summaryrefslogtreecommitdiff
path: root/arch/x86/include/asm/set_memory.h
diff options
context:
space:
mode:
authorPaolo Bonzini <pbonzini@redhat.com>2021-11-11 07:40:26 -0500
committerPaolo Bonzini <pbonzini@redhat.com>2021-11-11 07:40:26 -0500
commitb9ecb9a997333f90236cb6f3d52d83987a17addc (patch)
tree9d4c34b26ba67337923c8681daf32d1b162426c8 /arch/x86/include/asm/set_memory.h
parentdebe436e77c72fcee804fb867f275e6d31aa999c (diff)
parent73f1b4fece216c2e72be74c4d0d0f71a0b944bec (diff)
downloadlinux-b9ecb9a997333f90236cb6f3d52d83987a17addc.tar.gz
linux-b9ecb9a997333f90236cb6f3d52d83987a17addc.tar.bz2
linux-b9ecb9a997333f90236cb6f3d52d83987a17addc.zip
Merge branch 'kvm-guest-sev-migration' into kvm-master
Add guest api and guest kernel support for SEV live migration. Introduces a new hypercall to notify the host of changes to the page encryption status. If the page is encrypted then it must be migrated through the SEV firmware or a helper VM sharing the key. If page is not encrypted then it can be migrated normally by userspace. This new hypercall is invoked using paravirt_ops. Conflicts: sev_active() replaced by cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT).
Diffstat (limited to 'arch/x86/include/asm/set_memory.h')
-rw-r--r--arch/x86/include/asm/set_memory.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/arch/x86/include/asm/set_memory.h b/arch/x86/include/asm/set_memory.h
index 43fa081a1adb..872617542bbc 100644
--- a/arch/x86/include/asm/set_memory.h
+++ b/arch/x86/include/asm/set_memory.h
@@ -83,6 +83,7 @@ int set_pages_rw(struct page *page, int numpages);
int set_direct_map_invalid_noflush(struct page *page);
int set_direct_map_default_noflush(struct page *page);
bool kernel_page_present(struct page *page);
+void notify_range_enc_status_changed(unsigned long vaddr, int npages, bool enc);
extern int kernel_set_to_readonly;