[PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active

Borislav Petkov bp at alien8.de
Sun Mar 24 23:37:42 PDT 2019

On Mon, Mar 25, 2019 at 09:58:07AM +0800, lijiang wrote:
> For the SEV virtual machine, it maps the kexec memroy area as
> encrypted, so, no need to invoke this function to change anything.

Look at the code:


It already *does* invoke this function.

> > 	if (!mem_encrypt_active())
> > 
> > and heads will spin from all the checking of memory encryption aspects.
> > 
> > So this would need a rework so that there are no multiple confusing
> > checks.
> About the three functions, here i copied their comment from the arch/x86/mm/mem_encrypt.c
> Please refer to it.

I know that comment - I have asked for it. Now you go and look at the
code again with your patch applied.


Good mailing practices for 400: avoid top-posting and trim the reply.

More information about the kexec mailing list