Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

Documentation: x86: convert amd-memory-encryption.txt to reST

This converts the plain text documentation to reStructuredText format and
add it to Sphinx TOC tree. No essential content change.

Signed-off-by: Changbin Du <changbin.du@gmail.com>
Reviewed-by: Mauro Carvalho Chehab <mchehab+samsung@kernel.org>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>

authored by

Changbin Du and committed by
Jonathan Corbet
0c7180f2 f10b07a0

+11 -3
+10 -3
Documentation/x86/amd-memory-encryption.txt Documentation/x86/amd-memory-encryption.rst
··· 1 + .. SPDX-License-Identifier: GPL-2.0 2 + 3 + ===================== 4 + AMD Memory Encryption 5 + ===================== 6 + 1 7 Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV) are 2 8 features found on AMD processors. 3 9 ··· 40 34 forces the memory encryption bit to 1. 41 35 42 36 Support for SME and SEV can be determined through the CPUID instruction. The 43 - CPUID function 0x8000001f reports information related to SME: 37 + CPUID function 0x8000001f reports information related to SME:: 44 38 45 39 0x8000001f[eax]: 46 40 Bit[0] indicates support for SME ··· 54 48 addresses) 55 49 56 50 If support for SME is present, MSR 0xc00100010 (MSR_K8_SYSCFG) can be used to 57 - determine if SME is enabled and/or to enable memory encryption: 51 + determine if SME is enabled and/or to enable memory encryption:: 58 52 59 53 0xc0010010: 60 54 Bit[23] 0 = memory encryption features are disabled 61 55 1 = memory encryption features are enabled 62 56 63 57 If SEV is supported, MSR 0xc0010131 (MSR_AMD64_SEV) can be used to determine if 64 - SEV is active: 58 + SEV is active:: 65 59 66 60 0xc0010131: 67 61 Bit[0] 0 = memory encryption is not active ··· 74 68 Linux itself will not set it and memory encryption will not be possible. 75 69 76 70 The state of SME in the Linux kernel can be documented as follows: 71 + 77 72 - Supported: 78 73 The CPU supports SME (determined through CPUID instruction). 79 74
+1
Documentation/x86/index.rst
··· 20 20 pat 21 21 protection-keys 22 22 intel_mpx 23 + amd-memory-encryption