mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-27 21:55:10 +07:00
x86/boot/compressed/64: Call set_sev_encryption_mask() earlier
Call set_sev_encryption_mask() while still on the stage 1 #VC-handler because the stage 2 handler needs the kernel's own page tables to be set up, to which calling set_sev_encryption_mask() is a prerequisite. Signed-off-by: Joerg Roedel <jroedel@suse.de> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lkml.kernel.org/r/20200907131613.12703-21-joro@8bytes.org
This commit is contained in:
parent
29dcc60f6a
commit
c2a0304a28
@ -543,9 +543,16 @@ SYM_FUNC_START_LOCAL_NOALIGN(.Lrelocated)
|
||||
rep stosq
|
||||
|
||||
/*
|
||||
* Load stage2 IDT and switch to our own page-table
|
||||
* If running as an SEV guest, the encryption mask is required in the
|
||||
* page-table setup code below. When the guest also has SEV-ES enabled
|
||||
* set_sev_encryption_mask() will cause #VC exceptions, but the stage2
|
||||
* handler can't map its GHCB because the page-table is not set up yet.
|
||||
* So set up the encryption mask here while still on the stage1 #VC
|
||||
* handler. Then load stage2 IDT and switch to the kernel's own
|
||||
* page-table.
|
||||
*/
|
||||
pushq %rsi
|
||||
call set_sev_encryption_mask
|
||||
call load_stage2_idt
|
||||
call initialize_identity_maps
|
||||
popq %rsi
|
||||
|
@ -105,9 +105,6 @@ static void add_identity_map(unsigned long start, unsigned long end)
|
||||
/* Locates and clears a region for a new top level page table. */
|
||||
void initialize_identity_maps(void)
|
||||
{
|
||||
/* If running as an SEV guest, the encryption mask is required. */
|
||||
set_sev_encryption_mask();
|
||||
|
||||
/* Exclude the encryption mask from __PHYSICAL_MASK */
|
||||
physical_mask &= ~sme_me_mask;
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user