aboutsummaryrefslogtreecommitdiffstats
path: root/xen/xsm/flask/policy/access_vectors
diff options
context:
space:
mode:
authorDaniel De Graaf <dgdegra@tycho.nsa.gov>2013-04-23 11:54:01 +0200
committerJan Beulich <jbeulich@suse.com>2013-04-23 11:54:01 +0200
commit4bc22a50ebc1fb1695d59f69105797e208021edb (patch)
tree6f01eb36d8f62b7f1d203c4e6bbd8067338a540d /xen/xsm/flask/policy/access_vectors
parentbb812101db5117e07de1b557b355c3855850cc95 (diff)
downloadxen-4bc22a50ebc1fb1695d59f69105797e208021edb.tar.gz
xen-4bc22a50ebc1fb1695d59f69105797e208021edb.tar.bz2
xen-4bc22a50ebc1fb1695d59f69105797e208021edb.zip
x86/hvm: convert access check for nested HVM to XSM
This adds an XSM hook for enabling nested HVM support, replacing an IS_PRIV check. This hook is a partial duplicate with the xsm_hvm_param hook, but using the existing hook would require adding the index to the hook and would require the use of a custom hook for the xsm-disabled case (using XSM_OTHER, which is less immediately readable) - whereas adding a new hook retains the clarity of the existing code. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Acked-by: George Dunlap <george.dunlap@eu.citrix.com> (release perspective)
Diffstat (limited to 'xen/xsm/flask/policy/access_vectors')
-rw-r--r--xen/xsm/flask/policy/access_vectors2
1 files changed, 2 insertions, 0 deletions
diff --git a/xen/xsm/flask/policy/access_vectors b/xen/xsm/flask/policy/access_vectors
index fdfc50245a..36b8b2c271 100644
--- a/xen/xsm/flask/policy/access_vectors
+++ b/xen/xsm/flask/policy/access_vectors
@@ -234,6 +234,8 @@ class hvm
# source = domain whose memory is being shared
# target = client domain
share_mem
+# HVMOP_set_param setting HVM_PARAM_NESTEDHVM
+ nested
}
# Class event describes event channels. Interdomain event channels have their