[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 5/8] [xen-x86] Domain Groups: arch-specific VMM mods
xen-x86: Architecture-specific code to initialize group data structures and handle new domgrpctl hypercall. diff -r ecb6cd61a9cf xen/arch/x86/setup.c --- a/xen/arch/x86/setup.c Tue Feb 20 12:27:03 2007 +0000 +++ b/xen/arch/x86/setup.c Tue Feb 20 12:59:11 2007 -0500 @@ -3,6 +3,7 @@ #include <xen/lib.h> #include <xen/sched.h> #include <xen/domain.h> +#include <xen/domgrp.h> #include <xen/serial.h> #include <xen/softirq.h> #include <xen/acpi.h> @@ -727,12 +728,18 @@ void __init __start_xen(multiboot_info_t /* initialize access control security module */ acm_init(_policy_start, _policy_len); + /* initialize domain groups */ + if (init_domain_groups()) + panic("Error creating default groups\n"); + /* Create initial domain 0. */ dom0 = domain_create(0, 0); if ( (dom0 == NULL) || (alloc_vcpu(dom0, 0, 0) == NULL) ) panic("Error creating domain 0\n"); dom0->is_privileged = 1; + if (add_dom_to_grp(dom0, 0)) + panic("Error adding dom0 to grp0\n"); /* Post-create hook sets security label. */ acm_post_domain0_create(dom0->domain_id); diff -r ecb6cd61a9cf xen/arch/x86/x86_32/entry.S --- a/xen/arch/x86/x86_32/entry.S Tue Feb 20 12:27:03 2007 +0000 +++ b/xen/arch/x86/x86_32/entry.S Tue Feb 20 12:59:11 2007 -0500 @@ -671,6 +671,7 @@ ENTRY(hypercall_table) .long do_sysctl /* 35 */ .long do_domctl .long do_kexec_op + .long do_domgrpctl .rept NR_hypercalls-((.-hypercall_table)/4) .long do_ni_hypercall .endr @@ -714,6 +715,7 @@ ENTRY(hypercall_args_table) .byte 1 /* do_sysctl */ /* 35 */ .byte 1 /* do_domctl */ .byte 2 /* do_kexec_op */ + .byte 1 /* do_domgrpctl */ .rept NR_hypercalls-(.-hypercall_args_table) .byte 0 /* do_ni_hypercall */ .endr diff -r ecb6cd61a9cf xen/arch/x86/x86_64/entry.S --- a/xen/arch/x86/x86_64/entry.S Tue Feb 20 12:27:03 2007 +0000 +++ b/xen/arch/x86/x86_64/entry.S Tue Feb 20 12:59:11 2007 -0500 @@ -587,6 +587,7 @@ ENTRY(hypercall_table) .quad do_sysctl /* 35 */ .quad do_domctl .quad do_kexec_op + .quad do_domgrpctl .rept NR_hypercalls-((.-hypercall_table)/8) .quad do_ni_hypercall .endr @@ -630,6 +631,7 @@ ENTRY(hypercall_args_table) .byte 1 /* do_sysctl */ /* 35 */ .byte 1 /* do_domctl */ .byte 2 /* do_kexec */ + .byte 1 /* do_domgrpctl */ .rept NR_hypercalls-(.-hypercall_args_table) .byte 0 /* do_ni_hypercall */ .endr _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |