diff options
author | Bharata B Rao <bharata@linux.ibm.com> | 2019-11-25 08:36:25 +0530 |
---|---|---|
committer | Paul Mackerras <paulus@ozlabs.org> | 2019-11-28 16:23:03 +1100 |
commit | 33cf170715e87efd0608af6f2c056cafe0e7fc47 (patch) | |
tree | 32238b2222c2428fb1889fc8302d112a8466d873 | |
parent | 96710247298df52a4b8150a62a6fe87083093ff3 (diff) | |
download | powerpc-33cf170715e87efd0608af6f2c056cafe0e7fc47.tar.gz |
mm: ksm: Export ksm_madvise()
On PEF-enabled POWER platforms that support running of secure guests,
secure pages of the guest are represented by device private pages
in the host. Such pages needn't participate in KSM merging. This is
achieved by using ksm_madvise() call which need to be exported
since KVM PPC can be a kernel module.
Signed-off-by: Bharata B Rao <bharata@linux.ibm.com>
Acked-by: Hugh Dickins <hughd@google.com>
Cc: Andrea Arcangeli <aarcange@redhat.com>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
-rw-r--r-- | mm/ksm.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/mm/ksm.c b/mm/ksm.c index dbee2eb4dd05ee..e45b02ad3f0ba1 100644 --- a/mm/ksm.c +++ b/mm/ksm.c @@ -2478,6 +2478,7 @@ int ksm_madvise(struct vm_area_struct *vma, unsigned long start, return 0; } +EXPORT_SYMBOL_GPL(ksm_madvise); int __ksm_enter(struct mm_struct *mm) { |