[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] VMX: don't bypass vmx_update_secondary_exec_control()


  • To: Jan Beulich <JBeulich@xxxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
  • Date: Fri, 23 Sep 2016 23:21:11 +0000
  • Accept-language: en-US
  • Cc: "Nakajima, Jun" <jun.nakajima@xxxxxxxxx>
  • Delivery-date: Fri, 23 Sep 2016 23:21:41 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>
  • Thread-index: AQHSEz+QKmH/wcFtREmb8B4PlPT1aaCHu68g
  • Thread-topic: [PATCH] VMX: don't bypass vmx_update_secondary_exec_control()

> From: Jan Beulich [mailto:JBeulich@xxxxxxxx]
> Sent: Tuesday, September 20, 2016 9:04 PM
> 
> While putting together another patch modifying the secondary exec
> controls I noticed that vmx_vcpu_update_vmfunc_ve() does a raw VMWRITE
> instead of going through the designated function. I assume that is not
> how it should be.
> 
> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
> 

Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.