[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v5 03/15] VMX: implement suppress #VE.
>>> On 14.07.15 at 02:14, <edmund.h.white@xxxxxxxxx> wrote: > In preparation for selectively enabling #VE in a later patch, set > suppress #VE on all EPTE's. > > Suppress #VE should always be the default condition for two reasons: > it is generally not safe to deliver #VE into a guest unless that guest > has been modified to receive it; and even then for most EPT violations only > the hypervisor is able to handle the violation. > > Signed-off-by: Ed White <edmund.h.white@xxxxxxxxx> > > Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> > Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> > Acked-by: Jun Nakajima <jun.nakajima@xxxxxxxxx> > --- Missing revision log here. And I think the dropping of the adjustment to ept_p2m_init() invalidates reviews as well as Jun's ack - just consider if my request to do so was wrong for some reason, and neither of them saw me asking for this. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |