WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] XSM support for recently added priv hypercall ops

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] XSM support for recently added priv hypercall ops
From: "George S. Coker, II" <george.coker@xxxxxxxxx>
Date: Thu, 13 Dec 2007 13:43:16 -0500
Cc: gscoker@xxxxxxxxxxxxxx
Delivery-date: Thu, 13 Dec 2007 10:43:43 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to:subject:cc:mime-version:content-type; bh=i0g9DSnpz7JbyBpJkxnIaEwtAyHJMe0jBV2BMwQCZL0=; b=Yw7J2e4ItBhTm7g4bCUy3CiiC5iQ3UYMcZvi4AqNXE4H5AVq0EUzq2HBwQ0LZeBaP5YVeTZjZvpR4cJFTzPUImk49xQGCRe+B0HhPtXMYeduhl2vp9I9dnef1TuP/dH9kQPQW/gIqxPC0zyVtAksxqVU2RAEtFb0Jjf2ggadHbY=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:cc:mime-version:content-type; b=W/Ut4x+kDX2U3n+RAMmC4XJB1QdZmnTlWJdF1Z/zDaeFHzsr38ZDOGfAOBRHlAKNjTPCqsOXM61yazmvk5AL7mt6kp0vMAwS/cP20pbqlVTXo896bB6/L57BsfyEfNOso/Ky8pNw7Fup2ov4lUHQrvY5yLI+PEA3s9uhE/Bvmg0=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
The attached patch provides an update to XSM and the associated
security modules.  This patch enables
XSM to interpose on the recently added privileged hypercall operations
as well as refactors the existing
IO assignment hooks.

The patch applies cleanly against changeset 16606:8f0cbfc478d6.

Signed-off by: George Coker <george.coker@xxxxxxxxx>, <gscoker@xxxxxxxxxxxxxx>

XSM:

The following hooks are added:
    xsm_sendtrigger
    xsm_test_assign_device
    xsm_assign_device
    xsm_bind_pt_irq
    xsm_pin_mem_cacheattr
    xsm_ext_vcpucontext
    xsm_firmware_info
    xsm_acpi_sleep
    xsm_change_freq
    xsm_getideltime
    xsm_debug_keys
    xsm_getcpuinfo
    xsm_availheap
    xsm_add_range
    xsm_remove_range

The following hooks are deprecated:
    xsm_irq_permission
    xsm_iomem_permission
    xsm_ioport_permission

The functionality provided by the deprecated hooks has been refactored
into the xsm_add_range and
xsm_remove_range hooks.  The refactoring enables XSM to centralize the
interposition on IO resource
assignment.  The refactoring was necessitated by the addition of the
XEN_DOMCTL_memory_mapping
and XEN_DOMCTL_ioport_mapping operations to support HVM domains.

ACM:
    - no updates to ACM

FLASK:
     - updated and refactored to implement the new XSM hooks

Attachment: update-xsm-121307-xen-16606.diff
Description: Binary data

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel