OSDN Git Service

X86/KVM: Decrypt shared per-cpu variables when SEV is active
authorBrijesh Singh <brijesh.singh@amd.com>
Fri, 20 Oct 2017 14:30:58 +0000 (09:30 -0500)
committerThomas Gleixner <tglx@linutronix.de>
Tue, 7 Nov 2017 14:36:00 +0000 (15:36 +0100)
commit4716276184ec67a123a4eab81609a0688b1d650b
tree53dc65ef1398d44ad05e62f960bf995e59088d79
parentac26963a1175c813e3ed21c0d2435b083173136e
X86/KVM: Decrypt shared per-cpu variables when SEV is active

When SEV is active, guest memory is encrypted with a guest-specific key, a
guest memory region shared with the hypervisor must be mapped as decrypted
before it can be shared.

Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Borislav Petkov <bp@suse.de>
Tested-by: Borislav Petkov <bp@suse.de>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: kvm@vger.kernel.org
Cc: Radim Krčmář <rkrcmar@redhat.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Link: https://lkml.kernel.org/r/20171020143059.3291-17-brijesh.singh@amd.com
arch/x86/kernel/kvm.c