Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2702860yba; Mon, 6 May 2019 10:12:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqxSXVqZrdc/pIqLC1XGWLTdCl57rKZIvcebShxQapZg1feRVazi2+3aj6+zQtQuWAcipQU4 X-Received: by 2002:a17:902:6ac2:: with SMTP id i2mr33479174plt.260.1557162762985; Mon, 06 May 2019 10:12:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557162762; cv=none; d=google.com; s=arc-20160816; b=tEw5/+rFMSYlDVX2N7U577kJhpsQQFqGIVyrRBu1VWEt9lbDJBiPQkys8A0O81INlo HYXhRX/TkUw8on5N431qdQyMNF6aLyCrBxBIEkevij8BaHJYsUG/q1dOaLzjwo89xGuc kiDicvt872BDA3ldcavkJZ4ygSQzQYc98x5BgTdX6lPFlzdQjr0cA+mYAVWyHDoxLUJS a2YMHU3D+XxPIZckSOD4jSnsytTdtkbm8r4SJnMPwOPd+U7x0qYEZFHN1vpMzmuEP6Yq GhCp1IIkCbWhcggNB94+juYoUdceV2An2eXFJos+1II1eIwZ+4IXO5IRJC8EUcCjgl5Y Y+Aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=NC8m/jDpU0Uzaq9jOe9QnHWhLNtfwXpLgED1uBMCHW4=; b=IgaUxhSfNqNy8rfhemp9DrKbSA/9abJve3MJwh73Py6+g3zcjeLFjYHEGcP4mjI9mr svxWnANi74ddTyG5lfImZJBd2yswwIv2dXomCBcv1po7S1WI5XHitD0AT3YqJedxDpSF oLk05f75zS8PqQY5Q00NPXX0NnmHse5frVeeMbJof6Vy1TczZJpzlRyqpEbMrCLMdlzi QKgZdDbUkb4tWcSxA/JzKR2hS1J4MUUCXXA9k/FNZoQo223xIu9sRJphysqVvWL+MgQA CzXnt9qRxaL9k2mhkD8gWXbU4g8sCAsn7eYXiDdjeR97d/gWldAV9ya3I1UWb7KiAVAL RCRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=cV13cYWU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g2si15716238plt.95.2019.05.06.10.12.27; Mon, 06 May 2019 10:12:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=cV13cYWU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727472AbfEFRLA (ORCPT + 99 others); Mon, 6 May 2019 13:11:00 -0400 Received: from mail-pg1-f193.google.com ([209.85.215.193]:46933 "EHLO mail-pg1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726576AbfEFRK7 (ORCPT ); Mon, 6 May 2019 13:10:59 -0400 Received: by mail-pg1-f193.google.com with SMTP id t187so2637629pgb.13; Mon, 06 May 2019 10:10:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=NC8m/jDpU0Uzaq9jOe9QnHWhLNtfwXpLgED1uBMCHW4=; b=cV13cYWUy3iY7w3QWmjVqCZ0wqwflzohqli4qJdrYAr/odBZuBSQudVyLnawz9ZJDM w0r5XSkY1cIuJjx3tw4xhR/j5LUSGUzO0xTIjjdWm9WlmpqZFpTLy0sbac4P7Xg5M02z +oGKM7jMnK1Y764mRtwYZCYZAkitWKUFtlTTOmu1C985taJSzve4vt/QJL75iYdJjolF LtsiL69jY6s+fTAxgfi5lyhRQGn9k8Nl5EiSHKvOEyMQSFT4Sy4e0wXsQHOxCv48/qFY j9jajwJYfUKllpbpXkn7XkNTpcGQWXSMjVDvePBxBhqXCTuRBdqh/Wx/xr24T1KnRsRA aUaw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=NC8m/jDpU0Uzaq9jOe9QnHWhLNtfwXpLgED1uBMCHW4=; b=ZqONdrkcSJH/3wQGoUff0iYF/WyUiDZ+BmnDqUMrGCTegQALRYPH+GyhQ095FND5CO 1aWqi0kBdmg7xMFXo58IPO4ccCphSIvuPtGwB8oee9RLwsFE8hVNl3U8Kr4Pg6sT111P vjAWOk0i/QmtbqAmvTUTKORAb3Tx0rN3ogNimg3kGgTsRIsqa8xHybNImkjK3wj36Ip8 NhK3ZkMg9XDDc2S2AyrU8n/DwzYd9RX6NJNWPitk+K/5lMUhfweIQxlrVWT4e+EJ603K qW+8Da5hzZHw1PNTfVqIAvnizJZk8tz6XmFcJ/ECOkwgeCopgNSfdt4rOy7AzOnROp5t zSgQ== X-Gm-Message-State: APjAAAUiPi2nWnFUH2sknJEmrWmIeYnBGjSCcpd9jWMI2l9uAbZneYq5 /3AKDe4mMD2kiX4FWCn0JLw= X-Received: by 2002:a63:d756:: with SMTP id w22mr5414127pgi.382.1557162658166; Mon, 06 May 2019 10:10:58 -0700 (PDT) Received: from localhost.localdomain ([104.238.181.70]) by smtp.gmail.com with ESMTPSA id h13sm11045680pgk.55.2019.05.06.10.10.52 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 06 May 2019 10:10:57 -0700 (PDT) From: Changbin Du To: corbet@lwn.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de Cc: x86@kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Changbin Du , Mauro Carvalho Chehab Subject: [PATCH v3 14/27] Documentation: x86: convert amd-memory-encryption.txt to reST Date: Tue, 7 May 2019 01:09:10 +0800 Message-Id: <20190506170923.7117-15-changbin.du@gmail.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190506170923.7117-1-changbin.du@gmail.com> References: <20190506170923.7117-1-changbin.du@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This converts the plain text documentation to reStructuredText format and add it to Sphinx TOC tree. No essential content change. Signed-off-by: Changbin Du Reviewed-by: Mauro Carvalho Chehab --- ...ory-encryption.txt => amd-memory-encryption.rst} | 13 ++++++++++--- Documentation/x86/index.rst | 1 + 2 files changed, 11 insertions(+), 3 deletions(-) rename Documentation/x86/{amd-memory-encryption.txt => amd-memory-encryption.rst} (94%) diff --git a/Documentation/x86/amd-memory-encryption.txt b/Documentation/x86/amd-memory-encryption.rst similarity index 94% rename from Documentation/x86/amd-memory-encryption.txt rename to Documentation/x86/amd-memory-encryption.rst index afc41f544dab..c48d452d0718 100644 --- a/Documentation/x86/amd-memory-encryption.txt +++ b/Documentation/x86/amd-memory-encryption.rst @@ -1,3 +1,9 @@ +.. SPDX-License-Identifier: GPL-2.0 + +===================== +AMD Memory Encryption +===================== + Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV) are features found on AMD processors. @@ -34,7 +40,7 @@ is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware forces the memory encryption bit to 1. Support for SME and SEV can be determined through the CPUID instruction. The -CPUID function 0x8000001f reports information related to SME: +CPUID function 0x8000001f reports information related to SME:: 0x8000001f[eax]: Bit[0] indicates support for SME @@ -48,14 +54,14 @@ CPUID function 0x8000001f reports information related to SME: addresses) If support for SME is present, MSR 0xc00100010 (MSR_K8_SYSCFG) can be used to -determine if SME is enabled and/or to enable memory encryption: +determine if SME is enabled and/or to enable memory encryption:: 0xc0010010: Bit[23] 0 = memory encryption features are disabled 1 = memory encryption features are enabled If SEV is supported, MSR 0xc0010131 (MSR_AMD64_SEV) can be used to determine if -SEV is active: +SEV is active:: 0xc0010131: Bit[0] 0 = memory encryption is not active @@ -68,6 +74,7 @@ requirements for the system. If this bit is not set upon Linux startup then Linux itself will not set it and memory encryption will not be possible. The state of SME in the Linux kernel can be documented as follows: + - Supported: The CPU supports SME (determined through CPUID instruction). diff --git a/Documentation/x86/index.rst b/Documentation/x86/index.rst index b5cdc0d889b3..85f1f44cc8ac 100644 --- a/Documentation/x86/index.rst +++ b/Documentation/x86/index.rst @@ -20,3 +20,4 @@ x86-specific Documentation pat protection-keys intel_mpx + amd-memory-encryption -- 2.20.1