History log of /external/valgrind/coregrind/m_syswrap/syswrap-xen.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
faaf86055a7af8ff13c591cdf692724aab94c960 18-Apr-2015 florian <florian@a5019735-40e9-0310-863c-91ae7b9d1cf9> Remove a few unneeded header files.


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@15111 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
9e4ec3aa2cdc4cdca092538ef2e65b0a494932af 04-Sep-2014 sewardj <sewardj@a5019735-40e9-0310-863c-91ae7b9d1cf9> Add support for Xen hypercalls used by libvmi. Patch from Antony Saba
(antony.saba@fireeye.com). First of two patches from #337740.



git-svn-id: svn://svn.valgrind.org/valgrind/trunk@14453 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
1123362bfa90a9f96b6a2b2c03a15b36868c0fcb 12-Aug-2014 florian <florian@a5019735-40e9-0310-863c-91ae7b9d1cf9> Remove function VG_(sysnum_string_extra) as it was just a wrapper
around VG_(sysnum_string). Also remove associated macro
VG_SYSNUM_STRING_EXTRA.
The VG_SYSNUM_STRING macro returned a pointer to a variable which
is out of scope. Using that value may cause undefined behaviour.
Change VG_(sysnum_string) to return pointer to static buffer instead.
Fix call sites.


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@14264 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
bfd1d9f0bc4250864d60f94551226559592c258d 01-May-2014 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> syswrap: XEN_DOMCTL_resumedomain

No input or output parameters

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13928 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
65056673598941d349716fbca2319f0a9d87ef8c 01-May-2014 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> syswrap: XEN_HVMOP_set_mem_type

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Ian Campbell <Ian.Campbell@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13927 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
2c28071a87233c88c850c9a5b85896c3b7bda3ac 01-May-2014 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> syswrap: XEN_HVMOP_set_pci_link_route

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Ian Campbell <Ian.Campbell@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13926 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
a5f81a0f931c6e5a0cb17f415c304255f08e7ba8 01-May-2014 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> syswrap: XEN_HVMOP_set_isa_irq_level

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Ian Campbell <Ian.Campbell@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13925 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
331b3f0b5c43cafb13f7c9f11dbabe74ce36c60e 01-May-2014 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> syswrap: XEN_DOMCTL_cacheflush

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Ian Campbell <Ian.Campbell@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13924 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
718b0fbc74fba4c5a9e509e95a840fe1bb9d2f24 01-May-2014 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> syswrap: XEN_DOMCTL_settimeoffset

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Ian Campbell <Ian.Campbell@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13923 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
b1055aa804554690e629a76029db39086f7be8ca 01-May-2014 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> Fix P{RE,OST}_XEN_HVMOP_{READ,WRITE}

_type should be a type, not a string

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Ian Campbell <Ian.Campbell@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13922 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
03f77d2e775923c89aec85303538b07af31168f9 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: Implement XEN_DOMCTL_set_max_evtchn

This is new in Xen 4.4.

From: Ian Campbell <ian.campbell@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13738 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
4cf567e516af234d2507a4d3e86b19c1602abf02 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XEN_SYSCTL_debugkeys hypercall

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13737 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
029d48faa992fea02427216ff4a4b6099d287f77 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XEN_SYSCTL_readconsole hypercall

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13736 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
189ade7a1840c9bf255d8ae799d8a59e117da6b0 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XEN_DOMCTL_shadow_op hypercall

And some of the sub-subops. It is a little hacky given the legacy way of
having several methods of enabling/disbling LOG_DIRTY mode.

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13735 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
8583a2a8a632cabc1678bab4a74e44157e436f22 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XEN_DOMCTL_sethvmcontext hypercall

Xen reads 'num' and 'array' from the structure, and reads the entire buffer.
Nothing gets written back.

