Lines Matching full:es
23 Secure Encrypted Virtualization - Encrypted State (SEV-ES) builds on the SEV
30 Launching (SEV and SEV-ES)
40 For a SEV-ES guest, the ``LAUNCH_UPDATE_VMSA`` command is also used to encrypt the
59 Setting the "SEV-ES required" policy bit (bit 2) will launch the guest as a
60 SEV-ES guest::
80 ``LAUNCH_UPDATE_VMSA`` encrypts all the vCPU VMSAs for a SEV-ES guest using the
85 for a SEV-ES guest, encrypted VMSAs. This measurement is a signature of the
86 memory contents and, for a SEV-ES guest, the VMSA contents, that can be sent
106 To launch a SEV-ES guest::
112 An SEV-ES guest has some restrictions as compared to a SEV guest. Because the
114 a SEV-ES guest:
158 * if SEV-ES is enabled (``policy & 0x4 != 0``), ``vmsas_blob`` is the
163 If kernel hashes are not used, or SEV-ES is disabled, use empty blobs for
266 * `Extending Secure Encrypted Virtualization With SEV-ES (2018)
267 …<https://www.linux-kvm.org/images/9/94/Extending-Secure-Encrypted-Virtualization-with-SEV-ES-Thoma…
274 * SEV-ES is section 15.35