/xen/tools/libxc/ |
A D | xc_mem_access.c | 28 xenmem_access_t access, in xc_set_mem_access() argument 36 .access = access, in xc_set_mem_access() 46 uint8_t *access, in xc_set_mem_access_multi() argument 50 DECLARE_HYPERCALL_BOUNCE(access, nr, XC_HYPERCALL_BUFFER_BOUNCE_IN); in xc_set_mem_access_multi() 59 .access = XENMEM_access_default + 1, /* Invalid value */ in xc_set_mem_access_multi() 65 xc_hypercall_bounce_pre(xch, access) ) in xc_set_mem_access_multi() 72 set_xen_guest_handle(mao.access_list, access); in xc_set_mem_access_multi() 76 xc_hypercall_bounce_post(xch, access); in xc_set_mem_access_multi() 85 xenmem_access_t *access) in xc_get_mem_access() argument 98 *access = mao.access; in xc_get_mem_access()
|
A D | xc_altp2m.c | 272 xenmem_access_t access) in xc_altp2m_set_mem_access() argument 285 arg->u.mem_access.access = access; in xc_altp2m_set_mem_access() 321 uint16_t view_id, uint8_t *access, in xc_altp2m_set_mem_access_multi() argument 327 DECLARE_HYPERCALL_BOUNCE(access, nr * sizeof(*access), in xc_altp2m_set_mem_access_multi() 343 xc_hypercall_bounce_pre(xch, access) ) in xc_altp2m_set_mem_access_multi() 350 set_xen_guest_handle(arg->u.set_mem_access_multi.access_list, access); in xc_altp2m_set_mem_access_multi() 356 xc_hypercall_bounce_post(xch, access); in xc_altp2m_set_mem_access_multi() 364 xenmem_access_t *access) in xc_altp2m_get_mem_access() argument 383 *access = arg->u.mem_access.access; in xc_altp2m_get_mem_access()
|
A D | xc_flask.c | 326 err = xc_flask_context_to_sid(xch, (char*)scon, strlen(scon), &op.u.access.ssid); in xc_flask_access() 329 err = xc_flask_context_to_sid(xch, (char*)tcon, strlen(tcon), &op.u.access.tsid); in xc_flask_access() 334 op.u.access.tclass = tclass; in xc_flask_access() 335 op.u.access.req = req; in xc_flask_access() 343 *allowed = op.u.access.allowed; in xc_flask_access() 347 *auditallow = op.u.access.audit_allow; in xc_flask_access() 349 *auditdeny = op.u.access.audit_deny; in xc_flask_access() 351 *seqno = op.u.access.seqno; in xc_flask_access() 353 if ( (op.u.access.allowed & req) != req ) in xc_flask_access()
|
/xen/xen/common/ |
A D | mem_access.c | 70 MEMOP_CMD_MASK, mao.access, 0); in mem_access_memop() 92 xenmem_access_t access; in mem_access_memop() local 102 rc = p2m_get_mem_access(d, _gfn(mao.pfn), &access, 0); in mem_access_memop() 106 mao.access = access; in mem_access_memop() 107 rc = __copy_field_to_guest(arg, &mao, access) ? -EFAULT : 0; in mem_access_memop()
|
/xen/xen/arch/arm/ |
A D | mem_access.c | 28 xenmem_access_t *access) in __p2m_get_mem_access() argument 50 *access = memaccess[p2m->default_access]; in __p2m_get_mem_access() 55 *access = XENMEM_access_rwx; in __p2m_get_mem_access() 62 *access = memaccess[p2m->default_access]; in __p2m_get_mem_access() 80 *access = XENMEM_access_rwx; in __p2m_get_mem_access() 89 *access = memaccess[index]; in __p2m_get_mem_access() 355 uint32_t start, uint32_t mask, xenmem_access_t access, in p2m_set_mem_access() argument 378 switch ( access ) in p2m_set_mem_access() 381 a = memaccess[access]; in p2m_set_mem_access() 445 xenmem_access_t *access, unsigned int altp2m_idx) in p2m_get_mem_access() argument [all …]
|
/xen/tools/libxl/ |
A D | check-xl-disk-parse | 65 one 0 format=raw vdev=hda access=rw target=/dev/vg/guest-volume 82 one 0 format=raw vdev=hdc access=ro devtype=cdrom target=/root/image.iso 95 one 0 backendtype=phy,vdev=xvdb,access=w,target=/dev/vg/guest-volume 110 one 0 vdev=hdc,access=r,devtype=cdrom,target= 122 one 0 vdev=hdc,access=r,devtype=cdrom,format=empty 123 one 0 vdev=hdc,access=r,devtype=cdrom 138 one 0 vdev=xvda,access=w,script=block-iscsi,target=iqn.2001-05.com.equallogic:0-8a0906-23fe93404-c8…
