[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <161581359465.398.1247628750440397555.tip-bot2@tip-bot2>
Date: Mon, 15 Mar 2021 13:06:34 -0000
From: "tip-bot2 for Borislav Petkov" <tip-bot2@...utronix.de>
To: linux-tip-commits@...r.kernel.org
Cc: Borislav Petkov <bp@...e.de>, Feng Tang <feng.tang@...el.com>,
x86@...nel.org, linux-kernel@...r.kernel.org
Subject: [tip: x86/misc] tools/x86/kcpuid: Add AMD Secure Encryption leaf
The following commit has been merged into the x86/misc branch of tip:
Commit-ID: 2d4177c01b4e7496c7d47b31865f8c85bffb3604
Gitweb: https://git.kernel.org/tip/2d4177c01b4e7496c7d47b31865f8c85bffb3604
Author: Borislav Petkov <bp@...e.de>
AuthorDate: Sat, 13 Mar 2021 14:56:16 +01:00
Committer: Borislav Petkov <bp@...e.de>
CommitterDate: Mon, 15 Mar 2021 14:01:25 +01:00
tools/x86/kcpuid: Add AMD Secure Encryption leaf
Add the 0x8000001f leaf's fields.
Signed-off-by: Borislav Petkov <bp@...e.de>
Acked-by: Feng Tang <feng.tang@...el.com>
Link: https://lkml.kernel.org/r/20210313140118.17010-1-bp@alien8.de
---
tools/arch/x86/kcpuid/cpuid.csv | 10 ++++++++++
1 file changed, 10 insertions(+)
diff --git a/tools/arch/x86/kcpuid/cpuid.csv b/tools/arch/x86/kcpuid/cpuid.csv
index f4a5b85..dd94c07 100644
--- a/tools/arch/x86/kcpuid/cpuid.csv
+++ b/tools/arch/x86/kcpuid/cpuid.csv
@@ -378,3 +378,13 @@
0x80000008, 0, EAX, 7:0, phy_adr_bits, Physical Address Bits
0x80000008, 0, EAX, 15:8, lnr_adr_bits, Linear Address Bits
0x80000007, 0, EBX, 9, wbnoinvd, WBNOINVD
+
+# 8000001F: AMD Secure Encryption
+0x8000001F, 0, EAX, 0, sme, Secure Memory Encryption
+0x8000001F, 0, EAX, 1, sev, Secure Encrypted Virtualization
+0x8000001F, 0, EAX, 2, vmpgflush, VM Page Flush MSR
+0x8000001F, 0, EAX, 3, seves, SEV Encrypted State
+0x8000001F, 0, EBX, 5:0, c-bit, Page table bit number used to enable memory encryption
+0x8000001F, 0, EBX, 11:6, mem_encrypt_physaddr_width, Reduction of physical address space in bits with SME enabled
+0x8000001F, 0, ECX, 31:0, num_encrypted_guests, Maximum ASID value that may be used for an SEV-enabled guest
+0x8000001F, 0, EDX, 31:0, minimum_sev_asid, Minimum ASID value that must be used for an SEV-enabled, SEV-ES-disabled guest
Powered by blists - more mailing lists