[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] hw/xen_pt: Don't grant opregion permissions
On Sun, Jun 14, 2020 at 11:21:09PM +0000, Grzegorz Uriasz wrote: > With the upstreaming of linux based stubdomains to xen, qemu can't > assume it runs inside dom0 - permission assignment must be moved to > libxl running in dom0. This xen patch: > https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00973.html > implements granting the required permissions to the stubdomain running > qemu. This patch removes granting opregion permissions in qemu - this > should be fine as when qemu is running inside dom0 the memory mapping will > be successfully created without first explicitly granting the permission. In order to avoid breaking certain libxl - QEMU combinations, could you make the check below non-fatal? So that the current code can be kept for dom0 while not throwing an error when used inside of a stub domain? Thanks, Roger.
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |