diff options
| author | Borislav Petkov <[email protected]> | 2021-10-01 19:41:20 +0000 |
|---|---|---|
| committer | Borislav Petkov <[email protected]> | 2021-10-06 19:48:27 +0000 |
| commit | 541ac97186d9ea88491961a46284de3603c914fd (patch) | |
| tree | 1a1821f1b37e721c8bde5528af8368a9e8bae447 /scripts/gcc-plugins/structleak_plugin.c | |
| parent | Merge branch x86/cc into x86/core (diff) | |
| download | kernel-541ac97186d9ea88491961a46284de3603c914fd.tar.gz kernel-541ac97186d9ea88491961a46284de3603c914fd.zip | |
x86/sev: Make the #VC exception stacks part of the default stacks storage
The size of the exception stacks was increased by the commit in Fixes,
resulting in stack sizes greater than a page in size. The #VC exception
handling was only mapping the first (bottom) page, resulting in an
SEV-ES guest failing to boot.
Make the #VC exception stacks part of the default exception stacks
storage and allocate them with a CONFIG_AMD_MEM_ENCRYPT=y .config. Map
them only when a SEV-ES guest has been detected.
Rip out the custom VC stacks mapping and storage code.
[ bp: Steal and adapt Tom's commit message. ]
Fixes: 7fae4c24a2b8 ("x86: Increase exception stack sizes")
Signed-off-by: Borislav Petkov <[email protected]>
Tested-by: Tom Lendacky <[email protected]>
Tested-by: Brijesh Singh <[email protected]>
Link: https://lkml.kernel.org/r/[email protected]
Diffstat (limited to 'scripts/gcc-plugins/structleak_plugin.c')
0 files changed, 0 insertions, 0 deletions
