]> xenbits.xensource.com Git - xen.git/commitdiff
hvm: wire up domctl and xsm hypercalls
authorDaniel De Graaf <dgdegra@tycho.nsa.gov>
Wed, 23 Jan 2013 09:17:19 +0000 (09:17 +0000)
committerDaniel De Graaf <dgdegra@tycho.nsa.gov>
Wed, 23 Jan 2013 09:17:19 +0000 (09:17 +0000)
These hypercalls are usable by HVM guests.  Once connected, simple
functions of the Xen toolstack can be run from an HVM domain if that
domain is permitted access (which is currently only possible via XSM).

Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Committed-by: Keir Fraser <keir@xen.org>
xen/arch/x86/hvm/hvm.c

index c75f7c592069179c2e04546e817fca90921c4698..b5535c0de985efd0d3848d825cdb79cadb7c29ee 100644 (file)
@@ -3239,8 +3239,10 @@ static hvm_hypercall_t *const hvm_hypercall64_table[NR_hypercalls] = {
     HYPERCALL(event_channel_op),
     HYPERCALL(sched_op),
     HYPERCALL(set_timer_op),
+    HYPERCALL(xsm_op),
     HYPERCALL(hvm_op),
     HYPERCALL(sysctl),
+    HYPERCALL(domctl),
     HYPERCALL(tmem_op)
 };
 
@@ -3256,8 +3258,10 @@ static hvm_hypercall_t *const hvm_hypercall32_table[NR_hypercalls] = {
     HYPERCALL(event_channel_op),
     COMPAT_CALL(sched_op),
     COMPAT_CALL(set_timer_op),
+    HYPERCALL(xsm_op),
     HYPERCALL(hvm_op),
     HYPERCALL(sysctl),
+    HYPERCALL(domctl),
     HYPERCALL(tmem_op)
 };