All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] tools/x86/kcpuid: Add AMD Secure Encryption leaf
@ 2021-03-13 14:01 Borislav Petkov
  2021-03-14  0:35 ` Borislav Petkov
  2021-03-15 13:06 ` [tip: x86/misc] " tip-bot2 for Borislav Petkov
  0 siblings, 2 replies; 4+ messages in thread
From: Borislav Petkov @ 2021-03-13 14:01 UTC (permalink / raw)
  To: X86 ML; +Cc: Feng Tang, LKML

From: Borislav Petkov <bp@suse.de>

Add the 0x8000001f leaf's fields.

Signed-off-by: Borislav Petkov <bp@suse.de>
---
 tools/arch/x86/kcpuid/cpuid.csv | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/tools/arch/x86/kcpuid/cpuid.csv b/tools/arch/x86/kcpuid/cpuid.csv
index f4a5b85073f4..7cb5c2189345 100644
--- a/tools/arch/x86/kcpuid/cpuid.csv
+++ b/tools/arch/x86/kcpuid/cpuid.csv
@@ -378,3 +378,13 @@
 0x80000008,    0,  EAX,    7:0, phy_adr_bits, Physical Address Bits
 0x80000008,    0,  EAX,   15:8, lnr_adr_bits, Linear Address Bits
 0x80000007,    0,  EBX,      9, wbnoinvd, WBNOINVD
+
+# 8000001F: AMD Secure Encryption
+0x8000001F,	0, EAX, 0, SME,	Secure Memory Encryption
+0x8000001F,	0, EAX, 1, SEV,	Secure Encrypted Virtualization
+0x8000001F,	0, EAX, 2, VmPgFlush, VM Page Flush MSR
+0x8000001F,	0, EAX, 3, SevEs, SEV Encrypted State
+0x8000001F,	0, EBX, 5:0, C-Bit, Page table bit number used to enable memory encryption
+0x8000001F,	0, EBX, 11:6, MemEncryptPhysAddWidth, Reduction of physical address space in bits when SME is enabled
+0x8000001F,	0, ECX, 31:0, NumEncryptedGuests, Maximum ASID value that may be used for an SEV-enabled guest
+0x8000001F,	0, EDX, 31:0, MinimumSEVASID, Minimum ASID value that must be used for an SEV-enabled, SEV-ES-disabled guest
-- 
2.29.2


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH] tools/x86/kcpuid: Add AMD Secure Encryption leaf
  2021-03-13 14:01 [PATCH] tools/x86/kcpuid: Add AMD Secure Encryption leaf Borislav Petkov
@ 2021-03-14  0:35 ` Borislav Petkov
  2021-03-15  2:12   ` Feng Tang
  2021-03-15 13:06 ` [tip: x86/misc] " tip-bot2 for Borislav Petkov
  1 sibling, 1 reply; 4+ messages in thread
From: Borislav Petkov @ 2021-03-14  0:35 UTC (permalink / raw)
  To: X86 ML; +Cc: Feng Tang, LKML

On Sat, Mar 13, 2021 at 03:01:18PM +0100, Borislav Petkov wrote:
> From: Borislav Petkov <bp@suse.de>
> 
> Add the 0x8000001f leaf's fields.
> 
> Signed-off-by: Borislav Petkov <bp@suse.de>
> ---
>  tools/arch/x86/kcpuid/cpuid.csv | 10 ++++++++++
>  1 file changed, 10 insertions(+)
> 
> diff --git a/tools/arch/x86/kcpuid/cpuid.csv b/tools/arch/x86/kcpuid/cpuid.csv
> index f4a5b85073f4..7cb5c2189345 100644
> --- a/tools/arch/x86/kcpuid/cpuid.csv
> +++ b/tools/arch/x86/kcpuid/cpuid.csv
> @@ -378,3 +378,13 @@
>  0x80000008,    0,  EAX,    7:0, phy_adr_bits, Physical Address Bits
>  0x80000008,    0,  EAX,   15:8, lnr_adr_bits, Linear Address Bits
>  0x80000007,    0,  EBX,      9, wbnoinvd, WBNOINVD
> +
> +# 8000001F: AMD Secure Encryption
> +0x8000001F,	0, EAX, 0, SME,	Secure Memory Encryption
> +0x8000001F,	0, EAX, 1, SEV,	Secure Encrypted Virtualization
> +0x8000001F,	0, EAX, 2, VmPgFlush, VM Page Flush MSR
> +0x8000001F,	0, EAX, 3, SevEs, SEV Encrypted State
> +0x8000001F,	0, EBX, 5:0, C-Bit, Page table bit number used to enable memory encryption
> +0x8000001F,	0, EBX, 11:6, MemEncryptPhysAddWidth, Reduction of physical address space in bits when SME is enabled
> +0x8000001F,	0, ECX, 31:0, NumEncryptedGuests, Maximum ASID value that may be used for an SEV-enabled guest
> +0x8000001F,	0, EDX, 31:0, MinimumSEVASID, Minimum ASID value that must be used for an SEV-enabled, SEV-ES-disabled guest

Yeah, I guess we should keep the bit names in lowercase, for simplicity.

---
From: Borislav Petkov <bp@suse.de>
Date: Sat, 13 Mar 2021 14:56:16 +0100
Subject: [PATCH] tools/x86/kcpuid: Add AMD Secure Encryption leaf

Add the 0x8000001f leaf's fields.

Signed-off-by: Borislav Petkov <bp@suse.de>
---
 tools/arch/x86/kcpuid/cpuid.csv | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/tools/arch/x86/kcpuid/cpuid.csv b/tools/arch/x86/kcpuid/cpuid.csv
index f4a5b85073f4..dd94c07421a8 100644
--- a/tools/arch/x86/kcpuid/cpuid.csv
+++ b/tools/arch/x86/kcpuid/cpuid.csv
@@ -378,3 +378,13 @@
 0x80000008,    0,  EAX,    7:0, phy_adr_bits, Physical Address Bits
 0x80000008,    0,  EAX,   15:8, lnr_adr_bits, Linear Address Bits
 0x80000007,    0,  EBX,      9, wbnoinvd, WBNOINVD
+
+# 8000001F: AMD Secure Encryption
+0x8000001F,	0, EAX, 0, sme,	Secure Memory Encryption
+0x8000001F,	0, EAX, 1, sev,	Secure Encrypted Virtualization
+0x8000001F,	0, EAX, 2, vmpgflush, VM Page Flush MSR
+0x8000001F,	0, EAX, 3, seves, SEV Encrypted State
+0x8000001F,	0, EBX, 5:0, c-bit, Page table bit number used to enable memory encryption
+0x8000001F,	0, EBX, 11:6, mem_encrypt_physaddr_width, Reduction of physical address space in bits with SME enabled
+0x8000001F,	0, ECX, 31:0, num_encrypted_guests, Maximum ASID value that may be used for an SEV-enabled guest
+0x8000001F,	0, EDX, 31:0, minimum_sev_asid, Minimum ASID value that must be used for an SEV-enabled, SEV-ES-disabled guest
-- 
2.29.2

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH] tools/x86/kcpuid: Add AMD Secure Encryption leaf
  2021-03-14  0:35 ` Borislav Petkov
@ 2021-03-15  2:12   ` Feng Tang
  0 siblings, 0 replies; 4+ messages in thread
From: Feng Tang @ 2021-03-15  2:12 UTC (permalink / raw)
  To: Borislav Petkov; +Cc: X86 ML, LKML

On Sun, Mar 14, 2021 at 01:35:27AM +0100, Borislav Petkov wrote:
> On Sat, Mar 13, 2021 at 03:01:18PM +0100, Borislav Petkov wrote:
 
> Yeah, I guess we should keep the bit names in lowercase, for simplicity.
> 
> ---
> From: Borislav Petkov <bp@suse.de>
> Date: Sat, 13 Mar 2021 14:56:16 +0100
> Subject: [PATCH] tools/x86/kcpuid: Add AMD Secure Encryption leaf
> 
> Add the 0x8000001f leaf's fields.
> 
> Signed-off-by: Borislav Petkov <bp@suse.de>

Acked-by: Feng Tang <feng.tang@intel.com>

Thanks!

