bitkeeper revision 1.1236.1.117 (4241709cmfgF-94U74o-PmIJUmoksQ)
authorkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Wed, 23 Mar 2005 13:35:24 +0000 (13:35 +0000)
committerkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Wed, 23 Mar 2005 13:35:24 +0000 (13:35 +0000)
commit4e4051276be9219ee0801010fee53a35483801a1
tree0a1d2d994579f136a4effbee0528e741c9e6c10d
parentf2c02d5c96e23d5fad550f5fe417beec0ac60255
bitkeeper revision 1.1236.1.117 (4241709cmfgF-94U74o-PmIJUmoksQ)

Fix iopl/iobitmap interfaces. Control tools can set per-domain
access limits via DOM0_IOPL_PERMISSION/DOM0_IOPORT_PERMISSION.
Guests can set current permissions per VCPU via physdev ops.
These will always succeed -- checking against admin-set limits is
done at access time.
Signed-off-by: Keir Fraser <keir@xensource.com>
18 files changed:
.rootkeys
linux-2.4.29-xen-sparse/arch/xen/kernel/ioport.c [new file with mode: 0644]
linux-2.4.29-xen-sparse/arch/xen/kernel/process.c
linux-2.4.29-xen-sparse/arch/xen/kernel/setup.c
linux-2.4.29-xen-sparse/mkbuildtree
linux-2.6.11-xen-sparse/arch/xen/i386/kernel/ioport.c
linux-2.6.11-xen-sparse/arch/xen/i386/kernel/process.c
linux-2.6.11-xen-sparse/arch/xen/i386/kernel/setup.c
xen/arch/x86/dom0_ops.c
xen/arch/x86/domain.c
xen/arch/x86/setup.c
xen/arch/x86/traps.c
xen/common/domain.c
xen/common/physdev.c
xen/include/asm-x86/domain.h
xen/include/asm-x86/processor.h
xen/include/public/dom0_ops.h
xen/include/public/physdev.h