[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 01/18] Nested Virtualization: tools
At 13:22 +0100 on 15 Apr (1271337756), Christoph Egger wrote: > diff -r 2d96bc60035c -r 0e6fd40c25bf xen/include/public/domctl.h > --- a/xen/include/public/domctl.h > +++ b/xen/include/public/domctl.h > @@ -60,10 +60,13 @@ struct xen_domctl_createdomain { > /* Should domain memory integrity be verifed by tboot during Sx? */ > #define _XEN_DOMCTL_CDF_s3_integrity 2 > #define XEN_DOMCTL_CDF_s3_integrity (1U<<_XEN_DOMCTL_CDF_s3_integrity) > - uint32_t flags; > /* Disable out-of-sync shadow page tables? */ > #define _XEN_DOMCTL_CDF_oos_off 3 > #define XEN_DOMCTL_CDF_oos_off (1U<<_XEN_DOMCTL_CDF_oos_off) > + /* Enable nested HVM (only valid with XEN_DOMCTL_CDF_hvm_guest) */ > +#define _XEN_DOMCTL_CDF_nestedhvm 4 > +#define XEN_DOMCTL_CDF_nestedhvm (1U<<_XEN_DOMCTL_CDF_nestedhvm) > + uint32_t flags; > }; > typedef struct xen_domctl_createdomain xen_domctl_createdomain_t; > DEFINE_XEN_GUEST_HANDLE(xen_domctl_createdomain_t); Does this need its own hyperacll flag? Couldn't we just gate it on whether the cpuid policy allows SVM? Cheers, Tim. -- Tim Deegan <Tim.Deegan@xxxxxxxxxx> Principal Software Engineer, XenServer Engineering Citrix Systems UK Ltd. (Company #02937203, SL9 0BG) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |