[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH] hw/xen_pt: Don't grant opregion permissions
From: |
Roger Pau Monné |
Subject: |
Re: [PATCH] hw/xen_pt: Don't grant opregion permissions |
Date: |
Mon, 15 Jun 2020 14:47:58 +0200 |
On Sun, Jun 14, 2020 at 11:21:09PM +0000, Grzegorz Uriasz wrote:
> With the upstreaming of linux based stubdomains to xen, qemu can't
> assume it runs inside dom0 - permission assignment must be moved to
> libxl running in dom0. This xen patch:
> https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00973.html
> implements granting the required permissions to the stubdomain running
> qemu. This patch removes granting opregion permissions in qemu - this
> should be fine as when qemu is running inside dom0 the memory mapping will
> be successfully created without first explicitly granting the permission.
In order to avoid breaking certain libxl - QEMU combinations, could
you make the check below non-fatal?
So that the current code can be kept for dom0 while not throwing an
error when used inside of a stub domain?
Thanks, Roger.