[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20180131091509.26531-1-kirill.shutemov@linux.intel.com>
Date: Wed, 31 Jan 2018 12:15:06 +0300
From: "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>
To: Ingo Molnar <mingo@...hat.com>, x86@...nel.org,
Thomas Gleixner <tglx@...utronix.de>,
"H. Peter Anvin" <hpa@...or.com>
Cc: Tom Lendacky <thomas.lendacky@....com>,
Dave Hansen <dave.hansen@...el.com>,
Kai Huang <kai.huang@...ux.intel.com>,
linux-kernel@...r.kernel.org,
"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>
Subject: [PATCH 0/3] Enumerate TME and PCONFIG
This patchset enumerates two features required for Multi-Key Total Memory
Encryption enabling[1].
Apart from trivial cpufeatures bits, the patchset enumerates how many bits
from physical address are claimed for encryption key ID. This may be
critical as we or guest VM must not use these bits for physical address.
Please review and consider applying.
[1] https://software.intel.com/sites/default/files/managed/a5/16/Multi-Key-Total-Memory-Encryption-Spec.pdf
Kirill A. Shutemov (3):
x86/cpufeatures: Add Intel Total Memory Encryption cpufeature
x86/tme: Detect if TME and MKTME is activated by BIOS
x86/cpufeatures: Add Intel PCONFIG cpufeature
arch/x86/include/asm/cpufeatures.h | 2 +
arch/x86/kernel/cpu/intel.c | 83 ++++++++++++++++++++++++++++++++++++++
2 files changed, 85 insertions(+)
--
2.15.1
Powered by blists - more mailing lists