faaf86055a7af8ff13c591cdf692724aab94c960 |
|
18-Apr-2015 |
florian <florian@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
Remove a few unneeded header files. git-svn-id: svn://svn.valgrind.org/valgrind/trunk@15111 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
9e4ec3aa2cdc4cdca092538ef2e65b0a494932af |
|
04-Sep-2014 |
sewardj <sewardj@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
Add support for Xen hypercalls used by libvmi. Patch from Antony Saba (antony.saba@fireeye.com). First of two patches from #337740. git-svn-id: svn://svn.valgrind.org/valgrind/trunk@14453 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
1123362bfa90a9f96b6a2b2c03a15b36868c0fcb |
|
12-Aug-2014 |
florian <florian@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
Remove function VG_(sysnum_string_extra) as it was just a wrapper around VG_(sysnum_string). Also remove associated macro VG_SYSNUM_STRING_EXTRA. The VG_SYSNUM_STRING macro returned a pointer to a variable which is out of scope. Using that value may cause undefined behaviour. Change VG_(sysnum_string) to return pointer to static buffer instead. Fix call sites. git-svn-id: svn://svn.valgrind.org/valgrind/trunk@14264 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
bfd1d9f0bc4250864d60f94551226559592c258d |
|
01-May-2014 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
syswrap: XEN_DOMCTL_resumedomain No input or output parameters Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13928 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
65056673598941d349716fbca2319f0a9d87ef8c |
|
01-May-2014 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
syswrap: XEN_HVMOP_set_mem_type Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> CC: Ian Campbell <Ian.Campbell@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13927 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
2c28071a87233c88c850c9a5b85896c3b7bda3ac |
|
01-May-2014 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
syswrap: XEN_HVMOP_set_pci_link_route Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> CC: Ian Campbell <Ian.Campbell@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13926 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
a5f81a0f931c6e5a0cb17f415c304255f08e7ba8 |
|
01-May-2014 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
syswrap: XEN_HVMOP_set_isa_irq_level Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> CC: Ian Campbell <Ian.Campbell@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13925 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
331b3f0b5c43cafb13f7c9f11dbabe74ce36c60e |
|
01-May-2014 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
syswrap: XEN_DOMCTL_cacheflush Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> CC: Ian Campbell <Ian.Campbell@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13924 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
718b0fbc74fba4c5a9e509e95a840fe1bb9d2f24 |
|
01-May-2014 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
syswrap: XEN_DOMCTL_settimeoffset Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> CC: Ian Campbell <Ian.Campbell@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13923 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
b1055aa804554690e629a76029db39086f7be8ca |
|
01-May-2014 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
Fix P{RE,OST}_XEN_HVMOP_{READ,WRITE} _type should be a type, not a string Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> CC: Ian Campbell <Ian.Campbell@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13922 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
03f77d2e775923c89aec85303538b07af31168f9 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: Implement XEN_DOMCTL_set_max_evtchn This is new in Xen 4.4. From: Ian Campbell <ian.campbell@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13738 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
4cf567e516af234d2507a4d3e86b19c1602abf02 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XEN_SYSCTL_debugkeys hypercall From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13737 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
029d48faa992fea02427216ff4a4b6099d287f77 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XEN_SYSCTL_readconsole hypercall From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13736 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
189ade7a1840c9bf255d8ae799d8a59e117da6b0 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XEN_DOMCTL_shadow_op hypercall And some of the sub-subops. It is a little hacky given the legacy way of having several methods of enabling/disbling LOG_DIRTY mode. From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13735 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
8583a2a8a632cabc1678bab4a74e44157e436f22 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XEN_DOMCTL_sethvmcontext hypercall Xen reads 'num' and 'array' from the structure, and reads the entire buffer. Nothing gets written back. From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13734 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
14c44a94bca948a677e60f8ae61a66aad8eedfb1 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XEN_DOMCTL_getpageframeinfo3 hypercall Xen reads 'num' and the 'array' pointer from ARG1, and proceeds to read and modify-in-place the entire userspace array. From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13733 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
e65212eef943e798e0c09c4f01a2b021ab4b3c3e |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XEN_DOMCTL_gethvmcontext hypercall The semantics of XEN_DOMCTL_gethvmcontext are little interesting. If the 'buffer' field of the structure is NULL, the hypercall is a request for the required buffer size, which written into the 'size' paramater. If 'buffer' is non NULL, Xen will write to the buffer, and update 'size' with the amount of data written. From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13732 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
9bd4cfc493257a03794997896aa1642836fc3b45 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XENMEM_remove_from_physmap hypercall Xen reads the entire structure and writes nothing. From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13731 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
39d4ba51e6fd55497067538e06dcc53b260e156a |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XENMEM_add_to_physmap hypercall Xen reads the entire structure, and if the space is _gmfn, will write the structure back From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13730 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
1d528a761b257b2543f555fed8586f9c7a34f825 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XENMEM_machphys_mfn_list hypercall The XENMEM_machphys_mfn_list implementation reads 'max_extents' and 'extents_start'. It writes to the array at 'extents_start', and writes the number of extents written into the 'nr_extents' field. From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13729 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
3b700276b5ba9a0879b90a81ff68c475bc4dcc73 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XENMEM_maximum_gpfn hypercall Xen reads a 16 bit domid from the pointer provided in ARG2, but does not write anything back. From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13728 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
bc8d9bd75d616c721d274b1f0a2f800513f5c682 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: XENMEM_maximum_ram_page hypercall Xen does not read or write any memory for this hypercall From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13727 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
3b35a08442f9a3ed3926823bcb41c2b524b71a79 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: Infratructure for XEN_TMEM_* hypercalls and an implementation of XEN_TMEM_control save_begin. Xen will read various fields at various time, but write nothing back for a save_begin subop. From: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13726 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
5be3aec4fc2fb9b9d03ac1fdc3a041fc70a77a61 |
|
01-Dec-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: Fix XEN_SYSCTL_getdomaininfolist for version 0xa From: Andrew Cooper <andrew.cooper3@citrix.com> Also add a default case so future bumps of the sysctl interface version dont result in spurious passes of the IOCTL handler. Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13725 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
a25a2bfc3ba9859ba92446126270d76b4bd0264d |
|
30-Jun-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
[PATCH 4/4] xen: VKI_XENMEM_get_sharing_{freed, shared}_pages hypercall (#321065) From: Andrew Cooper <andrew.cooper3@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13438 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
431bad03df36981b31fe4f6f1a640f03d3761734 |
|
30-Jun-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
[PATCH 3/4] xen: VKI_XEN_SYSCTL_sched_id hypercall (#321065) From: Andrew Cooper <andrew.cooper3@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13437 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
68495eb8e7cf67dc88010975cbbcb4af9dd2284f |
|
30-Jun-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
[PATCH 2/4] xen: update for interface changes in Xen 4.3 release (#321065) From: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13436 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
39d8b546976e21c6ed341475a2941da24b3f2525 |
|
21-Jan-2013 |
florian <florian@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: Add a missing break to the handling of XEN_DOMCTL_max_vcpus found by Coverity's checker. Also fix another missing break XEN_SYSCTL_numainfo found by via a by-eye check. This one is at the end of the switch so it is benign. Patch by Ian Campbell <ian.campbell@citrix.com>. git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13251 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
c7c3f2f4edebac0ff72f1640c165919cd46a1aa6 |
|
