pvh: access to hypercalls
authorMukesh Rathor <mukesh.rathor@oracle.com>
Wed, 13 Nov 2013 08:36:32 +0000 (09:36 +0100)
committerJan Beulich <jbeulich@suse.com>
Wed, 13 Nov 2013 08:36:32 +0000 (09:36 +0100)
commit2204b1ce06ac61aec143f71e555fbf480a898c8c
tree91363590f3e6634b8b5d40299861207e7a171be1
parent9001eb540b815110302505cfd799f1356f40e47f
pvh: access to hypercalls

Hypercalls where we now have unrestricted access:
* memory_op
* console_io
* vcpu_op
* mmuext_op

We also restrict PVH domain access to HVMOP_*_param to reading and
writing HVM_PARAM_CALLBACK_IRQ.

Most hvm_op functions require "is_hvm_domain()" and will default to
-EINVAL; exceptions are HVMOP_get_time and HVMOP_xentrace.

Finally, we restrict setting IOPL permissions for a PVH domain.

Signed-off-by: Mukesh Rathor <mukesh.rathor@oracle.com>
Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
Acked-by: Tim Deegan <tim@xen.org>
Acked-by: Keir Fraser <keir@xen.org>
Acked-by: Eddie Dong <eddie.dong@intel.com>
xen/arch/x86/hvm/hvm.c
xen/arch/x86/physdev.c
xen/common/kernel.c