diff options
author | Daniel De Graaf <dgdegra@tycho.nsa.gov> | 2013-01-23 09:18:50 +0000 |
---|---|---|
committer | Daniel De Graaf <dgdegra@tycho.nsa.gov> | 2013-01-23 09:18:50 +0000 |
commit | 00b70689c193b9cccb1fac3c3764bed77e152c4e (patch) | |
tree | 7407375dc345426e1300ac53bd7ea166996856a8 /xen/xsm/dummy.c | |
parent | db984809d61b1c605d22520b89fa393bcb21430a (diff) | |
download | xen-00b70689c193b9cccb1fac3c3764bed77e152c4e.tar.gz xen-00b70689c193b9cccb1fac3c3764bed77e152c4e.tar.bz2 xen-00b70689c193b9cccb1fac3c3764bed77e152c4e.zip |
xen/arch/x86: complete XSM hooks on irq/pirq mappings
Manipulation of a domain's pirq namespace was not fully protected by
XSM hooks because the XSM hooks for IRQs needed a physical IRQ. Since
this may not apply to HVM domains, a complete solution needs to split
the XSM hook for this operation, using one hook for the PIRQ
manipulation and one for controlling access to the hardware IRQ.
This reworking has the advantage of providing the same MSI data to
remove_irq that is provided to add_irq, allowing the PCI device to be
determined in both functions. It also eliminates the last callers of
rcu_lock_target_domain_by_id in x86 and common code in preparation for
this function's removal.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Committed-by: Keir Fraser <keir@xen.org>
Diffstat (limited to 'xen/xsm/dummy.c')
-rw-r--r-- | xen/xsm/dummy.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/xen/xsm/dummy.c b/xen/xsm/dummy.c index 5031e163a9..dcd3e31526 100644 --- a/xen/xsm/dummy.c +++ b/xen/xsm/dummy.c @@ -76,7 +76,9 @@ void xsm_fixup_ops (struct xsm_operations *ops) set_to_dummy_if_null(ops, show_irq_sid); set_to_dummy_if_null(ops, map_domain_pirq); + set_to_dummy_if_null(ops, map_domain_irq); set_to_dummy_if_null(ops, unmap_domain_pirq); + set_to_dummy_if_null(ops, unmap_domain_irq); set_to_dummy_if_null(ops, irq_permission); set_to_dummy_if_null(ops, iomem_permission); set_to_dummy_if_null(ops, iomem_mapping); |