Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SEV-ES marked as SKIP for Snowy Owl (EPYC 3001) #203

Open
teodor-pripoae opened this issue Dec 5, 2024 · 0 comments
Open

SEV-ES marked as SKIP for Snowy Owl (EPYC 3001) #203

teodor-pripoae opened this issue Dec 5, 2024 · 0 comments

Comments

@teodor-pripoae
Copy link

I'm having an EPYC Embedded 3151 CPU which is Snowy Owl generation (3001). Sevctl marks SEV-ES as SKIP.

$ sudo sevctl ok
[ PASS ] - AMD CPU
[ PASS ]   - Microcode support
[ PASS ]   - Secure Memory Encryption (SME)
[ PASS ]   - Secure Encrypted Virtualization (SEV)
[ SKIP ]     - Encrypted State (SEV-ES)
[ SKIP ]     - Secure Nested Paging (SEV-SNP)
[ SKIP ]       - VM Permission Levels
[ SKIP ]         - Number of VMPLs
[ PASS ]     - Physical address bit reduction: 5
[ PASS ]     - C-bit location: 47
[ PASS ]     - Number of encrypted guests supported simultaneously: 15
[ PASS ]     - Minimum ASID value for SEV-enabled, SEV-ES disabled guest: 9
[ PASS ]     - SEV enabled in KVM: enabled
[ SKIP ]     - SEV-ES enabled in KVM
[ PASS ]     - Reading /dev/sev: /dev/sev readable
[ PASS ]     - Writing /dev/sev: /dev/sev writable
[ PASS ]   - Page flush MSR: ENABLED
[ PASS ] - KVM supported: API version: 12
[ PASS ] - Memlock resource limit: Soft: 8388608 | Hard: 8388608

SEV-ES is enabled in KVM.

$ cat /sys/module/kvm_amd/parameters/sev_es
Y

Inside a VM launched with policy 0x0005 it is enabled:

$ dmesg | grep SEV
[    0.308511] Memory Encryption Features active: AMD SEV SEV-ES
[    0.308511] SEV: Status: SEV SEV-ES 
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant