|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v9 13/20] x86/VPMU: When handling MSR accesses, leave fault injection to callers
On 08/12/2014 12:00 PM, Jan Beulich wrote: On 12.08.14 at 17:47, <boris.ostrovsky@xxxxxxxxxx> wrote:On 08/12/2014 08:45 AM, Jan Beulich wrote:On 08.08.14 at 18:55, <boris.ostrovsky@xxxxxxxxxx> wrote: It won't. Which is why I made changes to vmx_msr_read/write_intercept() to only call this routine when we know that a VPMU register is possibly accessed. I thought about tri-stating vpmu_do_msr() returns (-1 for faults, 0 for no registers have been accessed, 1 for successful accesses) but decided against it. -boris _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |