KVM: SVM: Add support for the SEV-ES VMSA
Allocate a page during vCPU creation to be used as the encrypted VM save area (VMSA) for the SEV-ES guest. Provide a flag in the kvm_vcpu_arch structure that indicates whether the guest state is protected. When freeing a VMSA page that has been encrypted, the cache contents must be flushed using the MSR_AMD64_VM_PAGE_FLUSH before freeing the page. [ i386 build warnings ] Reported-by:kernel test robot <lkp@intel.com> Signed-off-by:
Tom Lendacky <thomas.lendacky@amd.com> Message-Id: <fde272b17eec804f3b9db18c131262fe074015c5.1607620209.git.thomas.lendacky@amd.com> Signed-off-by:
Paolo Bonzini <pbonzini@redhat.com>
parent
0f60bde1
No related branches found
No related tags found
Showing
- arch/x86/include/asm/kvm_host.h 3 additions, 0 deletionsarch/x86/include/asm/kvm_host.h
- arch/x86/kvm/svm/sev.c 67 additions, 0 deletionsarch/x86/kvm/svm/sev.c
- arch/x86/kvm/svm/svm.c 22 additions, 2 deletionsarch/x86/kvm/svm/svm.c
- arch/x86/kvm/svm/svm.h 5 additions, 0 deletionsarch/x86/kvm/svm/svm.h
Loading
Please register or sign in to comment