If mem-sharing, mem-paging, or log-dirty functionality is not enabled
for architecture when HAS_PCI is enabled, the compiler will throw an
error.
Move code to x86 specific file to fix compilation error.
Also, modify the code to use likely() in place of unlikley() for each
condition to make code more optimized.
No functional change intended.
Signed-off-by: Rahul Singh <rahul.singh@arm.com>
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
#include <xen/iommu.h>
#include <xen/irq.h>
#include <xen/param.h>
-#include <xen/vm_event.h>
#include <xen/delay.h>
#include <xen/keyhandler.h>
#include <xen/event.h>
if ( !is_iommu_enabled(d) )
return 0;
- /* Prevent device assign if mem paging or mem sharing have been
- * enabled for this domain */
- if ( d != dom_io &&
- unlikely(mem_sharing_enabled(d) ||
- vm_event_check_ring(d->vm_event_paging) ||
- p2m_get_hostp2m(d)->global_logdirty) )
+ if ( !arch_iommu_use_permitted(d) )
return -EXDEV;
/* device_assigned() should already have cleared the device for assignment */
#include <xen/guest_access.h>
#include <xen/event.h>
#include <xen/softirq.h>
+#include <xen/vm_event.h>
#include <xsm/xsm.h>
#include <asm/hvm/io.h>
return pg;
}
+bool arch_iommu_use_permitted(const struct domain *d)
+{
+ /*
+ * Prevent device assign if mem paging, mem sharing or log-dirty
+ * have been enabled for this domain.
+ */
+ return d == dom_io ||
+ (likely(!mem_sharing_enabled(d)) &&
+ likely(!vm_event_check_ring(d->vm_event_paging)) &&
+ likely(!p2m_get_hostp2m(d)->global_logdirty));
+}
+
/*
* Local variables:
* mode: C
extern struct spinlock iommu_pt_cleanup_lock;
extern struct page_list_head iommu_pt_cleanup_list;
+bool arch_iommu_use_permitted(const struct domain *d);
+
#endif /* _IOMMU_H_ */
/*