summaryrefslogtreecommitdiffstats
path: root/arch/x86/include/asm/kvm-x86-ops.h
diff options
context:
space:
mode:
authorMichael Roth <michael.roth@amd.com>2023-12-30 18:23:21 +0100
committerPaolo Bonzini <pbonzini@redhat.com>2024-05-10 19:11:48 +0200
commita90764f0e4ed5350cc9caeb384e0fb356c032587 (patch)
tree937a1302c4b4ebdcccca9c1a52e40916e7ecb05e /arch/x86/include/asm/kvm-x86-ops.h
parentKVM: guest_memfd: Add interface for populating gmem pages with user data (diff)
downloadlinux-a90764f0e4ed5350cc9caeb384e0fb356c032587.tar.xz
linux-a90764f0e4ed5350cc9caeb384e0fb356c032587.zip
KVM: guest_memfd: Add hook for invalidating memory
In some cases, like with SEV-SNP, guest memory needs to be updated in a platform-specific manner before it can be safely freed back to the host. Wire up arch-defined hooks to the .free_folio kvm_gmem_aops callback to allow for special handling of this sort when freeing memory in response to FALLOC_FL_PUNCH_HOLE operations and when releasing the inode, and go ahead and define an arch-specific hook for x86 since it will be needed for handling memory used for SEV-SNP guests. Signed-off-by: Michael Roth <michael.roth@amd.com> Message-Id: <20231230172351.574091-6-michael.roth@amd.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/include/asm/kvm-x86-ops.h')
-rw-r--r--arch/x86/include/asm/kvm-x86-ops.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h
index d26fcad13e36..c81990937ab4 100644
--- a/arch/x86/include/asm/kvm-x86-ops.h
+++ b/arch/x86/include/asm/kvm-x86-ops.h
@@ -140,6 +140,7 @@ KVM_X86_OP_OPTIONAL_RET0(vcpu_get_apicv_inhibit_reasons);
KVM_X86_OP_OPTIONAL(get_untagged_addr)
KVM_X86_OP_OPTIONAL(alloc_apic_backing_page)
KVM_X86_OP_OPTIONAL_RET0(gmem_prepare)
+KVM_X86_OP_OPTIONAL(gmem_invalidate)
#undef KVM_X86_OP
#undef KVM_X86_OP_OPTIONAL