JIRA: https://issues.redhat.com/browse/RHEL-49791 During early boot phases, check for the presence of an SVSM when running as an SEV-SNP guest. An SVSM is present if not running at VMPL0 and the 64-bit value at offset 0x148 into the secrets page is non-zero. If an SVSM is present, save the SVSM Calling Area address (CAA), located at offset 0x150 into the secrets page, and set the VMPL level of the guest, which should be non-zero, to indicate the presence of an SVSM. [ bp: Touchups. ] Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com> Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de> Link: https://lore.kernel.org/r/9d3fe161be93d4ea60f43c2a3f2c311fe708b63b.1717600736.git.thomas.lendacky@amd.com (cherry picked from commit 878e70dbd26e234e6e6941dac3a233af6f632184) Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> RHEL: docs conflict |
||
---|---|---|
.. | ||
i386 | ||
x86_64 | ||
amd-memory-encryption.rst | ||
booting-dt.rst | ||
buslock.rst | ||
cpuinfo.rst | ||
earlyprintk.rst | ||
elf_auxvec.rst | ||
entry_64.rst | ||
exception-tables.rst | ||
features.rst | ||
ifs.rst | ||
index.rst | ||
intel-hfi.rst | ||
intel-iommu.rst | ||
intel_txt.rst | ||
kernel-stacks.rst | ||
mds.rst | ||
microcode.rst | ||
mtrr.rst | ||
orc-unwinder.rst | ||
pat.rst | ||
pti.rst | ||
sgx.rst | ||
sva.rst | ||
tdx.rst | ||
tlb.rst | ||
tsx_async_abort.rst | ||
usb-legacy-support.rst | ||
xstate.rst | ||
zero-page.rst |