diff options
| author | Paolo Bonzini <pbonzini@redhat.com> | 2021-11-11 07:40:26 -0500 |
|---|---|---|
| committer | Paolo Bonzini <pbonzini@redhat.com> | 2021-11-11 07:40:26 -0500 |
| commit | b9ecb9a997333f90236cb6f3d52d83987a17addc (patch) | |
| tree | 9d4c34b26ba67337923c8681daf32d1b162426c8 /arch/x86/include/asm/set_memory.h | |
| parent | debe436e77c72fcee804fb867f275e6d31aa999c (diff) | |
| parent | 73f1b4fece216c2e72be74c4d0d0f71a0b944bec (diff) | |
| download | linux-b9ecb9a997333f90236cb6f3d52d83987a17addc.tar.gz linux-b9ecb9a997333f90236cb6f3d52d83987a17addc.tar.bz2 linux-b9ecb9a997333f90236cb6f3d52d83987a17addc.zip | |
Merge branch 'kvm-guest-sev-migration' into kvm-master
Add guest api and guest kernel support for SEV live migration.
Introduces a new hypercall to notify the host of changes to the page
encryption status. If the page is encrypted then it must be migrated
through the SEV firmware or a helper VM sharing the key. If page is
not encrypted then it can be migrated normally by userspace. This new
hypercall is invoked using paravirt_ops.
Conflicts: sev_active() replaced by cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT).
Diffstat (limited to 'arch/x86/include/asm/set_memory.h')
| -rw-r--r-- | arch/x86/include/asm/set_memory.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/arch/x86/include/asm/set_memory.h b/arch/x86/include/asm/set_memory.h index 43fa081a1adb..872617542bbc 100644 --- a/arch/x86/include/asm/set_memory.h +++ b/arch/x86/include/asm/set_memory.h @@ -83,6 +83,7 @@ int set_pages_rw(struct page *page, int numpages); int set_direct_map_invalid_noflush(struct page *page); int set_direct_map_default_noflush(struct page *page); bool kernel_page_present(struct page *page); +void notify_range_enc_status_changed(unsigned long vaddr, int npages, bool enc); extern int kernel_set_to_readonly; |
