[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v4 1/8] public / x86: Introduce __HYPERCALL_dm_op...


  • To: Paul Durrant <paul.durrant@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  • Date: Wed, 18 Jan 2017 14:18:15 -0500
  • Cc: Ian Jackson <ian.jackson@xxxxxxxxxx>, Jennifer Herbert <jennifer.herbert@xxxxxxxxxx>, Wei Liu <wei.liu2@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Delivery-date: Wed, 18 Jan 2017 19:18:20 +0000
  • Ironport-phdr: 9a23:RYOyJR1VgNavDRlzsmDT+DRfVm0co7zxezQtwd8ZsesULv3xwZ3uMQTl6Ol3ixeRBMOAuq4C0Lud6vq4EUU7or+5+EgYd5JNUxJXwe43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQviPgRpOOv1BpTSj8Oq3Oyu5pHfeQtFiT6ybL9oIhi7qQrdutQIjYd+N6081gbHrnxUdupM2GhmP0iTnxHy5sex+J5s7SFdsO8/+sBDTKv3Yb02QaRXAzo6PW814tbrtQTYQguU+nQcSGQWnQFWDAXD8Rr3Q43+sir+tup6xSmaIcj7Rq06VDi+86tmTgLjhTwZPDAl7m7Yls1wjLpaoB2/oRx/35XUa5yROPZnY6/RYc8WSW9HU8lfTSxBBp63YZUJAeQPIO1Uq5Dxq0USoRe7AwSnGeHhxSJShnLuwKM0zeohHwHB3AIjEdwBvnvbo9fpO6kdSu210KvFwC/fY/9K1zrw6I7FeQ0hr/GWWrJwdNLcx0c1GAPDj1Wft4jlNC6b2OsTrmOV7vBgWvi1hG4ptgp8pSWgxsgxhYbXiYIV0ErL+D5lwIc1OdK4SEl7bcSiEJtLrS6WLYR2QsQ8Q2xxvisx174IuYajcSQXx5kqyATTZvyaf4SS/B7uW/idLS1liH9jZbmxnQy98VK6xe35TsS01VFKoTdbndTUrXAN0gDT6tCASvtg4ketwTaP2B7X6uFDOU00ibDUK4Qgwr4tjZofq1jDHy/ql0X2i6+abEMk9fSz6+v7eLnmo56cN4tshgH/NKQhhNC/DPwlPgUBUGWX4+Sx2KD58UHnT7hGkOc6nrTBvJDfP8sbp6q5AwFP0oYk7hayFyqp0NsFknYZI1JFYgiIgpP1O1DOPP/4DfC/j06qkDdw3f/KJLLhApLTLnTbirfuYa5961JAyAo01d1f/4hbCqwFIP7pR0DxqcbYDgUjPAyy3+bqE8ly1oICWWKVA6+YP7nevkOP5uIqO+OMfpMauC7hK/g54P7jlXA4lkEbfaWwwJQYdm64EepiI0iCZXrsg8wBEXsRvgYkQ+3llluCUSZJZ3a1XaIz+C00CJ68AYfEXICtj6SL3D2nEZ1OemBGFleMHG/pd4qeXfcAciCSLdV9nTwHTrihTIkh2Aqyuw/717pnNOvU+yICuZ3/09h14vXZlQsu+jxsE8Sdz2aNQnl2nmwWQT822qF/oUJjxVeZy6R4g+JXFcZI6PxXSAc6KYXRwPB7C9DuQALBf9iIREy6TdWhBDE7VsgxzMMWY0ZhB9WiiQjO3iS0DL8UjbCLAJ008r/C03XqO8l9ymrG1LMgj1gpWMdAKWqmhqtn/QjJG4HJi1mZl7qtdakE3i7C73mMzXeKvEFZTAFwUb7IXWsCZkvNs9v1/F/NT7irCb4/KAtO1daCKrdWat3ulVhJXvHjN8nEY22vlWa8HwqHxrSLbIryZWodxivQBVMYnAAS4XaGLwk+Byi7r23CCzxuEAGnX0S5yeBjrDuXU1UuxgeWJxl53qexvBIIn+aVTe871bMYoiYx7T5zGQD5l8LbDZ+MqhRseI1YYMgh+xFX2GTBrQt/M5e8aad4iQ0waQNy6m/n0RR6Ds1snIAFtnojwkImJa2U3VxbfhuEzJvwPfvRMWC08xexPf2FkmrC2cqbr/9coM8zrE/u6UTwTBIv
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>

On 01/17/2017 12:29 PM, Paul Durrant wrote:
...as a set of hypercalls to be used by a device model.

As stated in the new docs/designs/dm_op.markdown:

"The aim of DMOP is to prevent a compromised device model from
compromising domains other then the one it is associated with. (And is
therefore likely already compromised)."

See that file for further information.

This patch simply adds the boilerplate for the hypercall.

Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
Suggested-by: Ian Jackson <ian.jackson@xxxxxxxxxx>
Suggested-by: Jennifer Herbert <jennifer.herbert@xxxxxxxxxx>

Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.