Lines Matching +full:read +full:- +full:to +full:- +full:read
2 * AMD SEV support in kvm-unit-tests
9 * SPDX-License-Identifier: LGPL-2.0-or-later
59 * Extract C-Bit position from ebx[5:0] in setup_amd_sev()
61 * - Section " Function 8000_001Fh - Encrypted Memory Capabilities" in setup_amd_sev()
82 /* Test if SEV-ES is enabled */ in amd_sev_es_enabled()
102 * Copy UEFI's #VC IDT entry, so KVM-Unit-Tests can reuse it and does in setup_amd_sev_es()
103 * not have to re-implement a #VC handler. Also update the #VC IDT code in setup_amd_sev_es()
104 * segment to use KVM-Unit-Tests segments, KERNEL_CS, so that we do not in setup_amd_sev_es()
105 * have to copy the UEFI GDT entries into KVM-Unit-Tests GDT. in setup_amd_sev_es()
107 * TODO: Reusing UEFI #VC handler is a temporary workaround to simplify in setup_amd_sev_es()
108 * the boot up process, the long-term solution is to implement a #VC in setup_amd_sev_es()
109 * handler in kvm-unit-tests and load it, so that kvm-unit-tests does in setup_amd_sev_es()
124 * SEV-ES guest uses GHCB page to communicate with the host. This page in setup_ghcb_pte()
125 * must be unencrypted, i.e. its c-bit should be unset. To do so, this in setup_ghcb_pte()
127 * found, and unsets the c-bit of GHCB's L1 pte. in setup_ghcb_pte()
132 /* Read the current GHCB page addr */ in setup_ghcb_pte()
141 ghcb_base_addr = ghcb_addr & ~(LARGE_PAGE_SIZE - 1); in setup_ghcb_pte()
153 /* Unset c-bit in Level 1 GHCB pte */ in setup_ghcb_pte()
169 return amd_sev_c_bit_pos - 1; in get_amd_sev_addr_upperbound()