19-Jan-2013 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: add a missing break to the handling of XEN_DOMCTL_getdomaininfo Thanks to Florian Krohm From: Ian Campbell <Ian.Campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13244 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
6bd9dc18c043927c1196caba20a327238a179c42 |
|
23-Nov-2012 |
florian <florian@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
Changes to allow compilation with -Wwrite-strings. That compiler option is not used for testcases, just for valgrind proper. git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13137 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
51e61da70d98443ae4008c2e3bb82add77d9c15c |
|
23-Oct-2012 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
Remove build dependency on Xen header files - closes #308495 From: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13081 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
4409c9c48ec1484d036357ef256d1a33c429c0e4 |
|
15-Oct-2012 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: include arg struct field names when marking memory as read. Makes it easier to figure out what was not initialised. Thanks, once again, to Julien Grall. From: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13050 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
da0a6c7d08237fc6db1a9f383d1da09e03c58fec |
|
15-Oct-2012 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: Remove cast of ARG* to unsigned int before pointer conversion. This is pretty dodgy on 64 bit systems. Thanks to Julien Grall. From: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13049 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
f68ba11d5cec7b2d91ca1726b56a511f3fd0bf9c |
|
15-Oct-2012 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: adding missing break. Thanks to Julien Grall. From: Ian Campbell <ian.campbell@citrix.com> git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13048 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
a8f524c1f1f16367156758d62db54c2d4e4045e8 |
|
15-Oct-2012 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
xen: Useful messages for sys/domctl interface_version mismatch git-svn-id: svn://svn.valgrind.org/valgrind/trunk@13047 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|
0ab84fe82d1e25c2e0544d08826df42caa44ded1 |
|
09-Sep-2012 |
bart <bart@a5019735-40e9-0310-863c-91ae7b9d1cf9> |
valgrind: Support Xen toolstack process ioctls From: Ian Campbell <Ian.Campbell@citrix.com> Under Xen the toolstack is responsible for managing the domains in the system, e.g. creating, destroying, and otherwise manipulating them. To do this it uses a number of ioctls on the /proc/xen/privcmd device. Most of these (the MMAPBATCH ones) simply set things up such that a subsequenct mmap call will map the desired guest memory. Since valgrind has no way of knowing what the memory contains we assume that it is all initialised (to do otherwise would require valgrind to be observing the complete state of the system and not just the given process). The most interesting ioctl is XEN_IOCTL_PRIVCMD_HYPERCALL which allows the toolstack to make arbitrary hypercalls. Although the mechanism here is specific to the OS of the guest running the toolstack the hypercalls themselves are defined solely by the hypervisor. Therefore I have split support for this ioctl into a part in syswrap-linux.c which handles the ioctl itself and passes things onto a new syswrap-xen.c which handles the specifics of the hypercalls themselves. Porting this to another OS should just be a matter of wiring up syswrap-$OS.c to decode the ioctl and call into syswrap-xen.c. In the future we may want to split this into syswrap-$ARCH-xen.c but for now this is x86 only. The hypercall coverage here is pretty small but is enough to get reasonable(-ish) results out of the xl toolstack when listing, creating and destroying domains. One issue is that the hypercalls which are exlusively used by the toolstacks (as opposed to those used by guest operating systems) are not considered a stable ABI, since the hypervisor and the lowlevel tools are considered a matched pair. This covers the sysctl and domctl hypercalls which are a fairly large chunk of the support here. I'm not sure how to solve this without invoking a massive amount of duplication. Right now this targets the Xen unstable interface (which will shortly be released as Xen 4.2), perhaps I can get away with deferring this problem until the first change . On the plus side the vast majority of hypercalls are not of interest to the toolstack (they are used by guests) so we can get away without implementing them. Note: a hypercall only reads as many words from the ioctl arg struct as there are actual arguments to that hypercall and the toolstack only initialises the arguments which are used. However there is no space in the DEFN_PRE_TEMPLATE prototype to allow this to be communicated from syswrap-xen.c back to syswrap-linux.c. Since a hypercall can have at most 5 arguments I have hackily stolen ARG8 for this purpose. git-svn-id: svn://svn.valgrind.org/valgrind/trunk@12963 a5019735-40e9-0310-863c-91ae7b9d1cf9
/external/valgrind/coregrind/m_syswrap/syswrap-xen.c
|