[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Re: [PATCH] HVM guests are allowed to use the entire virtual address space for


  • To: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
  • From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
  • Date: Mon, 26 Jul 2010 11:52:30 +0200
  • Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
  • Delivery-date: Mon, 26 Jul 2010 02:53:31 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=sender:message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; b=Lj+MAROnyHtf283SdTz6P+3XlYbOO1KaP+C1KPYCmSKSa8osSEQ9gFei2rLPkMGhlC dTyVvgq7N8Jb9y3w9X9jtqNLPWNGsQk4Q+gvw2I6paXMujCCJyBAy/5sfNduUA+9ianN GlK1o48h4M1OFJ6dTU6oOOH6kT9+qkz0vlU58=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

On 05/25/2010 04:49 PM, Tim Deegan wrote:
whatever they want, without any Xen hole.  __addr_ok() is therefore
always true for such guests.

Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>

Sorry for picking up yet another old patch after two months. :)

Do you have a testcase for this or the other patch in the thread?

Paolo

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.