|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [RFC][PATCH] Allow privcmd to support the _compat hypercalls
Hi Keir,I was encountering an odd error where Xend was tossing an EINVAL on xc_evtchn_alloc_unbound. After tracking it down, it turns out that this was because of an older userspace that was using the _compat version of the hypercalls. Since the hypervisor still supports these calls, is there a compelling reason to not allow privcmd to expose these calls? If not, please apply the following patch. Regards, Anthony Liguori # HG changeset patch
# User Anthony Liguori <anthony@xxxxxxxxxxxxx>
# Node ID daa038c99299f3770f6724b7e23f44451b36da3e
# Parent ad33b3882867f6ab4466383129aa3827c64508d3
Allow compat hypercalls to be made (to support older userspaces).
Signed-off-by: Anthony Liguori <aliguori@xxxxxxxxxx>
diff -r ad33b3882867 -r daa038c99299
linux-2.6-xen-sparse/drivers/xen/privcmd/privcmd.c
--- a/linux-2.6-xen-sparse/drivers/xen/privcmd/privcmd.c Wed May 24
19:41:47 2006 +0100
+++ b/linux-2.6-xen-sparse/drivers/xen/privcmd/privcmd.c Thu May 25
12:48:32 2006 -0500
@@ -267,6 +267,9 @@ static int __init privcmd_init(void)
set_bit(__HYPERVISOR_mmuext_op, hypercall_permission_map);
set_bit(__HYPERVISOR_xen_version, hypercall_permission_map);
set_bit(__HYPERVISOR_sched_op, hypercall_permission_map);
+ set_bit(__HYPERVISOR_sched_op_compat, hypercall_permission_map);
+ set_bit(__HYPERVISOR_event_channel_op_compat, hypercall_permission_map);
+ set_bit(__HYPERVISOR_physdev_op_compat, hypercall_permission_map);
privcmd_intf = create_xen_proc_entry("privcmd", 0400);
if (privcmd_intf != NULL)
_______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |