[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [RFC PATCH V3 04/12] xen/mem_access: Merge mem_event sanity check into mem_access check
The current sanity check when enabling mem_event is only applicable to mem_access. Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> --- xen/common/mem_event.c | 4 ---- xen/include/asm-x86/p2m.h | 8 +------- xen/include/public/domctl.h | 1 - 3 files changed, 1 insertion(+), 12 deletions(-) diff --git a/xen/common/mem_event.c b/xen/common/mem_event.c index 1501d59..c6ee505 100644 --- a/xen/common/mem_event.c +++ b/xen/common/mem_event.c @@ -619,10 +619,6 @@ int mem_event_domctl(struct domain *d, xen_domctl_mem_event_op_t *mec, case XEN_DOMCTL_MEM_EVENT_OP_MONITOR_ENABLE: case XEN_DOMCTL_MEM_EVENT_OP_MONITOR_ENABLE_INTROSPECTION: { - rc = -ENODEV; - if ( !p2m_mem_event_sanity_check(d) ) - break; - rc = mem_event_enable(d, mec, med, _VPF_mem_access, HVM_PARAM_MONITOR_RING_PFN, mem_access_notification); diff --git a/xen/include/asm-x86/p2m.h b/xen/include/asm-x86/p2m.h index 2cf73ca..b96f24c 100644 --- a/xen/include/asm-x86/p2m.h +++ b/xen/include/asm-x86/p2m.h @@ -599,16 +599,10 @@ void p2m_mem_event_emulate_check(struct vcpu *v, /* Enable arch specific introspection options (such as MSR interception). */ void p2m_setup_introspection(struct domain *d); -/* Sanity check for mem_event hardware support */ -static inline bool_t p2m_mem_event_sanity_check(struct domain *d) -{ - return hap_enabled(d) && cpu_has_vmx; -} - /* Sanity check for mem_access hardware support */ static inline bool_t p2m_mem_access_sanity_check(struct domain *d) { - return is_hvm_domain(d); + return is_hvm_domain(d) && hap_enabled(d) && cpu_has_vmx; } /* diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h index 46c9298..596a624 100644 --- a/xen/include/public/domctl.h +++ b/xen/include/public/domctl.h @@ -796,7 +796,6 @@ struct xen_domctl_gdbsx_domstatus { * * The XEN_DOMCTL_MEM_EVENT_OP_MONITOR_ENABLE* domctls return several * non-standard error codes to indicate why access could not be enabled: - * ENODEV - host lacks HAP support (EPT/NPT) or HAP is disabled in guest * EBUSY - guest has or had access enabled, ring buffer still active * */ -- 2.1.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |