mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-15 20:47:43 +07:00
64e1f0c531
On s390, protected virtualization guests have to use bounced I/O buffers. That requires some plumbing. Let us make sure, any device that uses DMA API with direct ops correctly is spared from the problems, that a hypervisor attempting I/O to a non-shared page would bring. Signed-off-by: Halil Pasic <pasic@linux.ibm.com> Reviewed-by: Claudio Imbrenda <imbrenda@linux.ibm.com> Reviewed-by: Michael Mueller <mimu@linux.ibm.com> Tested-by: Michael Mueller <mimu@linux.ibm.com> Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
18 lines
413 B
C
18 lines
413 B
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef S390_MEM_ENCRYPT_H__
|
|
#define S390_MEM_ENCRYPT_H__
|
|
|
|
#ifndef __ASSEMBLY__
|
|
|
|
#define sme_me_mask 0ULL
|
|
|
|
static inline bool sme_active(void) { return false; }
|
|
extern bool sev_active(void);
|
|
|
|
int set_memory_encrypted(unsigned long addr, int numpages);
|
|
int set_memory_decrypted(unsigned long addr, int numpages);
|
|
|
|
#endif /* __ASSEMBLY__ */
|
|
|
|
#endif /* S390_MEM_ENCRYPT_H__ */
|