|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] XSM support for recently added priv hypercall ops
The attached patch provides an update to XSM and the associated
security modules. This patch enables
XSM to interpose on the recently added privileged hypercall operations
as well as refactors the existing
IO assignment hooks.
The patch applies cleanly against changeset 16606:8f0cbfc478d6.
Signed-off by: George Coker <george.coker@xxxxxxxxx>, <gscoker@xxxxxxxxxxxxxx>
XSM:
The following hooks are added:
xsm_sendtrigger
xsm_test_assign_device
xsm_assign_device
xsm_bind_pt_irq
xsm_pin_mem_cacheattr
xsm_ext_vcpucontext
xsm_firmware_info
xsm_acpi_sleep
xsm_change_freq
xsm_getideltime
xsm_debug_keys
xsm_getcpuinfo
xsm_availheap
xsm_add_range
xsm_remove_range
The following hooks are deprecated:
xsm_irq_permission
xsm_iomem_permission
xsm_ioport_permission
The functionality provided by the deprecated hooks has been refactored
into the xsm_add_range and
xsm_remove_range hooks. The refactoring enables XSM to centralize the
interposition on IO resource
assignment. The refactoring was necessitated by the addition of the
XEN_DOMCTL_memory_mapping
and XEN_DOMCTL_ioport_mapping operations to support HVM domains.
ACM:
- no updates to ACM
FLASK:
- updated and refactored to implement the new XSM hooks
update-xsm-121307-xen-16606.diff
Description: Binary data
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] XSM support for recently added priv hypercall ops,
George S. Coker, II <=
|
|
|
|
|