diff options
author | Bharata B Rao <bharata@linux.ibm.com> | 2019-11-25 04:06:25 +0100 |
---|---|---|
committer | Paul Mackerras <paulus@ozlabs.org> | 2019-11-28 06:23:03 +0100 |
commit | 33cf170715e87efd0608af6f2c056cafe0e7fc47 (patch) | |
tree | 32238b2222c2428fb1889fc8302d112a8466d873 | |
parent | Merge tag 'kvm-ppc-next-5.5-2' of git://git.kernel.org/pub/scm/linux/kernel/g... (diff) | |
download | linux-33cf170715e87efd0608af6f2c056cafe0e7fc47.tar.xz linux-33cf170715e87efd0608af6f2c056cafe0e7fc47.zip |
mm: ksm: Export ksm_madvise()
On PEF-enabled POWER platforms that support running of secure guests,
secure pages of the guest are represented by device private pages
in the host. Such pages needn't participate in KSM merging. This is
achieved by using ksm_madvise() call which need to be exported
since KVM PPC can be a kernel module.
Signed-off-by: Bharata B Rao <bharata@linux.ibm.com>
Acked-by: Hugh Dickins <hughd@google.com>
Cc: Andrea Arcangeli <aarcange@redhat.com>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
-rw-r--r-- | mm/ksm.c | 1 |
1 files changed, 1 insertions, 0 deletions
@@ -2478,6 +2478,7 @@ int ksm_madvise(struct vm_area_struct *vma, unsigned long start, return 0; } +EXPORT_SYMBOL_GPL(ksm_madvise); int __ksm_enter(struct mm_struct *mm) { |