mirror of
https://github.com/torvalds/linux.git
synced 2024-12-03 17:41:22 +00:00
251e90e7e3
Commitfa1f57421e
("xen/virtio: Enable restricted memory access using Xen grant mappings") introduced a new requirement for using virtio devices: the backend now needs to support the VIRTIO_F_ACCESS_PLATFORM feature. This is an undue requirement for non-PV guests, as those can be operated with existing backends without any problem, as long as those backends are running in dom0. Per default allow virtio devices without grant support for non-PV guests. On Arm require VIRTIO_F_ACCESS_PLATFORM for devices having been listed in the device tree to use grants. Add a new config item to always force use of grants for virtio. Fixes:fa1f57421e
("xen/virtio: Enable restricted memory access using Xen grant mappings") Reported-by: Viresh Kumar <viresh.kumar@linaro.org> Signed-off-by: Juergen Gross <jgross@suse.com> Reviewed-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> Tested-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> # Arm64 guest using Xen Reviewed-by: Stefano Stabellini <sstabellini@kernel.org> Link: https://lore.kernel.org/r/20220622063838.8854-4-jgross@suse.com Signed-off-by: Juergen Gross <jgross@suse.com>
75 lines
1.9 KiB
C
75 lines
1.9 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef _XEN_XEN_H
|
|
#define _XEN_XEN_H
|
|
|
|
enum xen_domain_type {
|
|
XEN_NATIVE, /* running on bare hardware */
|
|
XEN_PV_DOMAIN, /* running in a PV domain */
|
|
XEN_HVM_DOMAIN, /* running in a Xen hvm domain */
|
|
};
|
|
|
|
#ifdef CONFIG_XEN
|
|
extern enum xen_domain_type xen_domain_type;
|
|
#else
|
|
#define xen_domain_type XEN_NATIVE
|
|
#endif
|
|
|
|
#ifdef CONFIG_XEN_PVH
|
|
extern bool xen_pvh;
|
|
#else
|
|
#define xen_pvh 0
|
|
#endif
|
|
|
|
#define xen_domain() (xen_domain_type != XEN_NATIVE)
|
|
#define xen_pv_domain() (xen_domain_type == XEN_PV_DOMAIN)
|
|
#define xen_hvm_domain() (xen_domain_type == XEN_HVM_DOMAIN)
|
|
#define xen_pvh_domain() (xen_pvh)
|
|
|
|
#include <linux/types.h>
|
|
|
|
extern uint32_t xen_start_flags;
|
|
|
|
#include <xen/interface/hvm/start_info.h>
|
|
extern struct hvm_start_info pvh_start_info;
|
|
|
|
#ifdef CONFIG_XEN_DOM0
|
|
#include <xen/interface/xen.h>
|
|
#include <asm/xen/hypervisor.h>
|
|
|
|
#define xen_initial_domain() (xen_domain() && \
|
|
(xen_start_flags & SIF_INITDOMAIN))
|
|
#else /* !CONFIG_XEN_DOM0 */
|
|
#define xen_initial_domain() (0)
|
|
#endif /* CONFIG_XEN_DOM0 */
|
|
|
|
struct bio_vec;
|
|
struct page;
|
|
|
|
bool xen_biovec_phys_mergeable(const struct bio_vec *vec1,
|
|
const struct page *page);
|
|
|
|
#if defined(CONFIG_MEMORY_HOTPLUG) && defined(CONFIG_XEN_BALLOON)
|
|
extern u64 xen_saved_max_mem_size;
|
|
#endif
|
|
|
|
#ifdef CONFIG_XEN_UNPOPULATED_ALLOC
|
|
int xen_alloc_unpopulated_pages(unsigned int nr_pages, struct page **pages);
|
|
void xen_free_unpopulated_pages(unsigned int nr_pages, struct page **pages);
|
|
#include <linux/ioport.h>
|
|
int arch_xen_unpopulated_init(struct resource **res);
|
|
#else
|
|
#include <xen/balloon.h>
|
|
static inline int xen_alloc_unpopulated_pages(unsigned int nr_pages,
|
|
struct page **pages)
|
|
{
|
|
return xen_alloc_ballooned_pages(nr_pages, pages);
|
|
}
|
|
static inline void xen_free_unpopulated_pages(unsigned int nr_pages,
|
|
struct page **pages)
|
|
{
|
|
xen_free_ballooned_pages(nr_pages, pages);
|
|
}
|
|
#endif
|
|
|
|
#endif /* _XEN_XEN_H */
|