summaryrefslogtreecommitdiffstats
path: root/drivers/oprofile
diff options
context:
space:
mode:
authorPierre Morel <pmorel@linux.ibm.com>2020-09-10 10:53:49 +0200
committerMichael S. Tsirkin <mst@redhat.com>2020-10-21 10:34:12 -0400
commit0afa15e1a5294754066343cad24af5ec8edae96d (patch)
tree64e15eeb034e2bfb937aaf6def594750032712b8 /drivers/oprofile
parentb9747fdf0c1dad088eb21d5191295999ae7b4b40 (diff)
downloadlinux-0afa15e1a5294754066343cad24af5ec8edae96d.tar.gz
linux-0afa15e1a5294754066343cad24af5ec8edae96d.tar.bz2
linux-0afa15e1a5294754066343cad24af5ec8edae96d.zip
virtio: let arch advertise guest's memory access restrictions
An architecture may restrict host access to guest memory, e.g. IBM s390 Secure Execution or AMD SEV. Provide a new Kconfig entry the architecture can select, CONFIG_ARCH_HAS_RESTRICTED_VIRTIO_MEMORY_ACCESS, when it provides the arch_has_restricted_virtio_memory_access callback to advertise to VIRTIO common code when the architecture restricts memory access from the host. The common code can then fail the probe for any device where VIRTIO_F_ACCESS_PLATFORM is required, but not set. Signed-off-by: Pierre Morel <pmorel@linux.ibm.com> Reviewed-by: Cornelia Huck <cohuck@redhat.com> Reviewed-by: Halil Pasic <pasic@linux.ibm.com> Link: https://lore.kernel.org/r/1599728030-17085-2-git-send-email-pmorel@linux.ibm.com Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Diffstat (limited to 'drivers/oprofile')
0 files changed, 0 insertions, 0 deletions