>>> On 15.06.18 at 15:26, <jgr...@suse.com> wrote:
> Add a new function to query whether hypercall buffers are always safe
> to access by the hypervisor or might result in EFAULT.
> 
> Signed-off-by: Juergen Gross <jgr...@suse.com>
> ---
>  tools/libs/call/Makefile          | 2 +-
>  tools/libs/call/freebsd.c         | 5 +++++
>  tools/libs/call/include/xencall.h | 7 +++++++
>  tools/libs/call/libxencall.map    | 5 +++++
>  tools/libs/call/linux.c           | 5 +++++
>  tools/libs/call/minios.c          | 5 +++++
>  tools/libs/call/netbsd.c          | 5 +++++
>  tools/libs/call/solaris.c         | 5 +++++
>  8 files changed, 38 insertions(+), 1 deletion(-)

Did you verify all of them to indeed be safe? If not, wouldn't it be better to
default to unsafe?

For Linux, is there perhaps a way to figure out whether the problem
features don't exist (or are disabled) in the kernel, so that (especially
on older kernels, where the privcmd driver surely is an old one) you
don't needlessly do the retries?

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to