diff options
| author | Paolo Bonzini <pbonzini@redhat.com> | 2024-08-02 12:31:48 -0400 |
|---|---|---|
| committer | Paolo Bonzini <pbonzini@redhat.com> | 2024-08-02 12:33:43 -0400 |
| commit | 1773014a975919195be71646fc2c2cad1570fce4 (patch) | |
| tree | 3871bb33896b7b703cb54ec373706ba573cd83de /arch/x86/kvm/svm/svm.c | |
| parent | 29b5bbf7e97fb4aee55df17a38f5bc192b1928ae (diff) | |
| parent | aca0ec970d7644954caf01a40c5538d4400c01bd (diff) | |
| download | linux-1773014a975919195be71646fc2c2cad1570fce4.tar.gz linux-1773014a975919195be71646fc2c2cad1570fce4.tar.bz2 linux-1773014a975919195be71646fc2c2cad1570fce4.zip | |
Merge branch 'kvm-fixes' into HEAD
* fix latent bug in how usage of large pages is determined for
confidential VMs
* fix "underline too short" in docs
* eliminate log spam from limited APIC timer periods
* disallow pre-faulting of memory before SEV-SNP VMs are initialized
* delay clearing and encrypting private memory until it is added to
guest page tables
* this change also enables another small cleanup: the checks in
SNP_LAUNCH_UPDATE that limit it to non-populated, private pages
can now be moved in the common kvm_gmem_populate() function
Diffstat (limited to 'arch/x86/kvm/svm/svm.c')
| -rw-r--r-- | arch/x86/kvm/svm/svm.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index c115d26844f7..d6f252555ab3 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -4949,6 +4949,7 @@ static int svm_vm_init(struct kvm *kvm) to_kvm_sev_info(kvm)->need_init = true; kvm->arch.has_private_mem = (type == KVM_X86_SNP_VM); + kvm->arch.pre_fault_allowed = !kvm->arch.has_private_mem; } if (!pause_filter_count || !pause_filter_thresh) |
