From: Christopher Clark <christopher.w.clark@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Lars Kurth <lars.kurth@citrix.com>,
Stefano Stabellini <sstabellini@kernel.org>,
Wei Liu <wei.liu2@citrix.com>,
Ross Philipson <ross.philipson@gmail.com>,
Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
George Dunlap <George.Dunlap@eu.citrix.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
Jason Andryuk <jandryuk@gmail.com>,
Ian Jackson <ian.jackson@eu.citrix.com>,
Rich Persaud <persaur@gmail.com>, Tim Deegan <tim@xen.org>,
Daniel Smith <dpsmith@apertussolutions.com>,
Julien Grall <julien.grall@arm.com>,
Paul Durrant <paul.durrant@citrix.com>,
Jan Beulich <jbeulich@suse.com>,
James McKenzie <james@bromium.com>,
Eric Chanudet <eric.chanudet@gmail.com>,
Roger Pau Monne <roger.pau@citrix.com>
Subject: [PATCH v4 00/14] Argo: hypervisor-mediated interdomain communication
Date: Tue, 15 Jan 2019 01:27:32 -0800 [thread overview]
Message-ID: <1547544466-21135-1-git-send-email-christopher.w.clark@gmail.com> (raw)
Version four of this patch series.
* Changes are primarily addressing feedback from the v3 series reviews.
Many points noted on the invididual commit posts.
* Register ring interfaces uses Xen gfns as page identifiers,
and the arguments no longer specify page granularity.
* Multi-level lock validation macros defined and applied.
Locks renamed to improve readability.
* Hypercall argument struct checking is folded inline into the series,
checks applied as types are introduced.
* argo-mac string boot parameter changed to argo-mac-permissive boolean
Feedback items that are remaining to be addressed have been noted with
comments in the commit message and at the location in the code.
Christopher Clark (14):
argo: Introduce the Kconfig option to govern inclusion of Argo
argo: introduce the argo_op hypercall boilerplate
argo: define argo_dprintk for subsystem debugging
argo: init, destroy and soft-reset, with enable command line opt
errno: add POSIX error codes EMSGSIZE, ECONNREFUSED to the ABI
xen/arm: introduce guest_handle_for_field()
argo: implement the register op
argo: implement the unregister op
argo: implement the sendv op; evtchn: expose send_guest_global_virq
argo: implement the notify op
xsm, argo: XSM control for argo register
xsm, argo: XSM control for argo message send operation
xsm, argo: XSM control for any access to argo by a domain
xsm, argo: notify: don't describe rings that cannot be sent to
docs/misc/xen-command-line.pandoc | 30 +
tools/flask/policy/modules/guest_features.te | 7 +
xen/arch/x86/guest/hypercall_page.S | 2 +-
xen/arch/x86/hvm/hypercall.c | 3 +
xen/arch/x86/hypercall.c | 3 +
xen/arch/x86/pv/hypercall.c | 3 +
xen/common/Kconfig | 19 +
xen/common/Makefile | 3 +-
xen/common/argo.c | 2213 ++++++++++++++++++++++++++
xen/common/compat/argo.c | 62 +
xen/common/domain.c | 12 +
xen/common/event_channel.c | 2 +-
xen/include/Makefile | 1 +
xen/include/asm-arm/guest_access.h | 3 +
xen/include/public/argo.h | 287 ++++
xen/include/public/errno.h | 2 +
xen/include/public/xen.h | 4 +-
xen/include/xen/argo.h | 44 +
xen/include/xen/event.h | 7 +
xen/include/xen/hypercall.h | 9 +
xen/include/xen/sched.h | 5 +
xen/include/xlat.lst | 8 +
xen/include/xsm/dummy.h | 25 +
xen/include/xsm/xsm.h | 31 +
xen/xsm/dummy.c | 6 +
xen/xsm/flask/hooks.c | 41 +-
xen/xsm/flask/policy/access_vectors | 16 +
xen/xsm/flask/policy/security_classes | 1 +
28 files changed, 2841 insertions(+), 8 deletions(-)
create mode 100644 xen/common/argo.c
