diff options
author | Michael Kelley <mikelley@microsoft.com> | 2023-03-26 16:52:03 +0300 |
---|---|---|
committer | Wei Liu <wei.liu@kernel.org> | 2023-04-17 22:19:04 +0300 |
commit | a5ddb74588213c31ce993a8e9a09d1ffdc11a142 (patch) | |
tree | 993e0eef74285f20912c4681213ba96f97658d24 /tools/perf/scripts/python/export-to-postgresql.py | |
parent | 0459ff4873739986dccafbb417cfc69e71bdacf4 (diff) | |
download | linux-a5ddb74588213c31ce993a8e9a09d1ffdc11a142.tar.xz |
Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
With changes to how Hyper-V guest VMs flip memory between private
(encrypted) and shared (decrypted), creating a second kernel virtual
mapping for shared memory is no longer necessary. Everything needed
for the transition to shared is handled by set_memory_decrypted().
As such, remove the code to create and manage the second
mapping for VMBus monitor pages. Because set_memory_decrypted()
and set_memory_encrypted() are no-ops in normal VMs, it's
not even necessary to test for being in a Confidential VM
(a.k.a., "Isolation VM").
Signed-off-by: Michael Kelley <mikelley@microsoft.com>
Reviewed-by: Tianyu Lan <Tianyu.Lan@microsoft.com>
Link: https://lore.kernel.org/r/1679838727-87310-9-git-send-email-mikelley@microsoft.com
Signed-off-by: Wei Liu <wei.liu@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions