Allow capping the maximum total size of in-flight VFIO device state buffers queued at the destination, otherwise a malicious QEMU source could theoretically cause the target QEMU to allocate unlimited amounts of memory for buffers-in-flight. Since this is not expected to be a realistic threat in most of VFIO live migration use cases and the right value depends on the particular setup disable this limit by default by setting it to UINT64_MAX. Reviewed-by: Fabiano Rosas <farosas@suse.de> Reviewed-by: Avihai Horon <avihaih@nvidia.com> Signed-off-by: Maciej S. Szmigiero <maciej.szmigiero@oracle.com> Link: https://lore.kernel.org/qemu-devel/4f7cad490988288f58e36b162d7a888ed7e7fd17.1752589295.git.maciej.szmigiero@oracle.com Signed-off-by: Cédric Le Goater <clg@redhat.com> |
||
|---|---|---|
| .. | ||
| best-practices.rst | ||
| compatibility.rst | ||
| CPR.rst | ||
| dirty-limit.rst | ||
| features.rst | ||
| index.rst | ||
| main.rst | ||
| mapped-ram.rst | ||
| postcopy.rst | ||
| qatzip-compression.rst | ||
| qpl-compression.rst | ||
| uadk-compression.rst | ||
| vfio.rst | ||
| virtio.rst | ||