diff options
author | Ashish Kalra <ashish.kalra@amd.com> | 2024-01-26 07:11:15 +0300 |
---|---|---|
committer | Borislav Petkov (AMD) <bp@alien8.de> | 2024-01-29 22:34:18 +0300 |
commit | 8dac642999b1542e0f0abefba100d8bd11226c83 (patch) | |
tree | a127cebb3518a7bb870555d354369c76e8b70515 /include/linux/userfaultfd_k.h | |
parent | 18085ac2f2fbf56aee9cbf5846740150e394f4f4 (diff) | |
download | linux-8dac642999b1542e0f0abefba100d8bd11226c83.tar.xz |
x86/sev: Introduce an SNP leaked pages list
Pages are unsafe to be released back to the page-allocator if they
have been transitioned to firmware/guest state and can't be reclaimed
or transitioned back to hypervisor/shared state. In this case, add them
to an internal leaked pages list to ensure that they are not freed or
touched/accessed to cause fatal page faults.
[ mdr: Relocate to arch/x86/virt/svm/sev.c ]
Suggested-by: Vlastimil Babka <vbabka@suse.cz>
Signed-off-by: Ashish Kalra <ashish.kalra@amd.com>
Signed-off-by: Michael Roth <michael.roth@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
Link: https://lore.kernel.org/r/20240126041126.1927228-16-michael.roth@amd.com
Diffstat (limited to 'include/linux/userfaultfd_k.h')
0 files changed, 0 insertions, 0 deletions