summaryrefslogtreecommitdiffstats
path: root/arch/x86/entry/vdso/vma.c
diff options
context:
space:
mode:
authorBrijesh Singh <brijesh.singh@amd.com>2017-10-20 09:30:58 -0500
committerThomas Gleixner <tglx@linutronix.de>2017-11-07 15:36:00 +0100
commit4716276184ec67a123a4eab81609a0688b1d650b (patch)
tree53dc65ef1398d44ad05e62f960bf995e59088d79 /arch/x86/entry/vdso/vma.c
parentac26963a1175c813e3ed21c0d2435b083173136e (diff)
downloadlinux-stable-4716276184ec67a123a4eab81609a0688b1d650b.tar.gz
linux-stable-4716276184ec67a123a4eab81609a0688b1d650b.tar.bz2
linux-stable-4716276184ec67a123a4eab81609a0688b1d650b.zip
X86/KVM: Decrypt shared per-cpu variables when SEV is active
When SEV is active, guest memory is encrypted with a guest-specific key, a guest memory region shared with the hypervisor must be mapped as decrypted before it can be shared. Signed-off-by: Brijesh Singh <brijesh.singh@amd.com> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Borislav Petkov <bp@suse.de> Tested-by: Borislav Petkov <bp@suse.de> Cc: Tom Lendacky <thomas.lendacky@amd.com> Cc: kvm@vger.kernel.org Cc: Radim Krčmář <rkrcmar@redhat.com> Cc: Borislav Petkov <bp@alien8.de> Cc: Paolo Bonzini <pbonzini@redhat.com> Link: https://lkml.kernel.org/r/20171020143059.3291-17-brijesh.singh@amd.com
Diffstat (limited to 'arch/x86/entry/vdso/vma.c')
0 files changed, 0 insertions, 0 deletions