Skip to content

Commit 275d6d1

Browse files
tlendackysean-jc
authored andcommitted
KVM: SEV: Add known supported SEV-SNP policy bits
Add to the known supported SEV-SNP policy bits that don't require any implementation support from KVM in order to successfully use them. At this time, this includes: - CXL_ALLOW - MEM_AES_256_XTS - RAPL_DIS - CIPHERTEXT_HIDING_DRAM - PAGE_SWAP_DISABLE Arguably, RAPL_DIS and CIPHERTEXT_HIDING_DRAM require KVM and the CCP driver to enable these features in order for the setting of the policy bits to be successfully handled. But, a guest owner may not wish their guest to run on a system that doesn't provide support for those features, so allowing the specification of these bits accomplishes that. Whether or not the bit is supported by SEV firmware, a system that doesn't support these features will either fail during the KVM validation of supported policy bits before issuing the LAUNCH_START or fail during the LAUNCH_START. Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com> Link: https://patch.msgid.link/ec040de9864099cf592a97c201dc4cc110b2b0cf.1761593632.git.thomas.lendacky@amd.com Signed-off-by: Sean Christopherson <seanjc@google.com>
1 parent 7a61d61 commit 275d6d1

File tree

1 file changed

+16
-6
lines changed

1 file changed

+16
-6
lines changed

arch/x86/kvm/svm/sev.c

Lines changed: 16 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,22 @@ module_param_named(ciphertext_hiding_asids, nr_ciphertext_hiding_asids, uint, 04
6565
#define AP_RESET_HOLD_NAE_EVENT 1
6666
#define AP_RESET_HOLD_MSR_PROTO 2
6767

68-
#define KVM_SNP_POLICY_MASK_VALID (SNP_POLICY_MASK_API_MINOR | \
69-
SNP_POLICY_MASK_API_MAJOR | \
70-
SNP_POLICY_MASK_SMT | \
71-
SNP_POLICY_MASK_RSVD_MBO | \
72-
SNP_POLICY_MASK_DEBUG | \
73-
SNP_POLICY_MASK_SINGLE_SOCKET)
68+
/*
69+
* SEV-SNP policy bits that can be supported by KVM. These include policy bits
70+
* that have implementation support within KVM or policy bits that do not
71+
* require implementation support within KVM to enforce the policy.
72+
*/
73+
#define KVM_SNP_POLICY_MASK_VALID (SNP_POLICY_MASK_API_MINOR | \
74+
SNP_POLICY_MASK_API_MAJOR | \
75+
SNP_POLICY_MASK_SMT | \
76+
SNP_POLICY_MASK_RSVD_MBO | \
77+
SNP_POLICY_MASK_DEBUG | \
78+
SNP_POLICY_MASK_SINGLE_SOCKET | \
79+
SNP_POLICY_MASK_CXL_ALLOW | \
80+
SNP_POLICY_MASK_MEM_AES_256_XTS | \
81+
SNP_POLICY_MASK_RAPL_DIS | \
82+
SNP_POLICY_MASK_CIPHERTEXT_HIDING_DRAM | \
83+
SNP_POLICY_MASK_PAGE_SWAP_DISABLE)
7484

7585
static u64 snp_supported_policy_bits __ro_after_init;
7686

0 commit comments

Comments
 (0)