK6 (ORCPT + 99 others); Thu, 2 May 2019 03:10:58 -0400 Received: from mail-pf1-f196.google.com ([209.85.210.196]:42935 "EHLO mail-pf1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726055AbfEBHK6 (ORCPT ); Thu, 2 May 2019 03:10:58 -0400 Received: by mail-pf1-f196.google.com with SMTP id 13so370618pfw.9; Thu, 02 May 2019 00:10:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=NC8m/jDpU0Uzaq9jOe9QnHWhLNtfwXpLgED1uBMCHW4=; b=hkLWdaWrxraY8lEyxYHiSBkSU0z0lBlDRT1xqzK5Maz72AgpeG2UWtXdmI1grfvxJ1 uNhMvp5wGSoOQATtjuUeuCUtXpIEkK7lyhgH9eFmw80+uXQfRNYqdBc+E1gwLLe9yudf klNYflD1S1rzARsYq62GY97HrsRPfk/mHfnyRCFIzIk/CMkaQehr0lEzvfhOEX/avYwR wnNg3YcDiueVrkBSEcVn1L4VymT24LZzWGMd43sUACQ02A+t2dt5TegErlZ1BRaznqd9 kevYCYoHoRcVGouQH9uJoydLWzW4o2wgpSfkjowvG28oKVWVVAFXAzcP/NlkGccEkWIy 390w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=NC8m/jDpU0Uzaq9jOe9QnHWhLNtfwXpLgED1uBMCHW4=; b=QYl0NYhO5gwrUyZCF4thzIi8eIhqivVA7D0FRWi35soSe/doVvD8JAea8gvXIQ5zE4 4WYofqY+5Eu4Onc+K3FeD9f/Y6Rj5/rJ6rX8R/w24NGkpmxk2mTGceA3BrzRUH6oxwd9 AO3ISvh2pcWZ6u6z3yfAmmyQPnm6ZgESBJppRYLWPv8etIqFEg+h5iX1USiyYglvpYes w5htw0VBmzTfEOTuM4aKD6pJx8YNLrp3PvlSl8bYP/HBv3veut109BExlUbgq7Vghv2q 1VOU7znmvVoPoJfXbpG3a4y6cn94yles/CWqqP/bX+yr79RlGCPFr4GkCXwPNXvgQyqp WV4g== X-Gm-Message-State: APjAAAXnkMzkoZEptCxoAwXCiFv8OG32yPG+KGf966jE64TOn1Ilf36g s0RdmqWsXrBlnTpGAdg0+tQ= X-Received: by 2002:aa7:8851:: with SMTP id k17mr2426888pfo.121.1556781057607; Thu, 02 May 2019 00:10:57 -0700 (PDT) Received: from laptop.DHCP ([104.238.181.70]) by smtp.gmail.com with ESMTPSA id u24sm4686976pfh.91.2019.05.02.00.10.53 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 02 May 2019 00:10:56 -0700 (PDT) From: Changbin Du To: corbet@lwn.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de Cc: x86@kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Changbin Du , Mauro Carvalho Chehab Subject: [PATCH v2 14/27] Documentation: x86: convert amd-memory-encryption.txt to reST Date: Thu, 2 May 2019 15:06:20 +0800 Message-Id: <20190502070633.9809-15-changbin.du@gmail.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190502070633.9809-1-changbin.du@gmail.com> References: <20190502070633.9809-1-changbin.du@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This converts the plain text documentation to reStructuredText format and add it to Sphinx TOC tree. No essential content change. Signed-off-by: Changbin Du Reviewed-by: Mauro Carvalho Chehab --- ...ory-encryption.txt => amd-memory-encryption.rst} | 13 ++++++++++--- Documentation/x86/index.rst | 1 + 2 files changed, 11 insertions(+), 3 deletions(-) rename Documentation/x86/{amd-memory-encryption.txt => amd-memory-encryption.rst} (94%) diff --git a/Documentation/x86/amd-memory-encryption.txt b/Documentation/x86/amd-memory-encryption.rst similarity index 94% rename from Documentation/x86/amd-memory-encryption.txt rename to Documentation/x86/amd-memory-encryption.rst index afc41f544dab..c48d452d0718 100644 --- a/Documentation/x86/amd-memory-encryption.txt +++ b/Documentation/x86/amd-memory-encryption.rst @@ -1,3 +1,9 @@ +.. SPDX-License-Identifier: GPL-2.0 + +===================== +AMD Memory Encryption +===================== + Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV) are features found on AMD processors. @@ -34,7 +40,7 @@ is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware forces the memory encryption bit to 1. Support for SME and SEV can be determined through the CPUID instruction. The -CPUID function 0x8000001f reports information related to SME: +CPUID function 0x8000001f reports information related to SME:: 0x8000001f[eax]: Bit[0] indicates support for SME @@ -48,14 +54,14 @@ CPUID function 0x8000001f reports information related to SME: addresses) If support for SME is present, MSR 0xc00100010 (MSR_K8_SYSCFG) can be used to -determine if SME is enabled and/or to enable memory encryption: +determine if SME is enabled and/or to enable memory encryption:: 0xc0010010: Bit[23] 0 = memory encryption features are disabled 1 = memory encryption features are enabled If SEV is supported, MSR 0xc0010131 (MSR_AMD64_SEV) can be used to determine if -SEV is active: +SEV is active:: 0xc0010131: Bit[0] 0 = memory encryption is not active @@ -68,6 +74,7 @@ requirements for the system. If this bit is not set upon Linux startup then Linux itself will not set it and memory encryption will not be possible. The state of SME in the Linux kernel can be documented as follows: + - Supported: The CPU supports SME (determined through CPUID instruction). diff --git a/Documentation/x86/index.rst b/Documentation/x86/index.rst index b5cdc0d889b3..85f1f44cc8ac 100644 --- a/Documentation/x86/index.rst +++ b/Documentation/x86/index.rst @@ -20,3 +20,4 @@ x86-specific Documentation pat protection-keys intel_mpx + amd-memory-encryption -- 2.20.1