summaryrefslogtreecommitdiffstats
path: root/arch/x86/boot/mkcpustr.c
diff options
context:
space:
mode:
authorSean Christopherson <seanjc@google.com>2021-04-21 19:11:13 -0700
committerPaolo Bonzini <pbonzini@redhat.com>2021-04-26 05:27:14 -0400
commitfa13680f5668cff05302a2f4753c49334a83a064 (patch)
tree094187e6be72a137ca5c1c3b3b4daa3de55afc72 /arch/x86/boot/mkcpustr.c
parentf31b88b35f90f6b7ae4abc1015494a285f459221 (diff)
downloadlinux-fa13680f5668cff05302a2f4753c49334a83a064.tar.gz
linux-fa13680f5668cff05302a2f4753c49334a83a064.tar.bz2
linux-fa13680f5668cff05302a2f4753c49334a83a064.zip
KVM: SVM: Disable SEV/SEV-ES if NPT is disabled
Disable SEV and SEV-ES if NPT is disabled. While the APM doesn't clearly state that NPT is mandatory, it's alluded to by: The guest page tables, managed by the guest, may mark data memory pages as either private or shared, thus allowing selected pages to be shared outside the guest. And practically speaking, shadow paging can't work since KVM can't read the guest's page tables. Fixes: e9df09428996 ("KVM: SVM: Add sev module_param") Cc: Brijesh Singh <brijesh.singh@amd.com Cc: Tom Lendacky <thomas.lendacky@amd.com> Signed-off-by: Sean Christopherson <seanjc@google.com> Message-Id: <20210422021125.3417167-4-seanjc@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/boot/mkcpustr.c')
0 files changed, 0 insertions, 0 deletions