On Sun, Jun 14, 2020 at 11:21:09PM +0000, Grzegorz Uriasz wrote: > With the upstreaming of linux based stubdomains to xen, qemu can't > assume it runs inside dom0 - permission assignment must be moved to > libxl running in dom0. This xen patch: > https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00973.html > implements granting the required permissions to the stubdomain running > qemu. This patch removes granting opregion permissions in qemu - this > should be fine as when qemu is running inside dom0 the memory mapping will > be successfully created without first explicitly granting the permission.
In order to avoid breaking certain libxl - QEMU combinations, could you make the check below non-fatal? So that the current code can be kept for dom0 while not throwing an error when used inside of a stub domain? Thanks, Roger.