Centos-kernel-stream-9/Documentation/x86
Paolo Bonzini 974df88e9a x86/sev: Check for the presence of an SVSM in the SNP secrets page
JIRA: https://issues.redhat.com/browse/RHEL-49791

During early boot phases, check for the presence of an SVSM when running
as an SEV-SNP guest.

An SVSM is present if not running at VMPL0 and the 64-bit value at offset
0x148 into the secrets page is non-zero. If an SVSM is present, save the
SVSM Calling Area address (CAA), located at offset 0x150 into the secrets
page, and set the VMPL level of the guest, which should be non-zero, to
indicate the presence of an SVSM.

  [ bp: Touchups. ]

Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Link: https://lore.kernel.org/r/9d3fe161be93d4ea60f43c2a3f2c311fe708b63b.1717600736.git.thomas.lendacky@amd.com
(cherry picked from commit 878e70dbd26e234e6e6941dac3a233af6f632184)
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>

RHEL: docs conflict
2024-10-09 18:04:23 +02:00
..
i386
x86_64
amd-memory-encryption.rst x86/sev: Check for the presence of an SVSM in the SNP secrets page 2024-10-09 18:04:23 +02:00
booting-dt.rst
buslock.rst
cpuinfo.rst
earlyprintk.rst
elf_auxvec.rst
entry_64.rst
exception-tables.rst
features.rst
ifs.rst
index.rst
intel-hfi.rst
intel-iommu.rst
intel_txt.rst
kernel-stacks.rst
mds.rst x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key 2024-04-02 10:25:55 -04:00
microcode.rst
mtrr.rst
orc-unwinder.rst
pat.rst
pti.rst x86/bugs: Rename CONFIG_PAGE_TABLE_ISOLATION => CONFIG_MITIGATION_PAGE_TABLE_ISOLATION 2024-07-26 14:33:35 -04:00
sgx.rst
sva.rst
tdx.rst
tlb.rst
tsx_async_abort.rst
usb-legacy-support.rst
xstate.rst
zero-page.rst