|
/xen/xen/arch/x86/mm/ |
A D | mem_access.c | 42 xenmem_access_t *access) in _p2m_get_mem_access() argument 66 *access = memaccess[p2m->default_access]; in _p2m_get_mem_access() 80 *access = memaccess[a]; in _p2m_get_mem_access() 87 xenmem_access_t access; in p2m_mem_access_emulate_check() local 98 if ( _p2m_get_mem_access(p2m, _gfn(data->gfn), &access) == 0 ) in p2m_mem_access_emulate_check() 100 switch ( access ) in p2m_mem_access_emulate_check() 379 if ( !xenmem_access_to_p2m_access(p2m, access, &a) ) in p2m_set_mem_access() 446 uint8_t access; in p2m_set_mem_access_multi() local 450 copy_from_guest_offset(&access, access_list, start, 1) ) in p2m_set_mem_access_multi() 456 if ( !xenmem_access_to_p2m_access(p2m, access, &a) ) in p2m_set_mem_access_multi() [all …]
|
/xen/tools/tests/xen-access/ |
A D | Makefile | 12 TARGETS-y := xen-access 28 xen-access: xen-access.o Makefile
|
/xen/tools/flask/policy/policy/ |
A D | access_vectors | 1 # Locally defined access vectors 3 # Define access vectors for the security classes defined in security_classes.
|
A D | security_classes | 4 # daemons that need to make access control decisions using the hypervisor's
|
/xen/docs/misc/ |
A D | grant-tables.txt | 9 The first mode of use allows domA to grant domB access to a specific frame, 11 access to the block back driver, so that it may read or write as requested. 13 1. domA creates a grant access reference, and transmits the ref id to domB. 15 3. domB performs the memory access. 66 act->lock : spinlock used to serialize access to active entry state 79 map->flags : ro/rw, mapped for host or device access 96 functions that access members of struct grant_table must acquire a 115 running and must be fully initialized. Once all access to the active 139 Granting a foreign domain access to frames 210 Ending foreign access [all …]
|
A D | vtpm-platforms.txt | 79 the guests with access to vTPMs may not be rebooted without rebooting the entire 93 permitted access to IO memory at 0xfed42; this IO memory is accessible to the 100 # xl block-attach vtpmmgr 'backendtype=phy,backend=hardware,vdev=hda,access=w,target=/dev/lvm/vtpmm… 101 # xl block-attach vtpm-hw 'backendtype=phy,backend=hardware,vdev=hda,access=w,target=/dev/lvm/vtpm-… 102 # xl block-attach vtpm-g1 'backendtype=phy,backend=hardware,vdev=hda,access=w,target=/dev/lvm/vtpm-… 103 # xl block-attach vtpm-g2 'backendtype=phy,backend=hardware,vdev=hda,access=w,target=/dev/lvm/vtpm-… 104 # xl block-attach guest1 'backendtype=phy,backend=hardware,vdev=xvda,access=w,target=/dev/lvm/guest… 105 # xl block-attach guest2 'backendtype=phy,backend=hardware,vdev=xvda,access=w,target=/dev/lvm/guest…
|
/xen/tools/ocaml/xenstored/ |
A D | oxenstored.conf.in | 74 # Xenstored access logs 75 # access-log-file = @XEN_LOG_DIR@/xenstored-access.log 76 # access-log-nb-lines = 13215 78 # access-log-special-ops = false
|
/xen/xen/include/xen/ |
A D | mem_access.h | 78 uint32_t start, uint32_t mask, xenmem_access_t access, 91 int p2m_get_mem_access(struct domain *d, gfn_t gfn, xenmem_access_t *access,
|
/xen/docs/designs/ |
A D | argo.pandoc | 22 and the buffer is isolated from access by any other potential sources 28 requirements for concurrent access to system memory by communicating 33 - Transmit only the intended data, adhering to the access protocol of the data 86 global Argo state is the `L1_global_argo_rwlock` used to coordinate access to 122 In the case where a notification is sent, access to the data structure is 136 * There is a global rwlock (`L1`) to protect access to all of the per-domain 146 The protocol to safely acquire write access to the per-ring data structure, 158 This second sequence grants write access to _all_ of the `argo_ring_info` 191 operations, acquiring a single read lock to enable access to all the argo 427 whilst otherwise allowing concurrent access, via acquiring it with 'read' [all …]
|
/xen/xen/xsm/flask/policy/ |
A D | access_vectors | 2 # Define the access vectors. 322 # GNTTABOP_map_grant_ref with any access 324 # GNTTABOP_map_grant_ref with write access 412 # target = domain which will have access to the resource 416 # target = domain which will no longer have access to the resource 419 # source = domain which will have access to the resource 423 # source = domain which will have access to the resource 430 # source = domain which will have access to the resource 435 # source = domain which will have access to the resource 479 # use the security server to compute an access check [all …]
|
/xen/xen/arch/x86/ |
A D | emul-i8254.c | 242 int channel, access; in pit_ioport_write() local 272 access = (val >> 4) & 3; in pit_ioport_write() 273 if ( access == 0 ) in pit_ioport_write() 279 s->rw_mode = access; in pit_ioport_write() 280 s->read_state = access; in pit_ioport_write() 281 s->write_state = access; in pit_ioport_write()
|
/xen/xen/arch/x86/hvm/ |
A D | monitor.c | 235 xenmem_access_t access; in hvm_monitor_check_p2m() local 247 rc = p2m_get_mem_access(curr->domain, gfn, &access, altp2m_vcpu_idx(curr)); in hvm_monitor_check_p2m() 250 access = XENMEM_access_n; in hvm_monitor_check_p2m() 254 switch ( access ) in hvm_monitor_check_p2m()
|
/xen/tools/flask/policy/modules/ |
A D | dom0.te | 3 # Allow dom0 access to all sysctls, devices, and the security server. 46 # These permissions allow using the FLASK security server to compute access 48 # that does not have its own security server to make access decisions based on
|
/xen/docs/man/ |
A D | xenhypfs.1.pod | 3 xenhypfs - Xen tool to access Xen hypervisor file system 11 The B<xenhypfs> program is used to access the Xen hypervisor file system.
|
A D | xenstore-chmod.1.pod | 34 no access 40 subsequent entries. The key owner always has full access (read,
|
A D | xenstore-ls.1.pod | 44 no access 50 subsequent entries. The key owner always has full access (read,
|
/xen/stubdom/ |
A D | pciutils.patch | 1 diff -urN pciutils-2.2.9.orig/lib/access.c pciutils-2.2.9/lib/access.c 2 --- pciutils-2.2.9.orig/lib/access.c 2007-02-06 11:59:43.000000000 +0000 3 +++ pciutils-2.2.9/lib/access.c 2008-06-30 19:07:09.713187000 +0100 69 + * The PCI Library -- MiniOS PCI frontend access
|
/xen/xen/xsm/flask/ |
A D | hooks.c | 841 static inline u32 resource_to_perm(uint8_t access) in resource_to_perm() argument 843 if ( access ) in resource_to_perm() 999 static int flask_irq_permission (struct domain *d, int pirq, uint8_t access) in flask_irq_permission() argument 1002 return current_has_perm(d, SECCLASS_RESOURCE, resource_to_perm(access)); in flask_irq_permission() 1036 resource_to_perm(access)); in flask_iomem_permission() 1040 if ( access ) in flask_iomem_permission() 1054 return flask_iomem_permission(d, start, end, access); in flask_iomem_mapping() 1069 if ( access && (end >= 0x10 && start < 0x28) ) in flask_pci_config_permission() 1538 resource_to_perm(access)); in flask_ioport_permission() 1543 if ( access ) in flask_ioport_permission() [all …]
|
/xen/tools/tests/ |
A D | Makefile | 14 SUBDIRS-y += xen-access
|