lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 30 Apr 2020 08:46:26 +0000 From: Ashish Kalra <Ashish.Kalra@....com> To: pbonzini@...hat.com Cc: tglx@...utronix.de, mingo@...hat.com, hpa@...or.com, joro@...tes.org, bp@...e.de, thomas.lendacky@....com, x86@...nel.org, kvm@...r.kernel.org, linux-kernel@...r.kernel.org, srutherford@...gle.com, rientjes@...gle.com, venu.busireddy@...cle.com, brijesh.singh@....com Subject: [PATCH v7 15/18] EFI: Introduce the new AMD Memory Encryption GUID. From: Ashish Kalra <ashish.kalra@....com> Introduce a new AMD Memory Encryption GUID which is currently used for defining a new UEFI enviroment variable which indicates UEFI/OVMF support for the SEV live migration feature. This variable is setup when UEFI/OVMF detects host/hypervisor support for SEV live migration and later this variable is read by the kernel using EFI runtime services to verify if OVMF supports the live migration feature. Signed-off-by: Ashish Kalra <ashish.kalra@....com> --- include/linux/efi.h | 1 + 1 file changed, 1 insertion(+) diff --git a/include/linux/efi.h b/include/linux/efi.h index 251f1f783cdf..2efb42ccf3a8 100644 --- a/include/linux/efi.h +++ b/include/linux/efi.h @@ -358,6 +358,7 @@ void efi_native_runtime_setup(void); /* OEM GUIDs */ #define DELLEMC_EFI_RCI2_TABLE_GUID EFI_GUID(0x2d9f28a2, 0xa886, 0x456a, 0x97, 0xa8, 0xf1, 0x1e, 0xf2, 0x4f, 0xf4, 0x55) +#define MEM_ENCRYPT_GUID EFI_GUID(0x0cf29b71, 0x9e51, 0x433a, 0xa3, 0xb7, 0x81, 0xf3, 0xab, 0x16, 0xb8, 0x75) typedef struct { efi_guid_t guid; -- 2.17.1
Powered by blists - more mailing lists