Lines Matching +full:double +full:- +full:buffering
1 /* SPDX-License-Identifier: GPL-2.0 */
12 #include <linux/sev-guest.h>
15 #include <asm/sev-common.h>
73 u64 mask = (1ULL << bits) - 1; in lower_bits()
177 u8 payload[PAGE_SIZE - sizeof(struct snp_guest_msg_hdr)];
212 * The secrets page contains 96-bytes of reserved field that can be used by
263 * Avoid information leakage by double-buffering shared messages
285 u8 svsm_buffer[PAGE_SIZE - 8];
319 #define SVSM_PVALIDATE_MAX_COUNT ((sizeof_field(struct svsm_ca, svsm_buffer) - \
417 * RMPADJUST modifies the RMP permissions of a page of a lesser-
420 * If the guest is running at a higher-privilege than the privilege
511 return -ENOTTY; in snp_issue_svsm_attest_req()
522 static inline int snp_msg_init(struct snp_msg_desc *mdesc, int vmpck_id) { return -1; } in snp_msg_init()
526 struct snp_guest_request_ioctl *rio) { return -ENODEV; } in snp_send_guest_request()
545 static inline int snp_rmptable_init(void) { return -ENOSYS; } in snp_rmptable_init()
546 static inline int snp_lookup_rmpentry(u64 pfn, bool *assigned, int *level) { return -ENODEV; } in snp_lookup_rmpentry()
548 static inline int psmash(u64 pfn) { return -ENODEV; } in psmash()
552 return -ENODEV; in rmp_make_private()
554 static inline int rmp_make_shared(u64 pfn, enum pg_level level) { return -ENODEV; } in rmp_make_shared()