> ---
>  tools/arch/x86/kcpuid/cpuid.csv | 10 ++++++++++
>  1 file changed, 10 insertions(+)
> 
> diff --git a/tools/arch/x86/kcpuid/cpuid.csv b/tools/arch/x86/kcpuid/cpuid.csv
> index f4a5b85073f4..dd94c07421a8 100644
> --- a/tools/arch/x86/kcpuid/cpuid.csv
> +++ b/tools/arch/x86/kcpuid/cpuid.csv
> @@ -378,3 +378,13 @@
>  0x80000008,    0,  EAX,    7:0, phy_adr_bits, Physical Address Bits
>  0x80000008,    0,  EAX,   15:8, lnr_adr_bits, Linear Address Bits
>  0x80000007,    0,  EBX,      9, wbnoinvd, WBNOINVD
> +
> +# 8000001F: AMD Secure Encryption
> +0x8000001F,	0, EAX, 0, sme,	Secure Memory Encryption
> +0x8000001F,	0, EAX, 1, sev,	Secure Encrypted Virtualization
> +0x8000001F,	0, EAX, 2, vmpgflush, VM Page Flush MSR
> +0x8000001F,	0, EAX, 3, seves, SEV Encrypted State
> +0x8000001F,	0, EBX, 5:0, c-bit, Page table bit number used to enable memory encryption
> +0x8000001F,	0, EBX, 11:6, mem_encrypt_physaddr_width, Reduction of physical address space in bits with SME enabled
> +0x8000001F,	0, ECX, 31:0, num_encrypted_guests, Maximum ASID value that may be used for an SEV-enabled guest
> +0x8000001F,	0, EDX, 31:0, minimum_sev_asid, Minimum ASID value that must be used for an SEV-enabled, SEV-ES-disabled guest
> -- 
> 2.29.2
> 
> -- 
> Regards/Gruss,
>     Boris.
> 
> https://people.kernel.org/tglx/notes-about-netiquette

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [tip: x86/misc] tools/x86/kcpuid: Add AMD Secure Encryption leaf
  2021-03-13 14:01 [PATCH] tools/x86/kcpuid: Add AMD Secure Encryption leaf Borislav Petkov
  2021-03-14  0:35 ` Borislav Petkov
@ 2021-03-15 13:06 ` tip-bot2 for Borislav Petkov
  1 sibling, 0 replies; 4+ messages in thread
From: tip-bot2 for Borislav Petkov @ 2021-03-15 13:06 UTC (permalink / raw)
  To: linux-tip-commits; +Cc: Borislav Petkov, Feng Tang, x86, linux-kernel

The following commit has been merged into the x86/misc branch of tip:

Commit-ID:     2d4177c01b4e7496c7d47b31865f8c85bffb3604
Gitweb:        https://git.kernel.org/tip/2d4177c01b4e7496c7d47b31865f8c85bffb3604
Author:        Borislav Petkov <bp@suse.de>
AuthorDate:    Sat, 13 Mar 2021 14:56:16 +01:00
Committer:     Borislav Petkov <bp@suse.de>
CommitterDate: Mon, 15 Mar 2021 14:01:25 +01:00

tools/x86/kcpuid: Add AMD Secure Encryption leaf

Add the 0x8000001f leaf's fields.

Signed-off-by: Borislav Petkov <bp@suse.de>
Acked-by: Feng Tang <feng.tang@intel.com>
Link: https://lkml.kernel.org/r/20210313140118.17010-1-bp@alien8.de
---
 tools/arch/x86/kcpuid/cpuid.csv | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/tools/arch/x86/kcpuid/cpuid.csv b/tools/arch/x86/kcpuid/cpuid.csv
index f4a5b85..dd94c07 100644
--- a/tools/arch/x86/kcpuid/cpuid.csv
+++ b/tools/arch/x86/kcpuid/cpuid.csv
@@ -378,3 +378,13 @@
 0x80000008,    0,  EAX,    7:0, phy_adr_bits, Physical Address Bits
 0x80000008,    0,  EAX,   15:8, lnr_adr_bits, Linear Address Bits
 0x80000007,    0,  EBX,      9, wbnoinvd, WBNOINVD
+
+# 8000001F: AMD Secure Encryption
+0x8000001F,	0, EAX, 0, sme,	Secure Memory Encryption
+0x8000001F,	0, EAX, 1, sev,	Secure Encrypted Virtualization
+0x8000001F,	0, EAX, 2, vmpgflush, VM Page Flush MSR
+0x8000001F,	0, EAX, 3, seves, SEV Encrypted State
+0x8000001F,	0, EBX, 5:0, c-bit, Page table bit number used to enable memory encryption
+0x8000001F,	0, EBX, 11:6, mem_encrypt_physaddr_width, Reduction of physical address space in bits with SME enabled
+0x8000001F,	0, ECX, 31:0, num_encrypted_guests, Maximum ASID value that may be used for an SEV-enabled guest
+0x8000001F,	0, EDX, 31:0, minimum_sev_asid, Minimum ASID value that must be used for an SEV-enabled, SEV-ES-disabled guest

^ permalink raw reply related	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2021-03-15 13:07 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-03-13 14:01 [PATCH] tools/x86/kcpuid: Add AMD Secure Encryption leaf Borislav Petkov
2021-03-14  0:35 ` Borislav Petkov
2021-03-15  2:12   ` Feng Tang
2021-03-15 13:06 ` [tip: x86/misc] " tip-bot2 for Borislav Petkov

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.