aboutsummaryrefslogtreecommitdiffstats
path: root/xen/arch/x86/physdev.c
diff options
context:
space:
mode:
authorDaniel De Graaf <dgdegra@tycho.nsa.gov>2013-01-10 17:32:10 +0000
committerDaniel De Graaf <dgdegra@tycho.nsa.gov>2013-01-10 17:32:10 +0000
commit11e65dc903a6b93919c9a69278499ac85332207c (patch)
tree781e8ca61cab16fef9637af42847f14b0dd35ed2 /xen/arch/x86/physdev.c
parentd05b3ddfdc8bb4c51c9764a6afaf7a3cce4a15fd (diff)
downloadxen-11e65dc903a6b93919c9a69278499ac85332207c.tar.gz
xen-11e65dc903a6b93919c9a69278499ac85332207c.tar.bz2
xen-11e65dc903a6b93919c9a69278499ac85332207c.zip
arch/x86: add distinct XSM hooks for map/unmap
The xsm_iomem_permission and xsm_ioport_permission hooks are intended to be called by the domain builder, while the calls in arch/x86/domctl.c which control mapping are also performed by the device model. Because these operations require distinct access control policies, they cannot use the same XSM hooks. This also adds a missing XSM hook in the unbind IRQ domctl. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Acked-by: Jan Beulich <jbeulich@suse.com> Committed-by: Keir Fraser <keir@xen.org>
Diffstat (limited to 'xen/arch/x86/physdev.c')
-rw-r--r--xen/arch/x86/physdev.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/xen/arch/x86/physdev.c b/xen/arch/x86/physdev.c
index a041783022..7800473894 100644
--- a/xen/arch/x86/physdev.c
+++ b/xen/arch/x86/physdev.c
@@ -242,7 +242,7 @@ int physdev_unmap_pirq(domid_t domid, int pirq)
if ( !IS_PRIV_FOR(current->domain, d) )
goto free_domain;
- ret = xsm_irq_permission(d, domain_pirq_to_irq(d, pirq), 0);
+ ret = xsm_unmap_domain_pirq(d, domain_pirq_to_irq(d, pirq));
if ( ret )
goto free_domain;