linux_dsm_epyc7002/arch/x86
Tom Lendacky 39336f4ffb x86/efi: Add GHCB mappings when SEV-ES is active
Calling down to EFI runtime services can result in the firmware
performing VMGEXIT calls. The firmware is likely to use the GHCB of the
OS (e.g., for setting EFI variables), so each GHCB in the system needs
to be identity-mapped in the EFI page tables, as unencrypted, to avoid
page faults.

Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
[ jroedel@suse.de: Moved GHCB mapping loop to sev-es.c ]
Signed-off-by: Joerg Roedel <jroedel@suse.de>
Signed-off-by: Borislav Petkov <bp@suse.de>
Acked-by: Ard Biesheuvel <ardb@kernel.org>
Link: https://lkml.kernel.org/r/20200907131613.12703-72-joro@8bytes.org
2020-09-10 21:48:50 +02:00
..
boot x86/efi: Add GHCB mappings when SEV-ES is active 2020-09-10 21:48:50 +02:00
configs
crypto
entry x86/entry/64: Add entry code for #VC handler 2020-09-09 11:33:19 +02:00
events treewide: Use fallthrough pseudo-keyword 2020-08-23 17:36:59 -05:00
hyperv
ia32
include x86/efi: Add GHCB mappings when SEV-ES is active 2020-09-10 21:48:50 +02:00
kernel x86/efi: Add GHCB mappings when SEV-ES is active 2020-09-10 21:48:50 +02:00
kvm KVM: SVM: Add GHCB definitions 2020-09-07 19:45:24 +02:00
lib x86/insn: Add insn_has_rep_prefix() helper 2020-09-07 19:45:25 +02:00
math-emu treewide: Use fallthrough pseudo-keyword 2020-08-23 17:36:59 -05:00
mm x86/dumpstack/64: Add noinstr version of get_stack_info() 2020-09-09 11:33:19 +02:00
net
oprofile
pci xen: branch for v5.9-rc2 2020-08-21 12:28:33 -07:00
platform x86/efi: Add GHCB mappings when SEV-ES is active 2020-09-10 21:48:50 +02:00
power
purgatory
ras
realmode x86/head/64: Don't call verify_cpu() on starting APs 2020-09-09 11:33:20 +02:00
tools x86/insn: Make inat-tables.c suitable for pre-decompression code 2020-09-07 19:45:24 +02:00
um
video
xen
.gitignore
Kbuild
Kconfig x86/boot/compressed/64: Setup a GHCB-based VC Exception handler 2020-09-07 19:45:25 +02:00
Kconfig.assembler
Kconfig.cpu
Kconfig.debug
Makefile
Makefile_32.cpu
Makefile.um