aboutsummaryrefslogtreecommitdiffstats
path: root/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0067-KVM-SVM-Reserve-ASID-range-for-SEV-guest.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0067-KVM-SVM-Reserve-ASID-range-for-SEV-guest.patch')
-rw-r--r--meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0067-KVM-SVM-Reserve-ASID-range-for-SEV-guest.patch56
1 files changed, 56 insertions, 0 deletions
diff --git a/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0067-KVM-SVM-Reserve-ASID-range-for-SEV-guest.patch b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0067-KVM-SVM-Reserve-ASID-range-for-SEV-guest.patch
new file mode 100644
index 00000000..906fdc79
--- /dev/null
+++ b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0067-KVM-SVM-Reserve-ASID-range-for-SEV-guest.patch
@@ -0,0 +1,56 @@
+From 30b685840d3edf4a1e0750c0f0f88acf0d2e1629 Mon Sep 17 00:00:00 2001
+From: Brijesh Singh <brijesh.singh@amd.com>
+Date: Mon, 4 Dec 2017 10:57:32 -0600
+Subject: [PATCH 67/95] KVM: SVM: Reserve ASID range for SEV guest
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+A SEV-enabled guest must use ASIDs from the defined subset, while non-SEV
+guests can use the remaining ASID range. The range of allowed SEV guest
+ASIDs is [1 - CPUID_8000_001F[ECX][31:0]].
+
+Cc: Thomas Gleixner <tglx@linutronix.de>
+Cc: Ingo Molnar <mingo@redhat.com>
+Cc: "H. Peter Anvin" <hpa@zytor.com>
+Cc: Paolo Bonzini <pbonzini@redhat.com>
+Cc: "Radim Krčmář" <rkrcmar@redhat.com>
+Cc: Joerg Roedel <joro@8bytes.org>
+Cc: Borislav Petkov <bp@suse.de>
+Cc: Tom Lendacky <thomas.lendacky@amd.com>
+Cc: x86@kernel.org
+Cc: kvm@vger.kernel.org
+Cc: linux-kernel@vger.kernel.org
+Improvements-by: Borislav Petkov <bp@suse.de>
+Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
+Reviewed-by: Borislav Petkov <bp@suse.de>
+Signed-off-by: Sudheesh Mavila <sudheesh.mavila@amd.com>
+---
+ arch/x86/kvm/svm.c | 4 +++-
+ 1 file changed, 3 insertions(+), 1 deletion(-)
+
+diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
+index 69b5ce2..77914701 100644
+--- a/arch/x86/kvm/svm.c
++++ b/arch/x86/kvm/svm.c
+@@ -333,6 +333,8 @@ enum {
+
+ #define VMCB_AVIC_APIC_BAR_MASK 0xFFFFFFFFFF000ULL
+
++static unsigned int max_sev_asid;
++
+ static inline void mark_all_dirty(struct vmcb *vmcb)
+ {
+ vmcb->control.clean = 0;
+@@ -798,7 +800,7 @@ static int svm_hardware_enable(void)
+ sd->asid_generation = 1;
+ sd->max_asid = cpuid_ebx(SVM_CPUID_FUNC) - 1;
+ sd->next_asid = sd->max_asid + 1;
+- sd->min_asid = 1;
++ sd->min_asid = max_sev_asid + 1;
+
+ gdt = get_current_gdt_rw();
+ sd->tss_desc = (struct kvm_ldttss_desc *)(gdt + GDT_ENTRY_TSS);
+--
+2.7.4
+