[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH V3] x86/altp2m: clean up p2m_{get/set}_suppress_ve()



On 10/26/18 2:02 PM, Jan Beulich wrote:
>>>> On 25.09.18 at 13:02, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
>> Move p2m_{get/set}_suppress_ve() to p2m.c, replace incorrect
>> ASSERT() in p2m-pt.c (since a guest can run in shadow mode even on
>> a system with virt exceptions, which would trigger the ASSERT()),
>> move the VMX-isms (cpu_has_vmx_virt_exceptions checks) to
>> p2m_ept_{get/set}_entry(), and fix locking code in
>> p2m_get_suppress_ve().
>>
>> Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
>>
>> ---
>> Changes since V2:
>>  - Rebased on staging, double-checked the patch.
>> ---
>>  xen/arch/x86/mm/mem_access.c | 102 
>> -------------------------------------------
>>  xen/arch/x86/mm/p2m-ept.c    |  11 +++++
>>  xen/arch/x86/mm/p2m-pt.c     |   3 +-
>>  xen/arch/x86/mm/p2m.c        |  90 ++++++++++++++++++++++++++++++++++++++
>>  4 files changed, 103 insertions(+), 103 deletions(-)
> 
> I still have this in my to-be-applied list, but I'm not sure whether it's
> now stale, and it's still missing an ack from Tamas.

It has already been applied by George:

https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=0348184dd2ee43d343623d3db647af3e635fd0c3


Thanks,
Razvan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.