]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/commit - arch/arm/xen/enlighten.c
xen/privcmd: Add IOCTL_PRIVCMD_DM_OP
authorPaul Durrant <paul.durrant@citrix.com>
Mon, 13 Feb 2017 17:03:23 +0000 (17:03 +0000)
committerBoris Ostrovsky <boris.ostrovsky@oracle.com>
Tue, 14 Feb 2017 20:13:43 +0000 (15:13 -0500)
commitab520be8cd5d56867fc95cfbc34b90880faf1f9d
tree4c432a918ffbd6308f752eaac36b322b811582b1
parentdc9eab6fd94dd26340749321bba2c58634761516
xen/privcmd: Add IOCTL_PRIVCMD_DM_OP

Recently a new dm_op[1] hypercall was added to Xen to provide a mechanism
for restricting device emulators (such as QEMU) to a limited set of
hypervisor operations, and being able to audit those operations in the
kernel of the domain in which they run.

This patch adds IOCTL_PRIVCMD_DM_OP as gateway for __HYPERVISOR_dm_op.

NOTE: There is no requirement for user-space code to bounce data through
      locked memory buffers (as with IOCTL_PRIVCMD_HYPERCALL) since
      privcmd has enough information to lock the original buffers
      directly.

[1] http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=524a98c2

Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Acked-by: Stefano Stabellini <sstabellini@kernel.org>
Signed-off-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
arch/arm/xen/enlighten.c
arch/arm/xen/hypercall.S
arch/arm64/xen/hypercall.S
arch/x86/include/asm/xen/hypercall.h
drivers/xen/privcmd.c
include/uapi/xen/privcmd.h
include/xen/arm/hypercall.h
include/xen/interface/hvm/dm_op.h [new file with mode: 0644]
include/xen/interface/xen.h