diff options
author | Michael Roth <michael.roth@amd.com> | 2023-12-30 11:23:21 -0600 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2024-05-10 13:11:48 -0400 |
commit | a90764f0e4ed5350cc9caeb384e0fb356c032587 (patch) | |
tree | 937a1302c4b4ebdcccca9c1a52e40916e7ecb05e /scripts/generate_rust_analyzer.py | |
parent | 1f6c06b177513e8a47c43e95d1985dbd9cff3ddd (diff) | |
download | linux-a90764f0e4ed5350cc9caeb384e0fb356c032587.tar.gz linux-a90764f0e4ed5350cc9caeb384e0fb356c032587.tar.bz2 linux-a90764f0e4ed5350cc9caeb384e0fb356c032587.zip |
KVM: guest_memfd: Add hook for invalidating memory
In some cases, like with SEV-SNP, guest memory needs to be updated in a
platform-specific manner before it can be safely freed back to the host.
Wire up arch-defined hooks to the .free_folio kvm_gmem_aops callback to
allow for special handling of this sort when freeing memory in response
to FALLOC_FL_PUNCH_HOLE operations and when releasing the inode, and go
ahead and define an arch-specific hook for x86 since it will be needed
for handling memory used for SEV-SNP guests.
Signed-off-by: Michael Roth <michael.roth@amd.com>
Message-Id: <20231230172351.574091-6-michael.roth@amd.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions