[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] x86/vvmx: Fix nested virt on VMCS-Shadow capable hardware
> From: Andrew Cooper [mailto:andrew.cooper3@xxxxxxxxxx] > Sent: Tuesday, July 30, 2019 10:43 PM > > c/s e9986b0dd "x86/vvmx: Simplify per-CPU memory allocations" had the > wrong > indirection on its pointer check in nvmx_cpu_up_prepare(), causing the > VMCS-shadowing buffer never be allocated. Fix it. > > This in turn results in a massive quantity of logspam, as every virtual > vmentry/exit hits both gdprintk()s in the *_bulk() functions. > > Switch these to using printk_once(). The size of the buffer is chosen at > compile time, so complaining about it repeatedly is of no benefit. > > Finally, drop the runtime NULL pointer checks. It is not terribly appropriate > to be repeatedly checking infrastructure which is set up from start-of-day, > and in this case, actually hid the above bug. > > Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |