[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v6 00/15] Argo: hypervisor-mediated interdomain communication
Posting an updated version (six) of this series with fixes for people who are testing. Does not include changes for open discussion items. Fixes include: * Compat validation macros: - struct fields converted to use "struct form" in their declarations - dropped the overrides; using the struct validator rather than field - dropped the compat/argo.c file * Notify op: indicates the "cannot queue a space available notification" condition via a flag to the caller instead of erroring the operation; enables the queries about other rings in the same op to continue. Reordered flags while there: static conditions first, errors last. * Various fixes: - return EFAULT in sendv case of do_argo_op - WARN not ERR log level on encountering empty iovs - removed redundant bounds check in sendv vs MAX_ARGO_MESSAGE_SIZE - tabs for indentation in MAINTAINERS - added comment explaining tx_ptr rounding after iovs processing - BUILD_BUG_ON check for MAX_RING_SIZE align to PAGE_SIZE - use gprintk for error on denied registration of existing ring Christopher Clark (15): argo: Introduce the Kconfig option to govern inclusion of Argo argo: introduce the argo_op hypercall boilerplate argo: define argo_dprintk for subsystem debugging argo: init, destroy and soft-reset, with enable command line opt errno: add POSIX error codes EMSGSIZE, ECONNREFUSED to the ABI xen/arm: introduce guest_handle_for_field() argo: implement the register op argo: implement the unregister op argo: implement the sendv op; evtchn: expose send_guest_global_virq argo: implement the notify op xsm, argo: XSM control for argo register xsm, argo: XSM control for argo message send operation xsm, argo: XSM control for any access to argo by a domain xsm, argo: notify: don't describe rings that cannot be sent to MAINTAINERS: add new section for Argo and self as maintainer MAINTAINERS | 7 + docs/misc/xen-command-line.pandoc | 20 + tools/flask/policy/modules/guest_features.te | 7 + xen/arch/x86/guest/hypercall_page.S | 2 +- xen/arch/x86/hvm/hypercall.c | 3 + xen/arch/x86/hypercall.c | 3 + xen/arch/x86/pv/hypercall.c | 3 + xen/common/Kconfig | 19 + xen/common/Makefile | 1 + xen/common/argo.c | 2321 ++++++++++++++++++++++++++ xen/common/domain.c | 9 + xen/common/event_channel.c | 2 +- xen/include/Makefile | 1 + xen/include/asm-arm/guest_access.h | 3 + xen/include/public/argo.h | 283 ++++ xen/include/public/errno.h | 2 + xen/include/public/xen.h | 4 +- xen/include/xen/argo.h | 44 + xen/include/xen/event.h | 7 + xen/include/xen/hypercall.h | 9 + xen/include/xen/sched.h | 5 + xen/include/xlat.lst | 8 + xen/include/xsm/dummy.h | 25 + xen/include/xsm/xsm.h | 31 + xen/xsm/dummy.c | 6 + xen/xsm/flask/hooks.c | 41 +- xen/xsm/flask/policy/access_vectors | 16 + xen/xsm/flask/policy/security_classes | 1 + 28 files changed, 2876 insertions(+), 7 deletions(-) create mode 100644 xen/common/argo.c create mode 100644 xen/include/public/argo.h create mode 100644 xen/include/xen/argo.h -- 2.7.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |