From mboxrd@z Thu Jan 1 00:00:00 1970 From: Daniel De Graaf Subject: [PATCH 00/10] FLASK updates: MSI interrupts, cleanups Date: Tue, 31 Jan 2012 16:26:08 -0500 Message-ID: <1328045178-30665-1-git-send-email-dgdegra@tycho.nsa.gov> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: xen-devel@lists.xensource.com List-Id: xen-devel@lists.xenproject.org This patch set adds XSM security labels to useful debugging output locations, and fixes some assumptions that all interrupts behaved like GSI interrupts (which had useful non-dynamic IDs). It also cleans up the policy build process and adds an example of how to use the user field in the security context. Debug output: [PATCH 01/10] xsm: Add security labels to event-channel dump [PATCH 02/10] xsm: Add security label to IRQ debug output MSI interrupt fixes: [PATCH 03/10] xsm/flask: Use PCI device label for PCI-MSI IRQs [PATCH 04/10] xsm: Add xsm_map_domain_pirq hook [PATCH 05/10] xsm: Use mapped IRQ not PIRQ in unmap_domain_pirq Cleanup: [PATCH 06/10] xsm/flask: Improve error reporting for ocontexts [PATCH 07/10] xsm/flask: Remove useless back pointers [PATCH 08/10] flask/policy: Policy build updates [PATCH 09/10] flask/policy: Add user and constraint examples [PATCH 10/10] flask/policy: use declare_domain for dom0_t