On 02/13/2017 12:03 PM, Paul Durrant wrote:
> Recently a new dm_op[1] hypercall was added to Xen to provide a mechanism
> for restricting device emulators (such as QEMU) to a limited set of
> hypervisor operations, and being able to audit those operations in the
> kernel of the domain in which they
> -Original Message-
> From: Stefano Stabellini [mailto:sstabell...@kernel.org]
> Sent: 14 February 2017 18:39
> To: Boris Ostrovsky
> Cc: Paul Durrant ; xen-de...@lists.xenproject.org;
> linux-ker...@vger.kernel.org; Stefano Stabellini ;
> Juergen Gross
> Subject: Re: [PATCH v3 2/3] xen/
On Tue, 14 Feb 2017, Boris Ostrovsky wrote:
> On 02/13/2017 12:03 PM, Paul Durrant wrote:
> > Recently a new dm_op[1] hypercall was added to Xen to provide a mechanism
> > for restricting device emulators (such as QEMU) to a limited set of
> > hypervisor operations, and being able to audit those op
On 02/13/2017 12:03 PM, Paul Durrant wrote:
> Recently a new dm_op[1] hypercall was added to Xen to provide a mechanism
> for restricting device emulators (such as QEMU) to a limited set of
> hypervisor operations, and being able to audit those operations in the
> kernel of the domain in which they
On 02/14/2017 04:20 AM, Paul Durrant wrote:
My previous reply got bounced because my tablet insisted on using HTML...
-Original Message-
These need to be static. (I can fix it when committing.)
Ok, thanks.
And I am still not sure about using XEN_PAGE_SIZE. There is no
dependency
My previous reply got bounced because my tablet insisted on using HTML...
> -Original Message-
>
> These need to be static. (I can fix it when committing.)
Ok, thanks.
>
> And I am still not sure about using XEN_PAGE_SIZE. There is no
> dependency in the hypervisor on buffers being pag
On 13 February 2017, at 19:11, Boris Ostrovsky
wrote:
>
>
>> diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c
>> index 5e5c7ae..a33f17e 100644
>> --- a/drivers/xen/privcmd.c
>> +++ b/drivers/xen/privcmd.c
>> @@ -22,6 +22,7 @@
>> #include
>> #include
>> #include
>> +#include
>>
diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c
index 5e5c7ae..a33f17e 100644
--- a/drivers/xen/privcmd.c
+++ b/drivers/xen/privcmd.c
@@ -22,6 +22,7 @@
#include
#include
#include
+#include
#include
#include
@@ -32,6 +33,7 @@
#include
#include
#include
+#include
#i
Recently a new dm_op[1] hypercall was added to Xen to provide a mechanism
for restricting device emulators (such as QEMU) to a limited set of
hypervisor operations, and being able to audit those operations in the
kernel of the domain in which they run.
This patch adds IOCTL_PRIVCMD_DM_OP as gatewa