I have been trying to get AMD secure memory encryption to work on my HP EliteBook 845 G7 with Ryzen 7 PRO 4750U but I have found conflicting information on how it is enabled and I (probably) cannot get it to work.
I have mostly followed the kernel documentation: https://www.kernel.org/doc/html/latest/ ... ption.html
I have tried enabling and disabling AMD secure memory encryption in BIOS to see if there is any change but I have not found any.
In either case, I have AMD_MEM_ENCRYPT=y in kernel config. According to the kernel documentation, "If the BIOS merely enables SME (sets bit 23 of the MSR_AMD64_SYSCFG), then memory encryption can be enabled by supplying mem_encrypt=on on the kernel command line." - so I passed mem_encrypt=on to the kernel via grub. However, when the system boots, I can see this parameter is not recognised by the kernel:
Code: Select all
[ 0.054303] Unknown kernel command line parameters "BOOT_IMAGE=/vmlinuz-6.12.41-gr mem_encrypt=on", will be passed to user space.
Code: Select all
$ cpuid -1 -l 0x8000001f
CPU:
AMD Secure Encryption (0x8000001f):
SME: secure memory encryption support = true
SEV: secure encrypted virtualize support = true
VM page flush MSR support = true
SEV-ES: SEV encrypted state support = true
SEV-SNP: SEV secure nested paging = false
VMPL: VM permission levels = false
RMPQUERY instruction support = false
VMPL supervisor shadow stack support = false
Secure TSC supported = false
virtual TSC_AUX supported = false
hardware cache coher across enc domains = false
SEV guest exec only from 64-bit host = false
restricted injection = false
alternate injection = false
full debug state swap for SEV-ES/SEV-SNP = false
disallowing IBS use by host = false
VTE: SEV virtual transparent encryption = true
VMGEXIT parameter support = false
virtual TOM MSR support = false
IBS virtual support for SEV-ES/SEV-SNP = false
PMC virtual support for SEV-ES/SEV-SNP = false
RMPREAD instruction = false
guest intercept control support = false
segmented RMP support = false
VMSA register protection support = false
SMT protection support = false
secure AVIC support = false
allowed SEV features support = false
SVSM communication page MSR support = false
VIRT_RMPUPDATE & VIRT_PSMASH MSR support = false
write to hypervisor in-used allowed = false
IBPB on entry support = false
encryption bit position in PTE = 0x2f (47)
physical address space width reduction = 0x4 (4)
number of VM permission levels = 0x0 (0)
number of SEV-enabled guests supported = 0xe (14)
minimum SEV guest ASID = 0x1 (1)
# rdmsr -f 23:23 0xc0010010
0



