aboutsummaryrefslogtreecommitdiffstats
path: root/xen/common/event_channel.c
diff options
context:
space:
mode:
authorDaniel De Graaf <dgdegra@tycho.nsa.gov>2012-02-29 13:48:41 +0000
committerDaniel De Graaf <dgdegra@tycho.nsa.gov>2012-02-29 13:48:41 +0000
commit88683bd3730236b9b15afa602514a93691432870 (patch)
tree09c9e61e8884c59d97b596408e6f21ae2e61f520 /xen/common/event_channel.c
parent42d446c595a99c0a57b3b597dd679da8b2e4ce74 (diff)
downloadxen-88683bd3730236b9b15afa602514a93691432870.tar.gz
xen-88683bd3730236b9b15afa602514a93691432870.tar.bz2
xen-88683bd3730236b9b15afa602514a93691432870.zip
xsm: expose context of event channel peers
This hypercall allows a domain to identify the security context of a domain that it is communicating with using the interdomain event channel that it is using for the communication. This can be used to augment Xen's security permissions with intra-domain security checks. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org>
Diffstat (limited to 'xen/common/event_channel.c')
-rw-r--r--xen/common/event_channel.c8
1 files changed, 0 insertions, 8 deletions
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index c69d2c753e..17ccb84ad2 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -32,14 +32,6 @@
#include <public/event_channel.h>
#include <xsm/xsm.h>
-#define bucket_from_port(d,p) \
- ((d)->evtchn[(p)/EVTCHNS_PER_BUCKET])
-#define port_is_valid(d,p) \
- (((p) >= 0) && ((p) < MAX_EVTCHNS(d)) && \
- (bucket_from_port(d,p) != NULL))
-#define evtchn_from_port(d,p) \
- (&(bucket_from_port(d,p))[(p)&(EVTCHNS_PER_BUCKET-1)])
-
#define ERROR_EXIT(_errno) \
do { \
gdprintk(XENLOG_WARNING, \