From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756902AbcIGOX6 (ORCPT ); Wed, 7 Sep 2016 10:23:58 -0400 Received: from mail-sn1nam02on0062.outbound.protection.outlook.com ([104.47.36.62]:41632 "EHLO NAM02-SN1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751372AbcIGOXw (ORCPT ); Wed, 7 Sep 2016 10:23:52 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Thomas.Lendacky@amd.com; Subject: Re: [RFC PATCH v2 05/20] x86: Add the Secure Memory Encryption cpu feature To: Borislav Petkov References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> <20160822223622.29880.17779.stgit@tlendack-t1.amdoffice.net> <20160902140913.GA23808@nazgul.tnic> CC: , , , , , , , , , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Thomas Gleixner , Dmitry Vyukov From: Tom Lendacky Message-ID: Date: Wed, 7 Sep 2016 09:07:11 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: <20160902140913.GA23808@nazgul.tnic> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: YQXPR01CA0036.CANPRD01.PROD.OUTLOOK.COM (10.165.102.174) To BN6PR12MB1139.namprd12.prod.outlook.com (10.168.226.141) X-MS-Office365-Filtering-Correlation-Id: 3b8529dd-7255-41d1-9b21-08d3d728482f X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;2:cf8sU3lQq/3Gv3wGt8fvGnlESS4pzs14nP/9cShQSfruYKuh08qaURgiMAgewMYWdlQbkN2AXhypSBAG1WWjZS9QsbItzascFRv91Jd0Q6dXsJgsaR481JmwSxCggyREpi558RAbrCFokVtqyRiCJ5gnrsr/xWI0yhmI567aE8fIMKR3u536uJZ2ndK7X+qh;3:HZn3uAH+4Jwu2SoMqf6mTK5rLFkKOq1ISIfvhWHKQAJuByldOjx/zrgwq5GSt/f+1defq/320iddl7PlocFcQXGqxLruQZDh9Lj0Z9qrJxAbERldU1RV2qEWsxKDJxkZ X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN6PR12MB1139; X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;25: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 X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;31:QkJa1LmO6gHEqloM1DIZo7jXFrDvPJ1QCWvaOxr+9XPoqg5So+fbebT103YEN2JwiDxg6xY2kj/Tt9Ewq9/rWgA+i8PnTHZRdyQNQnJuCce1ei+Edql8ON8RSeCLCh5Y2tUPB9SQ602zI0Vm3u9ZodEvDWhki7R2z3bSRCG6KWKw9QEK9CLX4AdEIousreCaljU/9xCoFAMrOtVouhwIvYTmEyGApmPYFhiPKorUSp4=;20:qngvw0YNXLc7scqGe3Fw/y14rJTLCsgEmiZe+H6Qs12Z50cXoDOsFnc2P8wgUj04C6cJqKa3fkEbv1z+b5HdKRx8XN9hquo6B8POeB7MUFo7CR2+fOBBJeOFa1kpVuawtzWeZq6xHWvmx8UeXJZYJZSevW4BlzS4LMmU2TooOFzMyq6xHFvQoxtdB/JOdhDkSf55c7N0zByW2dyHp5eO35D81W7ySElMCl+MhXwj+0s0TDgRY32RXmBxZaFxyTWbi8FN/4t40sz2CbU/1gTRQfX+4+qOyhj+hlLLns3rnertMbLuvUHk+dxyPpzwy4ZGbRWXckje5qYWbBiV1xc9RuMjRmrxhepCauiMeppTkhgm44aXDeK8SPnIlaNkCgvAO9BY2ZDehqSlHgrHe9vUQ5jTLznem0zP9LmbptogNQ+6dZPau3rxuw+WPd5dbMu9Vj3Cg0wpdbhRdXqFZ1V0r0yM2A11I5+HBnvDn8HQB1/VzX1pGd111FTpKHX6wNBU