From db984809d61b1c605d22520b89fa393bcb21430a Mon Sep 17 00:00:00 2001 From: Daniel De Graaf Date: Wed, 23 Jan 2013 09:17:19 +0000 Subject: [PATCH] hvm: wire up domctl and xsm hypercalls These hypercalls are usable by HVM guests. Once connected, simple functions of the Xen toolstack can be run from an HVM domain if that domain is permitted access (which is currently only possible via XSM). Signed-off-by: Daniel De Graaf Committed-by: Keir Fraser --- xen/arch/x86/hvm/hvm.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index c75f7c5920..b5535c0de9 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -3239,8 +3239,10 @@ static hvm_hypercall_t *const hvm_hypercall64_table[NR_hypercalls] = { HYPERCALL(event_channel_op), HYPERCALL(sched_op), HYPERCALL(set_timer_op), + HYPERCALL(xsm_op), HYPERCALL(hvm_op), HYPERCALL(sysctl), + HYPERCALL(domctl), HYPERCALL(tmem_op) }; @@ -3256,8 +3258,10 @@ static hvm_hypercall_t *const hvm_hypercall32_table[NR_hypercalls] = { HYPERCALL(event_channel_op), COMPAT_CALL(sched_op), COMPAT_CALL(set_timer_op), + HYPERCALL(xsm_op), HYPERCALL(hvm_op), HYPERCALL(sysctl), + HYPERCALL(domctl), HYPERCALL(tmem_op) }; -- 2.30.2