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13734 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
14c44a94bca948a677e60f8ae61a66aad8eedfb1 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XEN_DOMCTL_getpageframeinfo3 hypercall

Xen reads 'num' and the 'array' pointer from ARG1, and proceeds to read and
modify-in-place the entire userspace array.

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13733 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
e65212eef943e798e0c09c4f01a2b021ab4b3c3e 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XEN_DOMCTL_gethvmcontext hypercall

The semantics of XEN_DOMCTL_gethvmcontext are little interesting.

If the 'buffer' field of the structure is NULL, the hypercall is a request for
the required buffer size, which written into the 'size' paramater.

If 'buffer' is non NULL, Xen will write to the buffer, and update 'size' with
the amount of data written.

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13732 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
9bd4cfc493257a03794997896aa1642836fc3b45 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XENMEM_remove_from_physmap hypercall

Xen reads the entire structure and writes nothing.

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13731 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
39d4ba51e6fd55497067538e06dcc53b260e156a 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XENMEM_add_to_physmap hypercall

Xen reads the entire structure, and if the space is _gmfn, will write the
structure back

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13730 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
1d528a761b257b2543f555fed8586f9c7a34f825 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XENMEM_machphys_mfn_list hypercall

The XENMEM_machphys_mfn_list implementation reads 'max_extents' and
'extents_start'. It writes to the array at 'extents_start', and writes the
number of extents written into the 'nr_extents' field.

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13729 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
3b700276b5ba9a0879b90a81ff68c475bc4dcc73 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XENMEM_maximum_gpfn hypercall

Xen reads a 16 bit domid from the pointer provided in ARG2, but does not write
anything back.

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13728 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
bc8d9bd75d616c721d274b1f0a2f800513f5c682 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: XENMEM_maximum_ram_page hypercall

Xen does not read or write any memory for this hypercall

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13727 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
3b35a08442f9a3ed3926823bcb41c2b524b71a79 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: Infratructure for XEN_TMEM_* hypercalls

and an implementation of XEN_TMEM_control save_begin.

Xen will read various fields at various time, but write nothing back for a
save_begin subop.

From: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13726 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
5be3aec4fc2fb9b9d03ac1fdc3a041fc70a77a61 01-Dec-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: Fix XEN_SYSCTL_getdomaininfolist for version 0xa

From: Andrew Cooper <andrew.cooper3@citrix.com>

Also add a default case so future bumps of the sysctl interface version dont
result in spurious passes of the IOCTL handler.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13725 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
a25a2bfc3ba9859ba92446126270d76b4bd0264d 30-Jun-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> [PATCH 4/4] xen: VKI_XENMEM_get_sharing_{freed, shared}_pages hypercall (#321065)

From: Andrew Cooper <andrew.cooper3@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13438 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
431bad03df36981b31fe4f6f1a640f03d3761734 30-Jun-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> [PATCH 3/4] xen: VKI_XEN_SYSCTL_sched_id hypercall (#321065)

From: Andrew Cooper <andrew.cooper3@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13437 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
68495eb8e7cf67dc88010975cbbcb4af9dd2284f 30-Jun-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> [PATCH 2/4] xen: update for interface changes in Xen 4.3 release (#321065)

From: Ian Campbell <ian.campbell@citrix.com>



git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13436 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
39d8b546976e21c6ed341475a2941da24b3f2525 21-Jan-2013 florian <florian@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: Add a missing break to the handling of XEN_DOMCTL_max_vcpus
found by Coverity's checker.
Also fix another missing break XEN_SYSCTL_numainfo found by via a
by-eye check. This one is at the end of the switch so it is benign.
Patch by Ian Campbell <ian.campbell@citrix.com>.


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13251 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
c7c3f2f4edebac0ff72f1640c165919cd46a1aa6 19-Jan-2013 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: add a missing break to the handling of XEN_DOMCTL_getdomaininfo

Thanks to Florian Krohm

From: Ian Campbell <Ian.Campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13244 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
6bd9dc18c043927c1196caba20a327238a179c42 23-Nov-2012 florian <florian@a5019735-40e9-0310-863c-91ae7b9d1cf9> Changes to allow compilation with -Wwrite-strings. That compiler option
is not used for testcases, just for valgrind proper.


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13137 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
51e61da70d98443ae4008c2e3bb82add77d9c15c 23-Oct-2012 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> Remove build dependency on Xen header files - closes #308495

From: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13081 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
4409c9c48ec1484d036357ef256d1a33c429c0e4 15-Oct-2012 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: include arg struct field names when marking memory as read.

Makes it easier to figure out what was not initialised.

Thanks, once again, to Julien Grall.

From: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13050 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
da0a6c7d08237fc6db1a9f383d1da09e03c58fec 15-Oct-2012 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: Remove cast of ARG* to unsigned int before pointer conversion.

This is pretty dodgy on 64 bit systems.

Thanks to Julien Grall.

From: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13049 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
f68ba11d5cec7b2d91ca1726b56a511f3fd0bf9c 15-Oct-2012 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: adding missing break.

Thanks to Julien Grall.

From: Ian Campbell <ian.campbell@citrix.com>


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13048 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
a8f524c1f1f16367156758d62db54c2d4e4045e8 15-Oct-2012 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> xen: Useful messages for sys/domctl interface_version mismatch


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13047 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
0ab84fe82d1e25c2e0544d08826df42caa44ded1 09-Sep-2012 bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> valgrind: Support Xen toolstack process ioctls

From: Ian Campbell <Ian.Campbell@citrix.com>

Under Xen the toolstack is responsible for managing the domains in
the system, e.g. creating, destroying, and otherwise manipulating
them.

To do this it uses a number of ioctls on the /proc/xen/privcmd
device. Most of these (the MMAPBATCH ones) simply set things up such
that a subsequenct mmap call will map the desired guest memory. Since
valgrind has no way of knowing what the memory contains we assume
that it is all initialised (to do otherwise would require valgrind to
be observing the complete state of the system and not just the given
process).

The most interesting ioctl is XEN_IOCTL_PRIVCMD_HYPERCALL which
allows the toolstack to make arbitrary hypercalls. Although the
mechanism here is specific to the OS of the guest running the
toolstack the hypercalls themselves are defined solely by the
hypervisor. Therefore I have split support for this ioctl into a part
in syswrap-linux.c which handles the ioctl itself and passes things
onto a new syswrap-xen.c which handles the specifics of the
hypercalls themselves. Porting this to another OS should just be a
matter of wiring up syswrap-$OS.c to decode the ioctl and call into
syswrap-xen.c. In the future we may want to split this into
syswrap-$ARCH-xen.c but for now this is x86 only.

The hypercall coverage here is pretty small but is enough to get
reasonable(-ish) results out of the xl toolstack when listing,
creating and destroying domains.

One issue is that the hypercalls which are exlusively used by the
toolstacks (as opposed to those used by guest operating systems) are
not considered a stable ABI, since the hypervisor and the lowlevel
tools are considered a matched pair. This covers the sysctl and
domctl hypercalls which are a fairly large chunk of the support
here. I'm not sure how to solve this without invoking a massive
amount of duplication. Right now this targets the Xen unstable
interface (which will shortly be released as Xen 4.2), perhaps I can
get away with deferring this problem until the first change .

On the plus side the vast majority of hypercalls are not of interest
to the toolstack (they are used by guests) so we can get away without
implementing them.

Note: a hypercall only reads as many words from the ioctl arg
struct as there are actual arguments to that hypercall and the
toolstack only initialises the arguments which are used. However
there is no space in the DEFN_PRE_TEMPLATE prototype to allow this to
be communicated from syswrap-xen.c back to syswrap-linux.c. Since a
hypercall can have at most 5 arguments I have hackily stolen ARG8 for
this purpose.


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@12963 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c