diff options
author | Pierre Morel <pmorel@linux.ibm.com> | 2020-09-10 10:53:49 +0200 |
---|---|---|
committer | Michael S. Tsirkin <mst@redhat.com> | 2020-10-21 10:34:12 -0400 |
commit | 0afa15e1a5294754066343cad24af5ec8edae96d (patch) | |
tree | 64e15eeb034e2bfb937aaf6def594750032712b8 /drivers/oprofile | |
parent | b9747fdf0c1dad088eb21d5191295999ae7b4b40 (diff) | |
download | linux-0afa15e1a5294754066343cad24af5ec8edae96d.tar.gz linux-0afa15e1a5294754066343cad24af5ec8edae96d.tar.bz2 linux-0afa15e1a5294754066343cad24af5ec8edae96d.zip |
virtio: let arch advertise guest's memory access restrictions
An architecture may restrict host access to guest memory,
e.g. IBM s390 Secure Execution or AMD SEV.
Provide a new Kconfig entry the architecture can select,
CONFIG_ARCH_HAS_RESTRICTED_VIRTIO_MEMORY_ACCESS, when it provides
the arch_has_restricted_virtio_memory_access callback to advertise
to VIRTIO common code when the architecture restricts memory access
from the host.
The common code can then fail the probe for any device where
VIRTIO_F_ACCESS_PLATFORM is required, but not set.
Signed-off-by: Pierre Morel <pmorel@linux.ibm.com>
Reviewed-by: Cornelia Huck <cohuck@redhat.com>
Reviewed-by: Halil Pasic <pasic@linux.ibm.com>
Link: https://lore.kernel.org/r/1599728030-17085-2-git-send-email-pmorel@linux.ibm.com
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Diffstat (limited to 'drivers/oprofile')
0 files changed, 0 insertions, 0 deletions