arch/x86: add distinct XSM hooks for map/unmap
authorDaniel De Graaf <dgdegra@tycho.nsa.gov>
Thu, 10 Jan 2013 17:32:10 +0000 (17:32 +0000)
committerDaniel De Graaf <dgdegra@tycho.nsa.gov>
Thu, 10 Jan 2013 17:32:10 +0000 (17:32 +0000)
commit11e65dc903a6b93919c9a69278499ac85332207c
tree781e8ca61cab16fef9637af42847f14b0dd35ed2
parentd05b3ddfdc8bb4c51c9764a6afaf7a3cce4a15fd
arch/x86: add distinct XSM hooks for map/unmap

The xsm_iomem_permission and xsm_ioport_permission hooks are intended
to be called by the domain builder, while the calls in
arch/x86/domctl.c which control mapping are also performed by the
device model.  Because these operations require distinct access
control policies, they cannot use the same XSM hooks.

This also adds a missing XSM hook in the unbind IRQ domctl.

Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Acked-by: Jan Beulich <jbeulich@suse.com>
Committed-by: Keir Fraser <keir@xen.org>
xen/arch/x86/domctl.c
xen/arch/x86/physdev.c
xen/include/xsm/dummy.h
xen/include/xsm/xsm.h
xen/xsm/dummy.c
xen/xsm/flask/hooks.c