-
- Downloads
x86/sev: Check for the presence of an SVSM in the SNP secrets page
During early boot phases, check for the presence of an SVSM when running as an SEV-SNP guest. An SVSM is present if not running at VMPL0 and the 64-bit value at offset 0x148 into the secrets page is non-zero. If an SVSM is present, save the SVSM Calling Area address (CAA), located at offset 0x150 into the secrets page, and set the VMPL level of the guest, which should be non-zero, to indicate the presence of an SVSM. [ bp: Touchups. ] Signed-off-by:Tom Lendacky <thomas.lendacky@amd.com> Signed-off-by:
Borislav Petkov (AMD) <bp@alien8.de> Link: https://lore.kernel.org/r/9d3fe161be93d4ea60f43c2a3f2c311fe708b63b.1717600736.git.thomas.lendacky@amd.com
Showing
- Documentation/arch/x86/amd-memory-encryption.rst 28 additions, 1 deletionDocumentation/arch/x86/amd-memory-encryption.rst
- arch/x86/boot/compressed/sev.c 13 additions, 8 deletionsarch/x86/boot/compressed/sev.c
- arch/x86/include/asm/sev-common.h 4 additions, 0 deletionsarch/x86/include/asm/sev-common.h
- arch/x86/include/asm/sev.h 32 additions, 1 deletionarch/x86/include/asm/sev.h
- arch/x86/kernel/sev-shared.c 76 additions, 0 deletionsarch/x86/kernel/sev-shared.c
- arch/x86/kernel/sev.c 7 additions, 0 deletionsarch/x86/kernel/sev.c
Loading
Please register or sign in to comment