• Home
  • Raw
  • Download

Lines Matching full:vmsa

574 	struct sev_es_save_area *save = svm->sev_es.vmsa;  in sev_es_sync_vmsa()
576 /* Check some debug related fields before encrypting the VMSA */ in sev_es_sync_vmsa()
581 * SEV-ES will use a VMSA that is pointed to by the VMCB, not in sev_es_sync_vmsa()
582 * the traditional VMSA that is part of the VMCB. Copy the in sev_es_sync_vmsa()
583 * traditional VMSA as it has been built so far (in prep in sev_es_sync_vmsa()
618 pr_debug("Virtual Machine Save Area (VMSA):\n"); in sev_es_sync_vmsa()
627 struct sev_data_launch_update_vmsa vmsa; in __sev_launch_update_vmsa() local
636 /* Perform some pre-encryption checks against the VMSA */ in __sev_launch_update_vmsa()
643 * the VMSA memory content (i.e it will write the same memory region in __sev_launch_update_vmsa()
646 clflush_cache_range(svm->sev_es.vmsa, PAGE_SIZE); in __sev_launch_update_vmsa()
648 vmsa.reserved = 0; in __sev_launch_update_vmsa()
649 vmsa.handle = to_kvm_svm(kvm)->sev_info.handle; in __sev_launch_update_vmsa()
650 vmsa.address = __sme_pa(svm->sev_es.vmsa); in __sev_launch_update_vmsa()
651 vmsa.len = PAGE_SIZE; in __sev_launch_update_vmsa()
652 ret = sev_issue_cmd(kvm, SEV_CMD_LAUNCH_UPDATE_VMSA, &vmsa, error); in __sev_launch_update_vmsa()
1746 * Transfer VMSA and GHCB state to the destination. Nullify and in sev_migrate_from()
2364 sev_flush_encrypted_page(vcpu, svm->sev_es.vmsa); in sev_free_vcpu()
2366 __free_page(virt_to_page(svm->sev_es.vmsa)); in sev_free_vcpu()
3000 * An SEV-ES guest requires a VMSA area that is a separate from the in sev_es_init_vmcb()
3001 * VMCB page. Do not include the encryption mask on the VMSA physical in sev_es_init_vmcb()
3003 * the VMSA will be NULL if this vCPU is the destination for intrahost in sev_es_init_vmcb()
3006 if (svm->sev_es.vmsa) in sev_es_init_vmcb()
3007 svm->vmcb->control.vmsa_pa = __pa(svm->sev_es.vmsa); in sev_es_init_vmcb()