aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/kernel/head_64.S
diff options
context:
space:
mode:
authorGravatar Tom Lendacky <thomas.lendacky@amd.com> 2022-03-07 15:33:32 -0600
committerGravatar Borislav Petkov <bp@suse.de> 2022-04-06 17:06:49 +0200
commit0afb6b660a6b58cb336d1175ed687bf9525849a4 (patch)
tree9f12fd9423ad05806c230dd998e9c7a18e77212a /arch/x86/kernel/head_64.S
parentx86/mm: Validate memory when changing the C-bit (diff)
downloadlinux-0afb6b660a6b58cb336d1175ed687bf9525849a4.tar.gz
linux-0afb6b660a6b58cb336d1175ed687bf9525849a4.tar.bz2
linux-0afb6b660a6b58cb336d1175ed687bf9525849a4.zip
x86/sev: Use SEV-SNP AP creation to start secondary CPUs
To provide a more secure way to start APs under SEV-SNP, use the SEV-SNP AP Creation NAE event. This allows for guest control over the AP register state rather than trusting the hypervisor with the SEV-ES Jump Table address. During native_smp_prepare_cpus(), invoke an SEV-SNP function that, if SEV-SNP is active, will set/override apic->wakeup_secondary_cpu. This will allow the SEV-SNP AP Creation NAE event method to be used to boot the APs. As a result of installing the override when SEV-SNP is active, this method of starting the APs becomes the required method. The override function will fail to start the AP if the hypervisor does not have support for AP creation. [ bp: Work in forgotten review comments. ] Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lore.kernel.org/r/20220307213356.2797205-23-brijesh.singh@amd.com
Diffstat (limited to 'arch/x86/kernel/head_64.S')
0 files changed, 0 insertions, 0 deletions