Lines Matching refs:SEV
2 Secure Encrypted Virtualization (SEV)
8 Secure Encrypted Virtualization (SEV) is a feature found on AMD processors.
10 SEV is an extension to the AMD-V architecture which supports running
15 The hypervisor can determine the SEV support through the CPUID
17 to SEV::
20 Bit[1] indicates support for SEV
25 If support for SEV is present, MSR 0xc001_0010 (MSR_K8_SYSCFG) and MSR 0xc001_0015
36 When SEV support is available, it can be enabled in a specific VM by
37 setting the SEV bit before executing VMRUN.::
40 Bit[1] 1 = SEV is enabled
41 0 = SEV is disabled
43 SEV hardware uses ASIDs to associate a memory encryption key with a VM.
44 Hence, the ASID for the SEV-enabled guests must be from 1 to a maximum value
47 SEV Key Management
50 The SEV guest key management is handled by a separate processor called the AMD
54 information, see the SEV Key Management spec [api-spec]_
56 The main ioctl to access SEV is KVM_MEMORY_ENCRYPT_OP. If the argument
57 to KVM_MEMORY_ENCRYPT_OP is NULL, the ioctl returns 0 if SEV is enabled
79 KVM implements the following commands to support common lifecycle events of SEV
85 The KVM_SEV_INIT command is used by the hypervisor to initialize the SEV platform
118 For more details, see SEV spec Section 6.2.
139 For more details, see SEV spec Section 6.3.
162 For more details on the measurement verification flow, see SEV spec Section 6.4.
176 SEV-enabled guest.
190 SEV guest state:
199 SEV_STATE_RECEIVING, /* guest is being migrated in from another SEV machine */
200 SEV_STATE_SENDING /* guest is getting migrated out to another SEV machine */