lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 16 Sep 2017 07:34:05 -0500 From: Brijesh Singh <brijesh.singh@....com> To: linux-kernel@...r.kernel.org, x86@...nel.org, kvm@...r.kernel.org Cc: Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, "H . Peter Anvin" <hpa@...or.com>, Borislav Petkov <bp@...e.de>, Andy Lutomirski <luto@...nel.org>, Tom Lendacky <thomas.lendacky@....com>, Laura Abbott <labbott@...hat.com>, "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>, Brijesh Singh <brijesh.singh@....com> Subject: [Part1 PATCH v4 04/17] x86/realmode: Don't decrypt trampoline area under SEV From: Tom Lendacky <thomas.lendacky@....com> When SEV is active the trampoline area will need to be in encrypted memory so only mark the area decrypted if SME is active. Cc: Thomas Gleixner <tglx@...utronix.de> Cc: Ingo Molnar <mingo@...hat.com> Cc: "H. Peter Anvin" <hpa@...or.com> Cc: Borislav Petkov <bp@...e.de> Cc: Andy Lutomirski <luto@...nel.org> Cc: Laura Abbott <labbott@...hat.com> Cc: "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com> Cc: linux-kernel@...r.kernel.org Cc: x86@...nel.org Signed-off-by: Tom Lendacky <thomas.lendacky@....com> Signed-off-by: Brijesh Singh <brijesh.singh@....com> --- arch/x86/realmode/init.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/arch/x86/realmode/init.c b/arch/x86/realmode/init.c index 1f71980fc5e0..d03125c2b73b 100644 --- a/arch/x86/realmode/init.c +++ b/arch/x86/realmode/init.c @@ -63,9 +63,10 @@ static void __init setup_real_mode(void) /* * If SME is active, the trampoline area will need to be in * decrypted memory in order to bring up other processors - * successfully. + * successfully. This is not needed for SEV. */ - set_memory_decrypted((unsigned long)base, size >> PAGE_SHIFT); + if (sme_active()) + set_memory_decrypted((unsigned long)base, size >> PAGE_SHIFT); memcpy(base, real_mode_blob, size); -- 2.9.5
Powered by blists - more mailing lists