![]() ![]() When hardware encounters an RMPĬhecks failure, it raises a page-fault exception. Hypervisor do not require RMP checks because the data confidentiality isĪlready protected via memory encryption. In particular, the read accesses from the Not every memoryĪccess requires an RMP check. The RMP check is enforced as soon as SEV-SNP is enabled. ![]() Provides support to handle the following new NAE events: Used by the SEV-SNP guest to communicate with the hypervisor. ![]() ![]() The GHCB specification version 2 introduces new set of NAE's that is The KVMĭriver uses those APIs to create and managed the SEV-SNP guests. Specific commands defined in the SEV-SNP firmware specification. The CCP driver is enhanced to provide new APIs that use the SEV-SNP VMs, it does not cover all the security enhancement introduced by the SEV-SNP This series provides the basic building blocks to support booting the SEV-SNP This part of the Secure Encrypted Paging (SEV-SNP) series focuses on theĬhanges required in a host OS for SEV-SNP support. Marcorr, sathyanarayanan.kuppuswamy, Brijesh Singh Tobin Feldman-Fitzthum, Borislav Petkov, Michael Roth, Peter Zijlstra, Srinivas Pandruvada, David Rientjes, Dov Murik, Sean Christopherson, Vitaly Kuznetsov, Wanpeng Li, Jim Mattson,Īndy Lutomirski, Dave Hansen, Sergio Lopez, Peter Gonda, Peter Anvin, Ard Biesheuvel, Paolo Bonzini, To: x86, linux-kernel, kvm, linux-coco, linux-mm, linux-cryptoĬc: Thomas Gleixner, Ingo Molnar, Joerg Roedel, Tom Lendacky, ` (45 more replies) 0 siblings, 46 replies 213+ messages in threadįrom: Brijesh Singh 15:58 UTC ( / raw) 15:58 ` x86/cpufeatures: Add SEV-SNP CPU feature Brijesh Singh Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support archive mirror help / color / mirror / Atom feed * Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support 15:58 Brijesh Singh ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |