[kernel] r7278 - in dists/sid/linux-2.6/debian: . patches
patches/series
Bastian Blank
waldi at costa.debian.org
Wed Aug 30 19:27:31 UTC 2006
Author: waldi
Date: Wed Aug 30 19:27:29 2006
New Revision: 7278
Added:
dists/sid/linux-2.6/debian/patches/xen-unstable-11253-backport.patch
Modified:
dists/sid/linux-2.6/debian/changelog
dists/sid/linux-2.6/debian/patches/series/8-extra
Log:
* debian/changelog: Update.
* debian/patches/series/8-extra: xen-unstable-11253-backport.patch.
* debian/patches/xen-unstable-11253-backport.patch: Add.
Modified: dists/sid/linux-2.6/debian/changelog
==============================================================================
--- dists/sid/linux-2.6/debian/changelog (original)
+++ dists/sid/linux-2.6/debian/changelog Wed Aug 30 19:27:29 2006
@@ -21,7 +21,10 @@
* sym2: only claim "Storage" class devices - the cpqarray driver should be
used for 5c1510 devices in RAID mode. (closes: #380272)
- -- dann frazier <dannf at debian.org> Tue, 29 Aug 2006 18:44:26 -0600
+ [ Bastian Blank ]
+ * Backport change to allow all hypercalls for xen.
+
+ -- Bastian Blank <waldi at debian.org> Wed, 30 Aug 2006 19:25:00 +0000
linux-2.6 (2.6.17-7) unstable; urgency=low
Modified: dists/sid/linux-2.6/debian/patches/series/8-extra
==============================================================================
--- dists/sid/linux-2.6/debian/patches/series/8-extra (original)
+++ dists/sid/linux-2.6/debian/patches/series/8-extra Wed Aug 30 19:27:29 2006
@@ -1,2 +1,3 @@
+ pa8800-abstract-kmap.patch hppa
+ pa8800-kmap-implementation.patch hppa
++ xen-unstable-11253-backport.patch *_xen *_xen-vserver
Added: dists/sid/linux-2.6/debian/patches/xen-unstable-11253-backport.patch
==============================================================================
--- (empty file)
+++ dists/sid/linux-2.6/debian/patches/xen-unstable-11253-backport.patch Wed Aug 30 19:27:29 2006
@@ -0,0 +1,45 @@
+--- linux-2.6-xen-sparse/drivers/xen/privcmd/privcmd.c Thu Aug 24 17:24:54 2006 +0100
++++ linux-2.6-xen-sparse/drivers/xen/privcmd/privcmd.c Thu Aug 24 17:58:28 2006 +0100
+@@ -35,9 +35,6 @@ static struct proc_dir_entry *privcmd_in
+ static struct proc_dir_entry *privcmd_intf;
+ static struct proc_dir_entry *capabilities_intf;
+
+-#define NR_HYPERCALLS 64
+-static DECLARE_BITMAP(hypercall_permission_map, NR_HYPERCALLS);
+-
+ static int privcmd_ioctl(struct inode *inode, struct file *file,
+ unsigned int cmd, unsigned long data)
+ {
+@@ -50,12 +47,6 @@ static int privcmd_ioctl(struct inode *i
+
+ if (copy_from_user(&hypercall, udata, sizeof(hypercall)))
+ return -EFAULT;
+-
+- /* Check hypercall number for validity. */
+- if (hypercall.op >= NR_HYPERCALLS)
+- return -EINVAL;
+- if (!test_bit(hypercall.op, hypercall_permission_map))
+- return -EINVAL;
+
+ #if defined(__i386__)
+ __asm__ __volatile__ (
+@@ -262,19 +253,6 @@ static int __init privcmd_init(void)
+ if (!is_running_on_xen())
+ return -ENODEV;
+
+- /* Set of hypercalls that privileged applications may execute. */
+- set_bit(__HYPERVISOR_acm_op, hypercall_permission_map);
+- set_bit(__HYPERVISOR_dom0_op, hypercall_permission_map);
+- set_bit(__HYPERVISOR_event_channel_op, hypercall_permission_map);
+- set_bit(__HYPERVISOR_memory_op, hypercall_permission_map);
+- set_bit(__HYPERVISOR_mmu_update, hypercall_permission_map);
+- set_bit(__HYPERVISOR_mmuext_op, hypercall_permission_map);
+- set_bit(__HYPERVISOR_xen_version, hypercall_permission_map);
+- set_bit(__HYPERVISOR_sched_op, hypercall_permission_map);
+- set_bit(__HYPERVISOR_sched_op_compat, hypercall_permission_map);
+- set_bit(__HYPERVISOR_event_channel_op_compat,
+- hypercall_permission_map);
+-
+ privcmd_intf = create_xen_proc_entry("privcmd", 0400);
+ if (privcmd_intf != NULL)
+ privcmd_intf->proc_fops = &privcmd_file_ops;
More information about the Kernel-svn-changes
mailing list