[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 2/5] xsm: label xen-consumer event channels
Event channels created during the domain build process for HVM domains did not call the XSM creation hook. Since these channels are used internally by Xen, redirect them to DOMAIN_INVAID instead of failing to create if the XSM hook fails the permissions check. Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> --- xen/common/event_channel.c | 8 +++++++- 1 files changed, 7 insertions(+), 1 deletions(-) diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c index 989ebae..ce309da 100644 --- a/xen/common/event_channel.c +++ b/xen/common/event_channel.c @@ -1106,6 +1106,7 @@ int alloc_unbound_xen_event_channel( struct evtchn *chn; struct domain *d = local_vcpu->domain; int port; + int rc; spin_lock(&d->event_lock); @@ -1113,10 +1114,15 @@ int alloc_unbound_xen_event_channel( goto out; chn = evtchn_from_port(d, port); + rc = xsm_evtchn_unbound(d, chn, remote_domid); + chn->state = ECS_UNBOUND; chn->xen_consumer = get_xen_consumer(notification_fn); chn->notify_vcpu_id = local_vcpu->vcpu_id; - chn->u.unbound.remote_domid = remote_domid; + if ( rc ) + chn->u.unbound.remote_domid = DOMID_INVALID; + else + chn->u.unbound.remote_domid = remote_domid; out: spin_unlock(&d->event_lock); -- 1.7.7.6 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |