diff options
author | Kirill A. Shutemov <kirill.shutemov@linux.intel.com> | 2024-04-24 11:20:35 +0300 |
---|---|---|
committer | Dave Hansen <dave.hansen@linux.intel.com> | 2024-04-24 08:11:43 -0700 |
commit | a0a8d15a798be4b8f20aca2ba91bf6b688c6a640 (patch) | |
tree | 893e659e48f371c2950d8a6421bdf51d09ebfbcd /kernel | |
parent | b53c6bd5d271d023857174b8fd3e32f98ae51372 (diff) | |
download | linux-stable-a0a8d15a798be4b8f20aca2ba91bf6b688c6a640.tar.gz linux-stable-a0a8d15a798be4b8f20aca2ba91bf6b688c6a640.tar.bz2 linux-stable-a0a8d15a798be4b8f20aca2ba91bf6b688c6a640.zip |
x86/tdx: Preserve shared bit on mprotect()
The TDX guest platform takes one bit from the physical address to
indicate if the page is shared (accessible by VMM). This bit is not part
of the physical_mask and is not preserved during mprotect(). As a
result, the 'shared' bit is lost during mprotect() on shared mappings.
_COMMON_PAGE_CHG_MASK specifies which PTE bits need to be preserved
during modification. AMD includes 'sme_me_mask' in the define to
preserve the 'encrypt' bit.
To cover both Intel and AMD cases, include 'cc_mask' in
_COMMON_PAGE_CHG_MASK instead of 'sme_me_mask'.
Reported-and-tested-by: Chris Oo <cho@microsoft.com>
Fixes: 41394e33f3a0 ("x86/tdx: Extend the confidential computing API to support TDX guests")
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Reviewed-by: Rick Edgecombe <rick.p.edgecombe@intel.com>
Reviewed-by: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@linux.intel.com>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/all/20240424082035.4092071-1-kirill.shutemov%40linux.intel.com
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions