]> xenbits.xensource.com Git - xen.git/commit
x86/altp2m: support for setting restrictions for an array of pages
authorRazvan Cojocaru <rcojocaru@bitdefender.com>
Fri, 30 Mar 2018 15:39:05 +0000 (18:39 +0300)
committerGeorge Dunlap <george.dunlap@citrix.com>
Wed, 4 Apr 2018 13:12:11 +0000 (14:12 +0100)
commit9383de210e747f15d0fd10ade89e35d543fbc4e8
tree76720472d328a0efed778b0c79609fab186f51bd
parent90eff18cc5e16e0749605d88092ecfa4ab126c8f
x86/altp2m: support for setting restrictions for an array of pages

For the default EPT view we have xc_set_mem_access_multi(), which
is able to set an array of pages to an array of access rights with
a single hypercall. However, this functionality was lacking for the
altp2m subsystem, which could only set page restrictions for one
page at a time. This patch addresses the gap.

HVMOP_altp2m_set_mem_access_multi has been added as a HVMOP (as opposed to a
DOMCTL) for consistency with its HVMOP_altp2m_set_mem_access counterpart (and
hence with the original altp2m design, where domains are allowed - with the
proper altp2m access rights - to alter these settings), in the absence of an
official position on the issue from the original altp2m designers.

Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
Signed-off-by: Petre Pircalabu <ppircalabu@bitdefender.com>
Acked-by: Wei Liu <wei.liu2@citrix.com>
Reviewed-by: George Dunlap <george.dunlap@citrix.com>
tools/libxc/include/xenctrl.h
tools/libxc/xc_altp2m.c
xen/arch/x86/hvm/hvm.c
xen/include/Makefile
xen/include/public/hvm/hvm_op.h
xen/include/xlat.lst