X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110)(211171220733660); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040176)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026);SRVR:BN6PR12MB1139;BCL:0;PCL:0;RULEID:;SRVR:BN6PR12MB1139; X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;4:Jg28hfmqEWFKeJZOL+k9xNhLM+Vyc6L85cYiOygawarjhAbnQ/HvgeZe5hGw59MTJpfI9TXPhsfj/l2vto4Q1B3Am7RniDKmhI0crrJu1Fb75t5E33vskDDcWugneX2o9LFbl1qst1X2zlwOqZtZU5JvZyqP0ycVWKgsbBBM/60h/RAD4YsahLNRWna5bJhF5D3Fr46vNXy7UAIj6ead5qs6BkiQRoekzqkYWVs0LnZWkNovmuFeiHYu+RPW3MuEKQFiIg1icnkAxfhptK0bV3DPUldTtMNT/rJ//3h0XoYtXDjq8Psit2DaZgzxXhTaWx4ohVnsWxXfNPZ8eT5/SW9DRTmWU8anH4a0/PXTC3eiUZILTDtUY8VuYu21hADZsL1L0zopVZJ0QlfAbAdCBctoWR5Bv5JNT/+Q7k0DbGDlUzkcKFeA+3rlE3Ikls3bhxkfHe6pwwjjE5p3dr729nz02Hu2JITiVrLhlONOG0Y= X-Forefront-PRVS: 0058ABBBC7 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6009001)(6049001)(7916002)(24454002)(377424004)(377454003)(189002)(199003)(68736007)(106356001)(7846002)(33646002)(7416002)(65826007)(5660300001)(23676002)(83506001)(101416001)(31686004)(81156014)(42186005)(4001350100001)(81166006)(7736002)(305945005)(4326007)(77096005)(31696002)(2906002)(76176999)(50986999)(3846002)(19580395003)(54356999)(19580405001)(36756003)(6116002)(586003)(110136002)(50466002)(189998001)(230700001)(65956001)(105586002)(47776003)(64126003)(92566002)(2950100001)(97736004)(8676002)(66066001)(65806001)(86362001)(217873001);DIR:OUT;SFP:1101;SCL:1;SRVR:BN6PR12MB1139;H:[10.236.18.82];FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjZQUjEyTUIxMTM5OzIzOkdLU09wWWJNdG5NV1IweU53Skh6TmRNWTFh?= =?utf-8?B?cHc3amV1clZweGNKSVp1M2ZSSFZpQXA0V0w0b1hrYStpWDQyek5jbVc0RnVB?= =?utf-8?B?UlE4YVY3aCtxdW8yUEV4c3ZyQm9RMTJGaWwzb3htNzIzWlRCNm8rQ1lnVERl?= =?utf-8?B?RUZZVS9xdFpRYVpWaThaRmJBK0xYSnRRSUhnOWRvcVVFS0RTSG84SkxqN3RM?= =?utf-8?B?bEJLRlhlVXh4eUV1aWJnRzBjWmZjUWlVR01OcFpwaVBhZVN0ekZEZmhyc3ZL?= =?utf-8?B?azFLQmdObHJwOFVtbTcrRWU3VVVmZEF4T0VFaEdySDRUdXVwTjdzNVdRQ1px?= =?utf-8?B?SlpmUzNhQWlpd29IVlJuR3prb24wKzc2bkVkREw0TmhDOGdlb2tWRDlHbVNj?= =?utf-8?B?VkdvbEdiNzBPNkdzNkhLM2RqOHlqSXFZMTZQN2hnaGp4M0xOTzdIYjR6ek9K?= =?utf-8?B?bjJkVmFJNHdZa3VvT0ZBVXFteGd1T0hieHU2bEN5bXlSbmFEZEovOGV4MmZz?= =?utf-8?B?dFZDV0t0dS80V1R5b3ZjTDk0c29iSjljOGM5azJGUUNETEV1TGM1dTlGQnJO?= =?utf-8?B?elNTWDZObFA1cGxyc2poTnBuUUJ0bkJkNHpEWTY2TVpyWVFDdFh3MVlmelR1?= =?utf-8?B?OEtwaTBHenVBekZMY0ZRVFlFaTJkaUh6UW5HT2VaNCtKRUsrYk84K2N0ZzV2?= =?utf-8?B?YzZTT21TeHl3dlovNEJKbmZLRWx0Q1BlVUtiMm1IMklRMklNemNud1IxaUJL?= =?utf-8?B?SWdWRmliM0o0Wmo0cS95MEhJV2s5QjhCUWk3OUY2TkxEMGFidTZPVEtncGI5?= =?utf-8?B?WWhKRGNFVDhqRWZBV3RWMEJhbE9zZzRnSHhPUUt5RUQ2WWdLK2ZlemhWZDNS?= =?utf-8?B?U0NYOFpIVW0vVXVDYk1mZzN2UFViTWcvOXo0TUhUQ0QwZ2lQV2VWQmx4d3o4?= =?utf-8?B?Z2d5dEpIK3RlSUxMQXoyaDhJeDBoaDdMSVR3VGpLMEhJWk81R25iTDdtQ1Aw?= =?utf-8?B?QjlUVDcwZjlTckVvNkNsUGhxR01SN2RXbXN0a1BSLzNMZjUvbmlDWlhnMjda?= =?utf-8?B?WGdKYlNmbW50ZWxEeW8ydDB0NTNadU5qdGphVG5oNE8wdllVZWdEUU5OdHk2?= =?utf-8?B?TnJNNGYvMEVySG9CL083bWI2Ym5vQ29ZUThCMEpBcUo1NkNUVVJMcnh3STVk?= =?utf-8?B?UUdIMHhaN3EwOTB0Q0hRL3ZSQVFFUjNtZGljajdVRExvR3o5bWs2V1hUT2ZJ?= =?utf-8?B?TzJKWTk2L1J4WjROSFFWM0Q3dmFQZFY3S0pMWG95cjRoOS91UHpwcW4yM3lm?= =?utf-8?B?WEVCdzk0L0cycjQ1Yi9yNFBJN0JuRjN4VFB3R29obC9WejBnOWpxNnNFRFU5?= =?utf-8?B?aEY1RDIwdkVLTW5ROG5vN2tqM2ZrVVNUd0VtZlRNUTdra0RjZkp0eCtpRGFI?= =?utf-8?B?UStNRkN5WFdaaU52OUwza2traEt1N3hHcEhvbE1BVFVOL0xEVnVsbElkN1hE?= =?utf-8?B?alRCQi96b3RtdlRobXE2L0YzbzkzTlNiVDlZS0hLRnYrcGxjSW1HOGFtaEhS?= =?utf-8?B?SFAwTnVqZVZ6WmJ1d3dwbXIzY0NGT1hpYmI1Q3FockJEeUsrUkJINEU3Y1k2?= =?utf-8?B?YXdsY0Q3cjVZb0hBQVJLanJrWEZDN1d6NWxWN1BZNG1Fd1VGSUpEUjdxVUJD?= =?utf-8?B?TGhmOHlnalpwVmNLNUZvUk8zdUdzODZMeHRqczhLdTdWeWZaUEdUcDFSNHE5?= =?utf-8?B?djlWbUdGeGZPMGR1ei85eEY1SCsvMTdZdDFiWjhIWlB3SzJhVFQ2TGU3RzJW?= =?utf-8?B?WGlmb1BYcVBQdS9YVHRzNDVXdkNxd2UrdE5KWnRWZkFWRXc9PQ==?= X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;6:UgycBJgszHttUzu13PPaRUgKm+H7mdr3wbaK/NR6VrAvPrOmiM9xc2QPdThkr9ebhY6O//UzVrBa6KncbBl++kH6kmwoDFR0ODaD1KZBQa2VQQAxHnzfkMdOBudcOYSLibVaULaS8UhPqumscufWpngoRR2dRnhoPn6kDisc4+wpoUo1oz3G4wvStQ/wKDUUOaEuFkF1WujVYsTjxsWhMRkGFBbLS5iN12gB2uQWBY8eWyLcE4jBNVSU+S7cSAkjJtKzpUmh55Y7JH5eoKOf1Vu6F44M4DdTM3318xgrOkwWOYM6yj3f7IPXjo55bRPERf9z3Q7Pfh9thSw1hoQkMQ==;5:4/PMGyJxzz9y4zvpLctes5Y4XZJGlD8hOnP2Rr2Kd7yu/rMWC+jFvvwoiyuN9G6dR+enN6ekNLHgdEvOdtrvyxsTiqWM+NIH+N7cjT90tGVlhYrQ8tTgzMdOQcUVQh0U9ssFNn93DIt1ajt3UwGbAg==;24:/Jw3Siyedah0gbgxl7w2/qO+r6DBSABHq6DCrsCVGtyqlIEnX91mQ3mzZc6R0u5xQ4xXwb4o8pi9rdxVzs3fn1azcc2VZjmDBF8LZOgsGM8=;7:WUFv5FJP/xAou9uA3xcVMFKeFywvDH+CQmmbb37uw2gJXsYAdonpeu9Yon5oDMREL9qvVZfAOIF2BsNtnyHqO4TAp7WYDXbuYYdkZfNWPYrvcuxtuKUI1/oTSuho1OqfqHpBSG2Q5CKb6f2iYrOIM7VcEqlRxAhppkSKCCQVHHDV/fK8wrff0iazamcwjnrKE9zg9TMZx37+i+Cxt97RopleoU9di70M3laT+dT5RM7AJ2cv3jZ7UmYM9yZXl4VG SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1139;20:T86mNDHDWzWqdXjCGHTeg/3H9RxS1GP1N7LbcnQ6TC5LaIA972caWYT5+TtKkNC/Ilw2dsst8rtSUeSdJiKh3wZSDN/8Nu/Suz4UKNDWMd1zLErLWmUoTefBQCoENPhNvpS7PwQOOabUxdv8pr9TUwWLGLC3s2nyNv6PVW25Rn/nx8qumMQkaaK/pmapiUVYKVmbZ1o4kxMUbXp04vTXnZTo91KeBUz4CD0FuyC7VdQR7UVScIBiyrMM7BDKlZcJ X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Sep 2016 14:07:17.3283 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1139 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/02/2016 09:09 AM, Borislav Petkov wrote: > On Mon, Aug 22, 2016 at 05:36:22PM -0500, Tom Lendacky wrote: >> Update the cpu features to include identifying and reporting on the >> Secure Memory Encryption feature. >> >> Signed-off-by: Tom Lendacky >> --- >> arch/x86/include/asm/cpufeature.h | 7 +++++-- >> arch/x86/include/asm/cpufeatures.h | 5 ++++- >> arch/x86/include/asm/disabled-features.h | 3 ++- >> arch/x86/include/asm/required-features.h | 3 ++- >> arch/x86/kernel/cpu/scattered.c | 1 + >> 5 files changed, 14 insertions(+), 5 deletions(-) > > ... > >> diff --git a/arch/x86/kernel/cpu/scattered.c b/arch/x86/kernel/cpu/scattered.c >> index 8cb57df..d86d9a5 100644 >> --- a/arch/x86/kernel/cpu/scattered.c >> +++ b/arch/x86/kernel/cpu/scattered.c >> @@ -37,6 +37,7 @@ void init_scattered_cpuid_features(struct cpuinfo_x86 *c) >> { X86_FEATURE_HW_PSTATE, CR_EDX, 7, 0x80000007, 0 }, >> { X86_FEATURE_CPB, CR_EDX, 9, 0x80000007, 0 }, >> { X86_FEATURE_PROC_FEEDBACK, CR_EDX,11, 0x80000007, 0 }, >> + { X86_FEATURE_SME, CR_EAX, 0, 0x8000001f, 0 }, > > If this is in scattered CPUID features, it doesn't need any of the > (snipped) changes above - you solely need to reuse one of the free > defines, i.e., something like this: Ok, that's much easier. I'll do that. Thanks, Tom > > --- > --- a/arch/x86/include/asm/cpufeatures.h 2016-09-02 15:49:08.853374323 +0200 > +++ b/arch/x86/include/asm/cpufeatures.h 2016-09-02 15:52:34.477365610 +0200 > @@ -100,7 +100,7 @@ > #define X86_FEATURE_XTOPOLOGY ( 3*32+22) /* cpu topology enum extensions */ > #define X86_FEATURE_TSC_RELIABLE ( 3*32+23) /* TSC is known to be reliable */ > #define X86_FEATURE_NONSTOP_TSC ( 3*32+24) /* TSC does not stop in C states */ > -/* free, was #define X86_FEATURE_CLFLUSH_MONITOR ( 3*32+25) * "" clflush reqd with monitor */ > +#define X86_FEATURE_SME ( 3*32+25) /* Secure Memory Encryption */ > #define X86_FEATURE_EXTD_APICID ( 3*32+26) /* has extended APICID (8 bits) */ > #define X86_FEATURE_AMD_DCM ( 3*32+27) /* multi-node processor */ > #define X86_FEATURE_APERFMPERF ( 3*32+28) /* APERFMPERF */ > --- a/arch/x86/kernel/cpu/scattered.c 2016-09-02 15:48:52.753375005 +0200 > +++ b/arch/x86/kernel/cpu/scattered.c 2016-09-02 15:51:32.437368239 +0200 > @@ -37,6 +37,7 @@ void init_scattered_cpuid_features(struc > { X86_FEATURE_HW_PSTATE, CR_EDX, 7, 0x80000007, 0 }, > { X86_FEATURE_CPB, CR_EDX, 9, 0x80000007, 0 }, > { X86_FEATURE_PROC_FEEDBACK, CR_EDX,11, 0x80000007, 0 }, > + { X86_FEATURE_SME, CR_EAX, 0, 0x8000001f, 0 }, > { 0, 0, 0, 0, 0 } > }; > From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Lendacky Subject: Re: [RFC PATCH v2 05/20] x86: Add the Secure Memory Encryption cpu feature Date: Wed, 7 Sep 2016 09:07:11 -0500 Message-ID: References: <20160822223529.29880.50884.stgit@tlendack-t1.amdoffice.net> <20160822223622.29880.17779.stgit@tlendack-t1.amdoffice.net> <20160902140913.GA23808@nazgul.tnic> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20160902140913.GA23808@nazgul.tnic> Sender: owner-linux-mm@kvack.org To: Borislav Petkov Cc: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org, =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , Andy Lutomirski , "H. Peter Anvin" , Paolo Bonzini , Alexander Potapenko , Thomas Gleixner , Dmitry Vyukov List-Id: linux-efi@vger.kernel.org On 09/02/2016 09:09 AM, Borislav Petkov wrote: > On Mon, Aug 22, 2016 at 05:36:22PM -0500, Tom Lendacky wrote: >> Update the cpu features to include identifying and reporting on the >> Secure Memory Encryption feature. >> >> Signed-off-by: Tom Lendacky >> --- >> arch/x86/include/asm/cpufeature.h | 7 +++++-- >> arch/x86/include/asm/cpufeatures.h | 5 ++++- >> arch/x86/include/asm/disabled-features.h | 3 ++- >> arch/x86/include/asm/required-features.h | 3 ++- >> arch/x86/kernel/cpu/scattered.c | 1 + >> 5 files changed, 14 insertions(+), 5 deletions(-) > > ... > >> diff --git a/arch/x86/kernel/cpu/scattered.c b/arch/x86/kernel/cpu/scattered.c >> index 8cb57df..d86d9a5 100644 >> --- a/arch/x86/kernel/cpu/scattered.c >> +++ b/arch/x86/kernel/cpu/scattered.c >> @@ -37,6 +37,7 @@ void init_scattered_cpuid_features(struct cpuinfo_x86 *c) >> { X86_FEATURE_HW_PSTATE, CR_EDX, 7, 0x80000007, 0 }, >> { X86_FEATURE_CPB, CR_EDX, 9, 0x80000007, 0 }, >> { X86_FEATURE_PROC_FEEDBACK, CR_EDX,11, 0x80000007, 0 }, >> + { X86_FEATURE_SME, CR_EAX, 0, 0x8000001f, 0 }, > > If this is in scattered CPUID features, it doesn't need any of the > (snipped) changes above - you solely need to reuse one of the free > defines, i.e., something like this: Ok, that's much easier. I'll do that. Thanks, Tom > > --- > --- a/arch/x86/include/asm/cpufeatures.h 2016-09-02 15:49:08.853374323 +0200 > +++ b/arch/x86/include/asm/cpufeatures.h 2016-09-02 15:52:34.477365610 +0200 > @@ -100,7 +100,7 @@ > #define X86_FEATURE_XTOPOLOGY ( 3*32+22) /* cpu topology enum extensions */ > #define X86_FEATURE_TSC_RELIABLE ( 3*32+23) /* TSC is known to be reliable */ > #define X86_FEATURE_NONSTOP_TSC ( 3*32+24) /* TSC does not stop in C states */ > -/* free, was #define X86_FEATURE_CLFLUSH_MONITOR ( 3*32+25) * "" clflush reqd with monitor */ > +#define X86_FEATURE_SME ( 3*32+25) /* Secure Memory Encryption */ > #define X86_FEATURE_EXTD_APICID ( 3*32+26) /* has extended APICID (8 bits) */ > #define X86_FEATURE_AMD_DCM ( 3*32+27) /* multi-node processor */ > #define X86_FEATURE_APERFMPERF ( 3*32+28) /* APERFMPERF */ > --- a/arch/x86/kernel/cpu/scattered.c 2016-09-02 15:48:52.753375005 +0200 > +++ b/arch/x86/kernel/cpu/scattered.c 2016-09-02 15:51:32.437368239 +0200 > @@ -37,6 +37,7 @@ void init_scattered_cpuid_features(struc > { X86_FEATURE_HW_PSTATE, CR_EDX, 7, 0x80000007, 0 }, > { X86_FEATURE_CPB, CR_EDX, 9, 0x80000007, 0 }, > { X86_FEATURE_PROC_FEEDBACK, CR_EDX,11, 0x80000007, 0 }, > + { X86_FEATURE_SME, CR_EAX, 0, 0x8000001f, 0 }, > { 0, 0, 0, 0, 0 } > }; > -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org