diff options
author | Brijesh Singh <brijesh.singh@amd.com> | 2017-10-20 09:30:58 -0500 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2017-11-07 15:36:00 +0100 |
commit | 4716276184ec67a123a4eab81609a0688b1d650b (patch) | |
tree | 53dc65ef1398d44ad05e62f960bf995e59088d79 /arch/x86/entry/vdso/vma.c | |
parent | ac26963a1175c813e3ed21c0d2435b083173136e (diff) | |
download | linux-stable-4716276184ec67a123a4eab81609a0688b1d650b.tar.gz linux-stable-4716276184ec67a123a4eab81609a0688b1d650b.tar.bz2 linux-stable-4716276184ec67a123a4eab81609a0688b1d650b.zip |
X86/KVM: Decrypt shared per-cpu variables when SEV is active
When SEV is active, guest memory is encrypted with a guest-specific key, a
guest memory region shared with the hypervisor must be mapped as decrypted
before it can be shared.
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Borislav Petkov <bp@suse.de>
Tested-by: Borislav Petkov <bp@suse.de>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: kvm@vger.kernel.org
Cc: Radim Krčmář <rkrcmar@redhat.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Link: https://lkml.kernel.org/r/20171020143059.3291-17-brijesh.singh@amd.com
Diffstat (limited to 'arch/x86/entry/vdso/vma.c')
0 files changed, 0 insertions, 0 deletions