diff options
| author | Paolo Bonzini <[email protected]> | 2024-07-11 22:27:50 +0000 |
|---|---|---|
| committer | Paolo Bonzini <[email protected]> | 2024-07-26 18:46:14 +0000 |
| commit | 6dd761d92f6600342860c618639489bb9c3843ea (patch) | |
| tree | 50dadfdb33a1a82d2b7f28181e7656b24b930a57 /rust/helpers/task.c | |
| parent | KVM: guest_memfd: delay kvm_gmem_prepare_folio() until the memory is passed t... (diff) | |
| download | kernel-6dd761d92f6600342860c618639489bb9c3843ea.tar.gz kernel-6dd761d92f6600342860c618639489bb9c3843ea.zip | |
KVM: guest_memfd: make kvm_gmem_prepare_folio() operate on a single struct kvm
This is now possible because preparation is done by kvm_gmem_get_pfn()
instead of fallocate(). In practice this is not a limitation, because
even though guest_memfd can be bound to multiple struct kvm, for
hardware implementations of confidential computing only one guest
(identified by an ASID on SEV-SNP, or an HKID on TDX) will be able
to access it.
In the case of intra-host migration (not implemented yet for SEV-SNP,
but we can use SEV-ES as an idea of how it will work), the new struct
kvm inherits the same ASID and preparation need not be repeated.
Reviewed-by: Michael Roth <[email protected]>
Signed-off-by: Paolo Bonzini <[email protected]>
Diffstat (limited to 'rust/helpers/task.c')
0 files changed, 0 insertions, 0 deletions
