diff options
| author | Brijesh Singh <brijesh.singh@amd.com> | 2022-04-26 18:30:45 +0000 |
|---|---|---|
| committer | Suravee Suthikulpanit <suravee.suthikulpanit@amd.com> | 2022-07-13 17:27:28 -0500 |
| commit | 0a7791e8080a77e2f96e6d7fe0e518aae8b2f213 (patch) | |
| tree | 54fce6b2791e7a1102e737df601ac27c593021b8 /tools/perf/scripts/python/stackcollapse.py | |
| parent | ed2f647672c48bac18b5bb14affd25c4b9206220 (diff) | |
| download | cachepc-linux-0a7791e8080a77e2f96e6d7fe0e518aae8b2f213.tar.gz cachepc-linux-0a7791e8080a77e2f96e6d7fe0e518aae8b2f213.zip | |
KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
When SEV-SNP is enabled, the guest private pages are added in the RMP
table; while adding the pages, the rmp_make_private() unmaps the pages
from the direct map. If KSM attempts to access those unmapped pages then
it will trigger #PF (page-not-present).
Encrypted guest pages cannot be shared between the process, so an
userspace should not mark the region mergeable but to be safe, mark the
process vma unmerable before adding the pages in the RMP table.
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions
