Skip to content

Commit 682af54

Browse files
tlendackyKAGA-KOKO
authored andcommitted
x86/mm: Don't attempt to encrypt initrd under SEV
When SEV is active the initrd/initramfs will already have already been placed in memory encrypted so do not try to encrypt it. Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Borislav Petkov <bp@suse.de> Tested-by: Borislav Petkov <bp@suse.de> Cc: kvm@vger.kernel.org Cc: Borislav Petkov <bp@alien8.de> Cc: Andy Lutomirski <luto@kernel.org> Link: https://lkml.kernel.org/r/20171020143059.3291-4-brijesh.singh@amd.com
1 parent d8aa7ee commit 682af54

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

arch/x86/kernel/setup.c

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -380,9 +380,11 @@ static void __init reserve_initrd(void)
380380
* If SME is active, this memory will be marked encrypted by the
381381
* kernel when it is accessed (including relocation). However, the
382382
* ramdisk image was loaded decrypted by the bootloader, so make
383-
* sure that it is encrypted before accessing it.
383+
* sure that it is encrypted before accessing it. For SEV the
384+
* ramdisk will already be encrypted, so only do this for SME.
384385
*/
385-
sme_early_encrypt(ramdisk_image, ramdisk_end - ramdisk_image);
386+
if (sme_active())
387+
sme_early_encrypt(ramdisk_image, ramdisk_end - ramdisk_image);
386388

387389
initrd_start = 0;
388390

0 commit comments

Comments
 (0)