[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171207233342.29646.12858.stgit@tlendack-t1.amdoffice.net>
Date: Thu, 07 Dec 2017 17:33:42 -0600
From: Tom Lendacky <thomas.lendacky@....com>
To: x86@...nel.org
Cc: Brijesh Singh <brijesh.singh@....com>,
linux-kernel@...r.kernel.org, Ingo Molnar <mingo@...hat.com>,
Borislav Petkov <bp@...en8.de>,
"H. Peter Anvin" <hpa@...or.com>,
Thomas Gleixner <tglx@...utronix.de>
Subject: [PATCH v1 0/3] x86: SME: BSP/SME microcode update fix
This patch series addresses an issue when SME is active and the BSP
is attempting to check for and load microcode during load_ucode_bsp().
Since the initrd has not been decrypted (yet) and the virtual address
of the initrd treats the memory as encrypted, the CPIO archive parsing
fails to locate the microcode.
This series moves the encryption of the initrd into the early boot code
and encrypts it at the same time that the kernel is encrypted. Since
the initrd is now encrypted, the CPIO archive parsing succeeds in
properly locating the microcode.
The following patches are included in this fix:
- Centralize the use of the PMD flags used in sme_encrypt_kernel() in
preparation for using PTE flags also.
- Prepare sme_encrypt_kernel() to handle PAGE aligned encryption, not
just 2MB large page aligned encryption.
- Encrypt the initrd in sme_encrypt_kernel() when the kernel is being
encrypted.
This patch series is based on tip/master.
---
Tom Lendacky (3):
x86/mm: Centralize PMD flags in sme_encrypt_kernel()
x86/mm: Prepare sme_encrypt_kernel() for PAGE aligned encryption
x86/mm: Encrypt the initrd earlier for BSP microcode update
arch/x86/include/asm/mem_encrypt.h | 4 -
arch/x86/kernel/head64.c | 4 -
arch/x86/kernel/setup.c | 10 -
arch/x86/mm/mem_encrypt.c | 264 +++++++++++++++++++++++++++---------
arch/x86/mm/mem_encrypt_boot.S | 66 +++++----
5 files changed, 243 insertions(+), 105 deletions(-)
--
Tom Lendacky
Powered by blists - more mailing lists