KVM: guest_memfd: Add hook for invalidating memory
In some cases, like with SEV-SNP, guest memory needs to be updated in a platform-specific manner before it can be safely freed back to the host. Wire up arch-defined hooks to the .free_folio kvm_gmem_aops callback to allow for special handling of this sort when freeing memory in response to FALLOC_FL_PUNCH_HOLE operations and when releasing the inode, and go ahead and define an arch-specific hook for x86 since it will be needed for handling memory used for SEV-SNP guests. Signed-off-by:Michael Roth <michael.roth@amd.com> Message-Id: <20231230172351.574091-6-michael.roth@amd.com> Signed-off-by:
Paolo Bonzini <pbonzini@redhat.com>
Showing
- arch/x86/include/asm/kvm-x86-ops.h 1 addition, 0 deletionsarch/x86/include/asm/kvm-x86-ops.h
- arch/x86/include/asm/kvm_host.h 1 addition, 0 deletionsarch/x86/include/asm/kvm_host.h
- arch/x86/kvm/x86.c 7 additions, 0 deletionsarch/x86/kvm/x86.c
- include/linux/kvm_host.h 4 additions, 0 deletionsinclude/linux/kvm_host.h
- virt/kvm/Kconfig 4 additions, 0 deletionsvirt/kvm/Kconfig
- virt/kvm/guest_memfd.c 14 additions, 0 deletionsvirt/kvm/guest_memfd.c
Please register or sign in to comment