Lines Matching +full:inside +full:- +full:secure

1 .. SPDX-License-Identifier: GPL-2.0
4 Secure Encrypted Virtualization (SEV)
10 Secure Encrypted Virtualization (SEV) is a feature found on AMD processors.
12 SEV is an extension to the AMD-V architecture which supports running
46 Hence, the ASID for the SEV-enabled guests must be from 1 to a maximum value
57 of zero if SEV is enabled). If non-NULL, the argument to
74 are defined in ``<linux/psp-dev.h>``.
80 ----------------
91 Returns: 0 on success, -negative on error
127 ``debug_swap`` parameter of ``kvm-amd.ko``.
130 -----------------------
134 the owner's public Diffie-Hellman (PDH) key and session information.
138 Returns: 0 on success, -negative on error
160 -----------------------------
169 Returns: 0 on success, -negative on error
174 __u64 uaddr; /* userspace address to be encrypted (must be 16-byte aligned) */
175 __u32 len; /* length of the data to be encrypted (must be 16-byte aligned) */
181 -------------------------
195 Returns: 0 on success, -negative on error
207 ------------------------
212 Returns: 0 on success, -negative on error
215 -----------------------
218 SEV-enabled guest.
222 Returns: 0 on success, -negative on error
246 ----------------------
253 Returns: 0 on success, -negative on error
266 ----------------------
273 Returns: 0 on success, -negative on error
286 ------------------------
293 Returns: 0 on success, -negative on error
309 ----------------------------------
312 report containing the SHA-256 digest of the guest memory and VMSA passed through the KVM_SEV_LAUNCH
321 Returns: 0 on success, -negative on error
333 ----------------------
343 Returns: 0 on success, -negative on error
350 __u64 pdh_cert_uaddr; /* platform Diffie-Hellman certificate */
364 ----------------------------
376 Returns: 0 on success, -negative on error
392 ------------------------
397 Returns: 0 on success, -negative on error
400 ------------------------
406 Returns: 0 on success, -negative on error
409 -------------------------
413 provide a guest policy, the platform public Diffie-Hellman (PDH) key and session
418 Returns: 0 on success, -negative on error
438 -------------------------------
446 Returns: 0 on success, -negative on error
462 --------------------------
467 Returns: 0 on success, -negative on error
470 ----------------------------
473 context for the SEV-SNP guest. It must be called prior to issuing
478 Returns: 0 on success, -negative on error
490 See SNP_LAUNCH_START in the SEV-SNP specification [snp-fw-abi]_ for further
494 -----------------------------
496 The KVM_SEV_SNP_LAUNCH_UPDATE command is used for loading userspace-provided
514 range plus 1, and ``uaddr`` is the last byte of the userspace-provided source
520 Returns: 0 on success, < 0 on error, -EAGAIN if caller should retry
527 __u64 len; /* 4k-aligned length in bytes to copy into guest memory.*/
544 See the SEV-SNP spec [snp-fw-abi]_ for further details on how each page type is
548 -----------------------------
555 Returns: 0 on success, -negative on error
572 See SNP_LAUNCH_FINISH in the SEV-SNP specification [snp-fw-abi]_ for further
591 Secure Processor (AMD-SP). Firmware running inside the AMD-SP provides a secure
594 information, see the SEV Key Management spec [api-spec]_
596 The AMD-SP firmware can be initialized either by using its own non-volatile
600 override the file with PSP non-volatile storage.
606 See [white-paper]_, [api-spec]_, [amd-apm]_, [kvm-forum]_, and [snp-fw-abi]_
609 .. [white-paper] https://developer.amd.com/wordpress/media/2013/12/AMD_Memory_Encryption_Whitepaper…
610 .. [api-spec] https://support.amd.com/TechDocs/55766_SEV-KM_API_Specification.pdf
611 .. [amd-apm] https://support.amd.com/TechDocs/24593.pdf (section 15.34)
612 .. [kvm-forum] https://www.linux-kvm.org/images/7/74/02x08A-Thomas_Lendacky-AMDs_Virtualizatoin_Me…
613 .. [snp-fw-abi] https://www.amd.com/system/files/TechDocs/56860.pdf