CONFIG_EXPERT=y
CONFIG_GRANT_TABLE=n
CONFIG_LIVEPATCH=n
- CONFIG_MEM_ACCESS=n
CONFIG_QEMU_PLATFORM=y
+ CONFIG_VM_EVENT=n
CONFIG_XSM=n
debian-12-riscv64-gcc-randconfig:
obj-y += kernel.init.o
obj-$(CONFIG_LIVEPATCH) += livepatch.o
obj-$(CONFIG_LLC_COLORING) += llc-coloring.o
-obj-$(CONFIG_MEM_ACCESS) += mem_access.o
+obj-$(CONFIG_VM_EVENT) += mem_access.o
obj-y += mm.o
obj-y += monitor.o
obj-y += p2m.o
# Architecture Features
#
# CONFIG_GICV3 is not set
-# CONFIG_MEM_ACCESS is not set
+# CONFIG_VM_EVENT is not set
# CONFIG_SBSA_VUART_CONSOLE is not set
#
* Send mem event based on the access. Boolean return value indicates if trap
* needs to be injected into guest.
*/
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
bool p2m_mem_access_check(paddr_t gpa, vaddr_t gla, const struct npfec npfec);
struct page_info*
return NULL;
}
-#endif /*CONFIG_MEM_ACCESS*/
+#endif /* CONFIG_VM_EVENT */
#endif /* _ASM_ARM_MEM_ACCESS_H */
/*
# CONFIG_GRANT_TABLE is not set
# CONFIG_SPECULATIVE_HARDEN_ARRAY is not set
-# CONFIG_MEM_ACCESS is not set
+# CONFIG_VM_EVENT is not set
CONFIG_PPC64=y
CONFIG_DEBUG=y
# CONFIG_BOOT_TIME_CPUPOOLS is not set
# CONFIG_GRANT_TABLE is not set
-# CONFIG_MEM_ACCESS is not set
+# CONFIG_VM_EVENT is not set
# CONFIG_COVERAGE is not set
# CONFIG_LIVEPATCH is not set
# CONFIG_XSM is not set
obj-$(CONFIG_ALTP2M) += altp2m.o
obj-$(CONFIG_HVM) += guest_walk_2.o guest_walk_3.o guest_walk_4.o
obj-$(CONFIG_SHADOW_PAGING) += guest_walk_4.o
-obj-$(CONFIG_MEM_ACCESS) += mem_access.o
+obj-$(CONFIG_VM_EVENT) += mem_access.o
obj-$(CONFIG_MEM_PAGING) += mem_paging.o
obj-$(CONFIG_MEM_SHARING) += mem_sharing.o
obj-$(CONFIG_HVM) += nested.o
config MEM_ACCESS_ALWAYS_ON
bool
-config MEM_ACCESS
+config VM_EVENT
def_bool MEM_ACCESS_ALWAYS_ON
prompt "Memory Access and VM events" if !MEM_ACCESS_ALWAYS_ON
depends on HVM
obj-$(CONFIG_KEXEC) += kimage.o
obj-$(CONFIG_LIVEPATCH) += livepatch.o livepatch_elf.o
obj-$(CONFIG_LLC_COLORING) += llc-coloring.o
-obj-$(CONFIG_MEM_ACCESS) += mem_access.o
+obj-$(CONFIG_VM_EVENT) += mem_access.o
obj-y += memory.o
obj-y += multicall.o
obj-y += notifier.o
copyback = true;
break;
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
case XEN_DOMCTL_set_access_required:
if ( unlikely(current->domain == d) ) /* no domain_pause() */
ret = -EPERM;
*/
struct vm_event_st;
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
#include <asm/mem_access.h>
#endif
int p2m_get_mem_access(struct domain *d, gfn_t gfn, xenmem_access_t *access,
unsigned int altp2m_idx);
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
int mem_access_memop(unsigned long cmd,
XEN_GUEST_HANDLE_PARAM(xen_mem_access_op_t) arg);
#else
{
return -ENOSYS;
}
-#endif /* CONFIG_MEM_ACCESS */
+#endif /* CONFIG_VM_EVENT */
#endif /* _XEN_MEM_ACCESS_H */
return xsm_default_action(action, current->domain, d);
}
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
static XSM_INLINE int cf_check xsm_mem_access(XSM_DEFAULT_ARG struct domain *d)
{
XSM_ASSERT_ACTION(XSM_DM_PRIV);
int (*vm_event_control)(struct domain *d, int mode, int op);
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
int (*mem_access)(struct domain *d);
#endif
return alternative_call(xsm_ops.vm_event_control, d, mode, op);
}
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
static inline int xsm_mem_access(xsm_default_t def, struct domain *d)
{
return alternative_call(xsm_ops.mem_access, d);
.vm_event_control = xsm_vm_event_control,
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
.mem_access = xsm_mem_access,
#endif
return current_has_perm(d, SECCLASS_DOMAIN2, DOMAIN2__VM_EVENT);
}
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
static int cf_check flask_mem_access(struct domain *d)
{
return current_has_perm(d, SECCLASS_DOMAIN2, DOMAIN2__MEM_ACCESS);
.vm_event_control = flask_vm_event_control,
-#ifdef CONFIG_MEM_ACCESS
+#ifdef CONFIG_VM_EVENT
.mem_access = flask_mem_access,
#endif