Centos-kernel-stream-9/arch/x86/coco
Bandan Das a777e41d92 x86/sev: Make sure pages are not skipped during kdump
JIRA: https://issues.redhat.com/browse/RHEL-10019

commit 82b7f88f2316c5442708daeb0b5ec5aa54c8ff7f
Author: Ashish Kalra <ashish.kalra@amd.com>
Date:   Tue May 6 18:35:29 2025 +0000

    x86/sev: Make sure pages are not skipped during kdump

    When shared pages are being converted to private during kdump, additional
    checks are performed. They include handling the case of a GHCB page being
    contained within a huge page.

    Currently, this check incorrectly skips a page just below the GHCB page from
    being transitioned back to private during kdump preparation.

    This skipped page causes a 0x404 #VC exception when it is accessed later while
    dumping guest memory for vmcore generation.

    Correct the range to be checked for GHCB contained in a huge page.  Also,
    ensure that the skipped huge page containing the GHCB page is transitioned
    back to private by applying the correct address mask later when changing GHCBs
    to private at end of kdump preparation.

      [ bp: Massage commit message. ]

    Fixes: 3074152e56c9 ("x86/sev: Convert shared memory back to private on kexec")
    Signed-off-by: Ashish Kalra <ashish.kalra@amd.com>
    Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
    Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
    Tested-by: Srikanth Aithal <sraithal@amd.com>
    Cc: stable@vger.kernel.org
    Link: https://lore.kernel.org/20250506183529.289549-1-Ashish.Kalra@amd.com

Signed-off-by: Bandan Das <bsd@redhat.com>
2025-07-18 13:43:33 -04:00
..
sev x86/sev: Make sure pages are not skipped during kdump 2025-07-18 13:43:33 -04:00
tdx x86/tdx: Fix "in-kernel MMIO" check 2025-03-20 17:47:55 +01:00
Makefile x86/sev: Move SEV compilation units 2024-10-09 18:04:25 +02:00
core.c cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup 2024-10-09 18:04:19 +02:00