On Fri, Mar 03, 2017 at 03:01:23PM -0600, Brijesh Singh wrote: > +merely enables SME (sets bit 23 of the MSR_K8_SYSCFG), then Linux can > activate > +memory encryption by default (CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=y) > or > +by supplying mem_encrypt=on on the kernel command line. However, if BIOS > does > +not enable SME, then Linux will not be able to activate memory encryption, > even > +if configured to do so by default or the mem_encrypt=on command line > parameter > +is specified. This looks like a wraparound... $ test-apply.sh /tmp/brijesh.singh.delta checking file Documentation/admin-guide/kernel-parameters.txt Hunk #1 succeeded at 2144 (offset -9 lines). checking file Documentation/x86/amd-memory-encryption.txt patch: **** malformed patch at line 23: DRAM from physical Yap. Looks like exchange or your mail client decided to do some patch editing on its own. Please send it to yourself first and try applying. -- Regards/Gruss, Boris. SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nürnberg) -- -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html