On 10/26/18 2:02 PM, Jan Beulich wrote: >>>> On 25.09.18 at 13:02, <[email protected]> wrote: >> Move p2m_{get/set}_suppress_ve() to p2m.c, replace incorrect >> ASSERT() in p2m-pt.c (since a guest can run in shadow mode even on >> a system with virt exceptions, which would trigger the ASSERT()), >> move the VMX-isms (cpu_has_vmx_virt_exceptions checks) to >> p2m_ept_{get/set}_entry(), and fix locking code in >> p2m_get_suppress_ve(). >> >> Signed-off-by: Razvan Cojocaru <[email protected]> >> >> --- >> Changes since V2: >> - Rebased on staging, double-checked the patch. >> --- >> xen/arch/x86/mm/mem_access.c | 102 >> ------------------------------------------- >> xen/arch/x86/mm/p2m-ept.c | 11 +++++ >> xen/arch/x86/mm/p2m-pt.c | 3 +- >> xen/arch/x86/mm/p2m.c | 90 ++++++++++++++++++++++++++++++++++++++ >> 4 files changed, 103 insertions(+), 103 deletions(-) > > I still have this in my to-be-applied list, but I'm not sure whether it's > now stale, and it's still missing an ack from Tamas.
It has already been applied by George: https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=0348184dd2ee43d343623d3db647af3e635fd0c3 Thanks, Razvan _______________________________________________ Xen-devel mailing list [email protected] https://lists.xenproject.org/mailman/listinfo/xen-devel
