[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH V3 4/8] xen/virtio: Enable restricted memory access using Xen grant mappings
- To: Oleksandr <olekstysh@xxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, x86@xxxxxxxxxx, linux-arm-kernel@xxxxxxxxxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Date: Thu, 2 Jun 2022 15:09:00 -0400
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ZJM97+Pdw2U+vQHT1XymKdEHrjACb2Vlw+HiKfA2CH8=; b=kbjVGuNAvhxTOSIaBqQHuppU+CIIdoQA6svUkiq7pSPwmuQEozvAykptrEazrLvcSsQ2IhO7IRTZlBpTZ4Z1gEuEEoiI9S1UiQ8hmWuZQl2B0vPYXEgVmVBAZlfTUQLaW8hRqtOu0saZckQFyO7qjWC/qiOYcIbc1aU+hwoLSeV+CqykRnkv0FmgSBFOugrUxHNhjvSuKMHDPl0tq+iK26qV2qsNHWtuq9qqpCDjiVIOJaef555e+X8RquK9IqU9tbjrtvzaBhxXLpAwKVwZ0xJrZvbbNXADFlc42lIAHyx2qzm/pE5QTOEYpiiaCeUCov67tqw2BJ/8RVHblb06PA==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=W9e6X9U7f7faXE3i6o7Wm5pF+s0fuQje42lN5/E07FI8yVi3gPTrREwsXwnFeODAxMx1VNrqykAS3NkZ9ZUg6Cyia/BXWuMbnsOxPwDbk7PMRoOYSgI8zZnKa5MbTrP03wNP/ulFzFy60kMCvegjw9Ckh84cktAszMY5TTUEyUzwhOs1VH2ZYyihJXau5sJ87YwSbY4hndRGMmkUprro2SW1Z0/GuN7mS9e9ezSFm4ryvPaZmI8skHOmNk2VxgWbPxwA7Gki1gPAUj6UeL3bIDf/5RYfe4IY2qzh5fWDzYJ1skGv0ippgNxYN1SU9RfgXtBn8gyliBodYJoZBNsUzA==
- Cc: Juergen Gross <jgross@xxxxxxxx>, Oleksandr Tyshchenko <oleksandr_tyshchenko@xxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Russell King <linux@xxxxxxxxxxxxxxx>, Thomas Gleixner <tglx@xxxxxxxxxxxxx>, Ingo Molnar <mingo@xxxxxxxxxx>, Borislav Petkov <bp@xxxxxxxxx>, Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>, "H. Peter Anvin" <hpa@xxxxxxxxx>, Julien Grall <julien@xxxxxxx>, "Michael S. Tsirkin" <mst@xxxxxxxxxx>, Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Delivery-date: Thu, 02 Jun 2022 19:10:13 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 6/2/22 8:49 AM, Oleksandr wrote:
On 31.05.22 00:00, Oleksandr Tyshchenko wrote:
Hello all.
From: Juergen Gross <jgross@xxxxxxxx>
In order to support virtio in Xen guests add a config option XEN_VIRTIO
enabling the user to specify whether in all Xen guests virtio should
be able to access memory via Xen grant mappings only on the host side.
Also set PLATFORM_VIRTIO_RESTRICTED_MEM_ACCESS feature from the guest
initialization code on Arm and x86 if CONFIG_XEN_VIRTIO is enabled.
Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@xxxxxxxx>
Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>
---
Changes V1 -> V2:
- new patch, split required changes from commit:
"[PATCH V1 3/6] xen/virtio: Add option to restrict memory access under Xen"
- rework according to new platform_has() infrastructure
Changes V2 -> V3:
- add Stefano's R-b
May I please ask for the ack or comments for x86 side here?
Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
|