fa1f57421e
In order to support virtio in Xen guests add a config option XEN_VIRTIO enabling the user to specify whether in all Xen guests virtio should be able to access memory via Xen grant mappings only on the host side. Also set PLATFORM_VIRTIO_RESTRICTED_MEM_ACCESS feature from the guest initialization code on Arm and x86 if CONFIG_XEN_VIRTIO is enabled. Signed-off-by: Juergen Gross <jgross@suse.com> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> Reviewed-by: Stefano Stabellini <sstabellini@kernel.org> Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com> Link: https://lore.kernel.org/r/1654197833-25362-5-git-send-email-olekstysh@gmail.com Signed-off-by: Juergen Gross <jgross@suse.com>
83 lines
2.1 KiB
C
83 lines
2.1 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef _XEN_XEN_H
|
|
#define _XEN_XEN_H
|
|
|
|
enum xen_domain_type {
|
|
XEN_NATIVE, /* running on bare hardware */
|
|
XEN_PV_DOMAIN, /* running in a PV domain */
|
|
XEN_HVM_DOMAIN, /* running in a Xen hvm domain */
|
|
};
|
|
|
|
#ifdef CONFIG_XEN
|
|
extern enum xen_domain_type xen_domain_type;
|
|
#else
|
|
#define xen_domain_type XEN_NATIVE
|
|
#endif
|
|
|
|
#ifdef CONFIG_XEN_PVH
|
|
extern bool xen_pvh;
|
|
#else
|
|
#define xen_pvh 0
|
|
#endif
|
|
|
|
#define xen_domain() (xen_domain_type != XEN_NATIVE)
|
|
#define xen_pv_domain() (xen_domain_type == XEN_PV_DOMAIN)
|
|
#define xen_hvm_domain() (xen_domain_type == XEN_HVM_DOMAIN)
|
|
#define xen_pvh_domain() (xen_pvh)
|
|
|
|
#include <linux/types.h>
|
|
|
|
extern uint32_t xen_start_flags;
|
|
|
|
#include <xen/interface/hvm/start_info.h>
|
|
extern struct hvm_start_info pvh_start_info;
|
|
|
|
#ifdef CONFIG_XEN_DOM0
|
|
#include <xen/interface/xen.h>
|
|
#include <asm/xen/hypervisor.h>
|
|
|
|
#define xen_initial_domain() (xen_domain() && \
|
|
(xen_start_flags & SIF_INITDOMAIN))
|
|
#else /* !CONFIG_XEN_DOM0 */
|
|
#define xen_initial_domain() (0)
|
|
#endif /* CONFIG_XEN_DOM0 */
|
|
|
|
struct bio_vec;
|
|
struct page;
|
|
|
|
bool xen_biovec_phys_mergeable(const struct bio_vec *vec1,
|
|
const struct page *page);
|
|
|
|
#if defined(CONFIG_MEMORY_HOTPLUG) && defined(CONFIG_XEN_BALLOON)
|
|
extern u64 xen_saved_max_mem_size;
|
|
#endif
|
|
|
|
#include <linux/platform-feature.h>
|
|
|
|
static inline void xen_set_restricted_virtio_memory_access(void)
|
|
{
|
|
if (IS_ENABLED(CONFIG_XEN_VIRTIO) && xen_domain())
|
|
platform_set(PLATFORM_VIRTIO_RESTRICTED_MEM_ACCESS);
|
|
}
|
|
|
|
#ifdef CONFIG_XEN_UNPOPULATED_ALLOC
|
|
int xen_alloc_unpopulated_pages(unsigned int nr_pages, struct page **pages);
|
|
void xen_free_unpopulated_pages(unsigned int nr_pages, struct page **pages);
|
|
#include <linux/ioport.h>
|
|
int arch_xen_unpopulated_init(struct resource **res);
|
|
#else
|
|
#include <xen/balloon.h>
|
|
static inline int xen_alloc_unpopulated_pages(unsigned int nr_pages,
|
|
struct page **pages)
|
|
{
|
|
return xen_alloc_ballooned_pages(nr_pages, pages);
|
|
}
|
|
static inline void xen_free_unpopulated_pages(unsigned int nr_pages,
|
|
struct page **pages)
|
|
{
|
|
xen_free_ballooned_pages(nr_pages, pages);
|
|
}
|
|
#endif
|
|
|
|
#endif /* _XEN_XEN_H */
|