[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAFLBxZYnaeEGTbuU5QoKJOU62Ck9p_B53bjAd46Z7uVgOxXH8g@mail.gmail.com>
Date: Thu, 31 Jul 2014 13:49:10 -0400
From: George Dunlap <George.Dunlap@...citrix.com>
To: David Vrabel <david.vrabel@...rix.com>
Cc: Ian Campbell <Ian.Campbell@...rix.com>,
Frediano Ziglio <frediano.ziglio@...rix.com>,
xen-devel <xen-devel@...ts.xenproject.org>,
Boris Ostrovsky <boris.ostrovsky@...cle.com>,
linux-api@...r.kernel.org,
linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: [Xen-devel] [PATCH 1/2] xen: Implement ioctl to restrict privcmd
to a specific domain
On Thu, Jul 31, 2014 at 10:11 AM, David Vrabel <david.vrabel@...rix.com> wrote:
> On 31/07/14 14:53, Ian Campbell wrote:
>> On Thu, 2014-07-31 at 14:16 +0100, Frediano Ziglio wrote:
>>
>>> include/xen/interface/domctl.h | 1090 ++++++++++++++++++++++++++++++++++++
>>
>> domctl is an stable toolstack only hypervisor interface, so the kernel
>> cannot use it because it would then break.
>
> Ok. I guess we'll have to resurrect the idea to do something with XSM.
What kind of thing did you have in mind for XSM?
In general it seems like allowing a vcpu to switch into an XSM label
(not sure I've got the terminology right here) when it context
switches into a particular process might be the most flexible way for
that to work.
But would that actually be easier than implementing stub domains?
-George
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists