diff options
author | Daniel De Graaf <dgdegra@tycho.nsa.gov> | 2012-02-29 13:48:41 +0000 |
---|---|---|
committer | Daniel De Graaf <dgdegra@tycho.nsa.gov> | 2012-02-29 13:48:41 +0000 |
commit | 88683bd3730236b9b15afa602514a93691432870 (patch) | |
tree | 09c9e61e8884c59d97b596408e6f21ae2e61f520 /xen/common/event_channel.c | |
parent | 42d446c595a99c0a57b3b597dd679da8b2e4ce74 (diff) | |
download | xen-88683bd3730236b9b15afa602514a93691432870.tar.gz xen-88683bd3730236b9b15afa602514a93691432870.tar.bz2 xen-88683bd3730236b9b15afa602514a93691432870.zip |
xsm: expose context of event channel peers
This hypercall allows a domain to identify the security context of a
domain that it is communicating with using the interdomain event
channel that it is using for the communication. This can be used to
augment Xen's security permissions with intra-domain security checks.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Committed-by: Keir Fraser <keir@xen.org>
Diffstat (limited to 'xen/common/event_channel.c')
-rw-r--r-- | xen/common/event_channel.c | 8 |
1 files changed, 0 insertions, 8 deletions
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c index c69d2c753e..17ccb84ad2 100644 --- a/xen/common/event_channel.c +++ b/xen/common/event_channel.c @@ -32,14 +32,6 @@ #include <public/event_channel.h> #include <xsm/xsm.h> -#define bucket_from_port(d,p) \ - ((d)->evtchn[(p)/EVTCHNS_PER_BUCKET]) -#define port_is_valid(d,p) \ - (((p) >= 0) && ((p) < MAX_EVTCHNS(d)) && \ - (bucket_from_port(d,p) != NULL)) -#define evtchn_from_port(d,p) \ - (&(bucket_from_port(d,p))[(p)&(EVTCHNS_PER_BUCKET-1)]) - #define ERROR_EXIT(_errno) \ do { \ gdprintk(XENLOG_WARNING, \ |