mirror of
https://github.com/Kicksecure/security-misc.git
synced 2026-01-04 22:25:32 -05:00
Provide option to enable AMD SEV-ES
This commit is contained in:
parent
725565c42e
commit
6a17255307
1 changed files with 2 additions and 0 deletions
|
|
@ -255,6 +255,7 @@ GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX erst_disable"
|
|||
## Enable AMD Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV).
|
||||
## SME encrypts memory with a single key at the kernel level to protect against cold boot attacks.
|
||||
## SEV extends SME to VMs by encrypting the memory of each with a unique key for guest isolation.
|
||||
## SEV-ES (Encrypted State) extends SEV by encrypting each guests virtual CPU register state during VM exits.
|
||||
## This is hardware-based encryption managed by the proprietary and closed-source AMD Platform Security Processor (PSP).
|
||||
## Both require a compatible AMD CPU and support for SME to first be enabled in the BIOS/UEFI.
|
||||
## Likely unavailable in consumer-grade AMD CPUs where Transparent SME (TSME) can be enabled in the BIOS/UEFI to achieve SME.
|
||||
|
|
@ -273,6 +274,7 @@ GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX erst_disable"
|
|||
##
|
||||
#GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX mem_encrypt=on"
|
||||
#GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm_amd.sev=1"
|
||||
#GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm_amd.sev_es=1"
|
||||
|
||||
## Prevent processes from writing to block devices that are mounted by filesystems.
|
||||
## Enhances system stability and security by protecting against runaway privileged processes.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue