lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 16 Sep 2017 07:34:07 -0500 From: Brijesh Singh <brijesh.singh@....com> To: linux-kernel@...r.kernel.org, x86@...nel.org, kvm@...r.kernel.org Cc: Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, "H . Peter Anvin" <hpa@...or.com>, Borislav Petkov <bp@...e.de>, Andy Lutomirski <luto@...nel.org>, Tom Lendacky <thomas.lendacky@....com>, John Ogness <john.ogness@...utronix.de>, Matt Fleming <matt@...eblueprint.co.uk>, Laura Abbott <labbott@...hat.com>, Dan Williams <dan.j.williams@...el.com>, "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>, Brijesh Singh <brijesh.singh@....com> Subject: [Part1 PATCH v4 06/17] x86/mm: Include SEV for encryption memory attribute changes From: Tom Lendacky <thomas.lendacky@....com> The current code checks only for sme_active() when determining whether to perform the encryption attribute change. Include sev_active() in this check so that memory attribute changes can occur under SME and SEV. Cc: Thomas Gleixner <tglx@...utronix.de> Cc: Ingo Molnar <mingo@...hat.com> Cc: "H. Peter Anvin" <hpa@...or.com> Cc: Borislav Petkov <bp@...e.de> Cc: Andy Lutomirski <luto@...nel.org> Cc: John Ogness <john.ogness@...utronix.de> Cc: Matt Fleming <matt@...eblueprint.co.uk> Cc: Laura Abbott <labbott@...hat.com> Cc: Dan Williams <dan.j.williams@...el.com> Cc: "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com> Cc: linux-kernel@...r.kernel.org Cc: x86@...nel.org Signed-off-by: Tom Lendacky <thomas.lendacky@....com> Signed-off-by: Brijesh Singh <brijesh.singh@....com> --- arch/x86/mm/pageattr.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/mm/pageattr.c b/arch/x86/mm/pageattr.c index dfb7d657cf43..3fe68483463c 100644 --- a/arch/x86/mm/pageattr.c +++ b/arch/x86/mm/pageattr.c @@ -1781,8 +1781,8 @@ static int __set_memory_enc_dec(unsigned long addr, int numpages, bool enc) unsigned long start; int ret; - /* Nothing to do if the SME is not active */ - if (!sme_active()) + /* Nothing to do if memory encryption is not active */ + if (!mem_encrypt_active()) return 0; /* Should not be working on unaligned addresses */ -- 2.9.5
Powered by blists - more mailing lists