On 10/26/18 2:02 PM, Jan Beulich wrote:
>>>> On 25.09.18 at 13:02, <[email protected]> wrote:
>> Move p2m_{get/set}_suppress_ve() to p2m.c, replace incorrect
>> ASSERT() in p2m-pt.c (since a guest can run in shadow mode even on
>> a system with virt exceptions, which would trigger the ASSERT()),
>> move the VMX-isms (cpu_has_vmx_virt_exceptions checks) to
>> p2m_ept_{get/set}_entry(), and fix locking code in
>> p2m_get_suppress_ve().
>>
>> Signed-off-by: Razvan Cojocaru <[email protected]>
>>
>> ---
>> Changes since V2:
>>  - Rebased on staging, double-checked the patch.
>> ---
>>  xen/arch/x86/mm/mem_access.c | 102 
>> -------------------------------------------
>>  xen/arch/x86/mm/p2m-ept.c    |  11 +++++
>>  xen/arch/x86/mm/p2m-pt.c     |   3 +-
>>  xen/arch/x86/mm/p2m.c        |  90 ++++++++++++++++++++++++++++++++++++++
>>  4 files changed, 103 insertions(+), 103 deletions(-)
> 
> I still have this in my to-be-applied list, but I'm not sure whether it's
> now stale, and it's still missing an ack from Tamas.

It has already been applied by George:

https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=0348184dd2ee43d343623d3db647af3e635fd0c3


Thanks,
Razvan

_______________________________________________
Xen-devel mailing list
[email protected]
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to