create mode 100644 xen/common/compat/argo.c
create mode 100644 xen/include/public/argo.h
create mode 100644 xen/include/xen/argo.h
--
2.7.4
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next reply other threads:[~2019-01-15 9:27 UTC|newest]
Thread overview: 42+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-01-15 9:27 Christopher Clark [this message]
2019-01-15 9:27 ` [PATCH v4 01/14] argo: Introduce the Kconfig option to govern inclusion of Argo Christopher Clark
2019-01-15 9:27 ` [PATCH v4 02/14] argo: introduce the argo_op hypercall boilerplate Christopher Clark
2019-01-15 9:27 ` [PATCH v4 03/14] argo: define argo_dprintk for subsystem debugging Christopher Clark
2019-01-15 9:27 ` [PATCH v4 04/14] argo: init, destroy and soft-reset, with enable command line opt Christopher Clark
2019-01-15 12:29 ` Roger Pau Monné
2019-01-15 12:42 ` Jan Beulich
2019-01-15 14:16 ` Roger Pau Monné
2019-01-15 14:15 ` Ian Jackson
2019-01-16 1:07 ` Christopher Clark
2019-01-15 9:27 ` [PATCH v4 05/14] errno: add POSIX error codes EMSGSIZE, ECONNREFUSED to the ABI Christopher Clark
2019-01-15 9:27 ` [PATCH v4 06/14] xen/arm: introduce guest_handle_for_field() Christopher Clark
2019-01-15 9:27 ` [PATCH v4 07/14] argo: implement the register op Christopher Clark
2019-01-15 14:40 ` Roger Pau Monné
2019-01-15 22:37 ` Christopher Clark
2019-01-15 9:27 ` [PATCH v4 08/14] argo: implement the unregister op Christopher Clark
2019-01-15 15:03 ` Roger Pau Monné
2019-01-17 6:40 ` Christopher Clark
2019-01-15 9:27 ` [PATCH v4 09/14] argo: implement the sendv op; evtchn: expose send_guest_global_virq Christopher Clark
2019-01-15 15:49 ` Roger Pau Monné
2019-01-15 16:10 ` Jan Beulich
2019-01-15 16:19 ` Roger Pau Monné
2019-01-17 6:48 ` Christopher Clark
2019-01-17 10:53 ` Roger Pau Monné
2019-01-15 9:27 ` [PATCH v4 10/14] argo: implement the notify op Christopher Clark
2019-01-15 16:17 ` Roger Pau Monné
2019-01-17 6:54 ` Christopher Clark
2019-01-17 11:12 ` Roger Pau Monné
2019-01-17 12:04 ` Jan Beulich
2019-01-17 21:44 ` Christopher Clark
2019-01-18 9:44 ` Roger Pau Monné
2019-01-18 23:54 ` Christopher Clark
2019-01-18 23:59 ` Christopher Clark
2019-01-19 12:06 ` Roger Pau Monné
2019-01-21 1:59 ` Christopher Clark
2019-01-21 8:21 ` Roger Pau Monné
2019-01-15 9:27 ` [PATCH v4 11/14] xsm, argo: XSM control for argo register Christopher Clark
2019-01-15 9:27 ` [PATCH v4 12/14] xsm, argo: XSM control for argo message send operation Christopher Clark
2019-01-15 9:27 ` [PATCH v4 13/14] xsm, argo: XSM control for any access to argo by a domain Christopher Clark
2019-01-15 9:27 ` [PATCH v4 14/14] xsm, argo: notify: don't describe rings that cannot be sent to Christopher Clark
2019-01-15 16:34 ` [PATCH v4 00/14] Argo: hypervisor-mediated interdomain communication Roger Pau Monné
2019-01-15 22:39 ` Christopher Clark
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1547544466-21135-1-git-send-email-christopher.w.clark@gmail.com \
--to=christopher.w.clark@gmail.com \
--cc=George.Dunlap@eu.citrix.com \
--cc=andrew.cooper3@citrix.com \
--cc=dpsmith@apertussolutions.com \
--cc=eric.chanudet@gmail.com \
--cc=ian.jackson@eu.citrix.com \
--cc=james@bromium.com \
--cc=jandryuk@gmail.com \
--cc=jbeulich@suse.com \
--cc=julien.grall@arm.com \
--cc=konrad.wilk@oracle.com \
--cc=lars.kurth@citrix.com \
--cc=paul.durrant@citrix.com \
--cc=persaur@gmail.com \
--cc=roger.pau@citrix.com \
--cc=ross.philipson@gmail.com \
--cc=sstabellini@kernel.org \
--cc=tim@xen.org \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.