Lines Matching full:vmsa
566 struct sev_es_save_area *save = svm->sev_es.vmsa; in sev_es_sync_vmsa()
568 /* Check some debug related fields before encrypting the VMSA */ in sev_es_sync_vmsa()
573 * SEV-ES will use a VMSA that is pointed to by the VMCB, not in sev_es_sync_vmsa()
574 * the traditional VMSA that is part of the VMCB. Copy the in sev_es_sync_vmsa()
575 * traditional VMSA as it has been built so far (in prep in sev_es_sync_vmsa()
607 pr_debug("Virtual Machine Save Area (VMSA):\n"); in sev_es_sync_vmsa()
616 struct sev_data_launch_update_vmsa vmsa; in __sev_launch_update_vmsa() local
620 /* Perform some pre-encryption checks against the VMSA */ in __sev_launch_update_vmsa()
627 * the VMSA memory content (i.e it will write the same memory region in __sev_launch_update_vmsa()
630 clflush_cache_range(svm->sev_es.vmsa, PAGE_SIZE); in __sev_launch_update_vmsa()
632 vmsa.reserved = 0; in __sev_launch_update_vmsa()
633 vmsa.handle = to_kvm_svm(kvm)->sev_info.handle; in __sev_launch_update_vmsa()
634 vmsa.address = __sme_pa(svm->sev_es.vmsa); in __sev_launch_update_vmsa()
635 vmsa.len = PAGE_SIZE; in __sev_launch_update_vmsa()
636 ret = sev_issue_cmd(kvm, SEV_CMD_LAUNCH_UPDATE_VMSA, &vmsa, error); in __sev_launch_update_vmsa()
1730 * Transfer VMSA and GHCB state to the destination. Nullify and in sev_migrate_from()
2340 sev_flush_encrypted_page(vcpu, svm->sev_es.vmsa); in sev_free_vcpu()
2342 __free_page(virt_to_page(svm->sev_es.vmsa)); in sev_free_vcpu()
2948 * An SEV-ES guest requires a VMSA area that is a separate from the in sev_es_init_vmcb()
2949 * VMCB page. Do not include the encryption mask on the VMSA physical in sev_es_init_vmcb()
2952 svm->vmcb->control.vmsa_pa = __pa(svm->sev_es.vmsa); in sev_es_init_vmcb()