Paul Durrant ab520be8cd xen/privcmd: Add IOCTL_PRIVCMD_DM_OP
Recently a new dm_op[1] hypercall was added to Xen to provide a mechanism
for restricting device emulators (such as QEMU) to a limited set of
hypervisor operations, and being able to audit those operations in the
kernel of the domain in which they run.

This patch adds IOCTL_PRIVCMD_DM_OP as gateway for __HYPERVISOR_dm_op.

NOTE: There is no requirement for user-space code to bounce data through
      locked memory buffers (as with IOCTL_PRIVCMD_HYPERCALL) since
      privcmd has enough information to lock the original buffers
      directly.

[1] http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=524a98c2

Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Acked-by: Stefano Stabellini <sstabellini@kernel.org>
Signed-off-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
2017-02-14 15:13:43 -05:00
..
2016-12-15 13:49:34 -08:00
2017-02-14 15:13:43 -05:00
2016-07-27 11:35:37 -07:00
2014-12-11 11:35:02 +01:00
2015-05-28 15:31:53 +02:00
2016-01-20 11:39:14 +01:00
2015-10-21 11:17:32 +02:00
2015-04-24 15:36:55 +02:00
2016-01-12 12:17:28 +01:00
2015-07-31 13:31:10 +02:00
2016-12-17 12:29:56 +01:00
2014-02-27 08:07:39 -08:00
2016-12-17 12:29:56 +01:00
2016-11-16 10:23:02 +01:00
2015-12-19 11:53:40 +01:00
2016-09-05 11:47:31 +02:00
2015-05-19 15:47:30 +02:00
2016-01-30 11:22:17 +01:00
2016-11-01 07:47:55 +01:00
2016-09-05 11:47:31 +02:00
2016-06-16 00:04:31 +02:00
2015-07-31 13:31:10 +02:00
2016-06-16 00:04:31 +02:00
2015-05-19 15:47:30 +02:00