mirror of https://github.com/torvalds/linux.git
Recently a new dm_op[1] hypercall was added to Xen to provide a mechanism
for restricting device emulators (such as QEMU) to a limited set of
hypervisor operations, and being able to audit those operations in the
kernel of the domain in which they run.
This patch adds IOCTL_PRIVCMD_DM_OP as gateway for __HYPERVISOR_dm_op.
NOTE: There is no requirement for user-space code to bounce data through
locked memory buffers (as with IOCTL_PRIVCMD_HYPERCALL) since
privcmd has enough information to lock the original buffers
directly.
[1] http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=524a98c2
Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Acked-by: Stefano Stabellini <sstabellini@kernel.org>
Signed-off-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
|
||
|---|---|---|
| .. | ||
| hvm | ||
| io | ||
| callback.h | ||
| elfnote.h | ||
| event_channel.h | ||
| features.h | ||
| grant_table.h | ||
| memory.h | ||
| nmi.h | ||
| physdev.h | ||
| platform.h | ||
| sched.h | ||
| vcpu.h | ||
| version.h | ||
| xen-mca.h | ||
| xen.h | ||
| xenpmu.h | ||