+3
−0
Loading
hygon inclusion category: bugfix bugzilla: https://gitee.com/openeuler/kernel/issues/I98WPG CVE: NA --------------------------- The ghcb pages might be mapped when KVM handling the VMGEXIT events, and these ghcb pages will be unmapped when prepare to switch to guest mode. If we try to kill the userspace VMM (e.g. qemu) of a guest, it's possible that the mapped ghcb pages will never be unmapped which will cause memory leak. We exposed a serious memory leak by creating and killing multiple qemu processes for state encrypted guests frequently. In order to solve this issue, unmap ghcb pages if they're sill mapped when destroy guest. Fixes: ce7ea0cf ("KVM: SVM: Move GHCB unmapping to fix RCU warning") Fixes: 291bd20d ("KVM: SVM: Add initial support for a VMGEXIT VMEXIT") Signed-off-by:hanliyang <hanliyang@hygon.cn>