diff options
author | Keir Fraser <keir.fraser@citrix.com> | 2009-10-23 10:04:03 +0100 |
---|---|---|
committer | Keir Fraser <keir.fraser@citrix.com> | 2009-10-23 10:04:03 +0100 |
commit | 545a227dfc099af8b17b6842e097196192658c3e (patch) | |
tree | 032f432b459298c4071a3fbf3030b06f7fedd5d2 /xen/Rules.mk | |
parent | 5dc1050805a0e379bcc273aa8b72db6aede34de5 (diff) | |
download | xen-545a227dfc099af8b17b6842e097196192658c3e.tar.gz xen-545a227dfc099af8b17b6842e097196192658c3e.tar.bz2 xen-545a227dfc099af8b17b6842e097196192658c3e.zip |
passthrough/stubdom: clean up hypercall privilege checking
This patch adds securty checks for pci passthrough related hypercalls
to enforce that the current domain owns the resources that it is about
to remap. It also adds a call to xc_assign_device to xend and removes
the PRIVILEGED_STUBDOMS flags.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Diffstat (limited to 'xen/Rules.mk')
-rw-r--r-- | xen/Rules.mk | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/xen/Rules.mk b/xen/Rules.mk index 731e0cc88c..10847182ae 100644 --- a/xen/Rules.mk +++ b/xen/Rules.mk @@ -11,9 +11,6 @@ crash_debug ?= n gdbsx ?= n frame_pointer ?= n -# Allow some delicate passthrough related hypercalls to be made from a stubdom -privileged_stubdoms ?= y - XEN_ROOT=$(BASEDIR)/.. include $(XEN_ROOT)/Config.mk @@ -56,7 +53,6 @@ CFLAGS-$(perfc) += -DPERF_COUNTERS CFLAGS-$(perfc_arrays) += -DPERF_ARRAYS CFLAGS-$(lock_profile) += -DLOCK_PROFILE CFLAGS-$(frame_pointer) += -fno-omit-frame-pointer -DCONFIG_FRAME_POINTER -CFLAGS-$(privileged_stubdoms) += -DPRIVILEGED_STUBDOMS CFLAGS-$(gdbsx) += -DXEN_GDBSX_CONFIG ifneq ($(max_phys_cpus),) |