[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH v1] x86/hvm: Update code in HVMOP_altp2m_set_suppress_ve


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx>
  • Date: Wed, 30 Oct 2019 13:02:25 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=bitdefender.com; dmarc=pass action=none header.from=bitdefender.com; dkim=pass header.d=bitdefender.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=f10+Txvgyuna+o/mcWEGpY8nLy794u6auX48FLQVNDI=; b=AbiDkwh9i6JEeK4ycP3BtMDnHk9BLaCjUi9iM1wTypJpDZdmOAEAnd1xyZp+b1cDa3tDsUHBcRi1zufcO/S9H0g6CMQ0uWcvw3BvCB+eYweGM89HbbDnRpURz8T7IG23rs/8PH9vx5n0miqXXD2myQS8+wGe6YGb+FVoW+I9tsmK0BJMaKycRrYEA3NUKgM2KTwLaE/V7psigeSrvJfkABOA751ghuYi9e8slEOfB6X5d8uPqlNapo18VykVZitKnHuetfh2K5TMyd/zjlNjQovqhLwBhgVLvZzRkqazzAGFqWU7e8it1b5mdMtfRvGn3GDuzuYxs7Gb0owSTCI89A==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ewmMz+p/JU4fTTULl6/x4ry6AvILj9aYxpEs/3pdj6/vwacUNYOwRVggqHFIJi0jVr+EMiiE7Qb9mKS8GB76O/A9GcYona8vKrWz0cO6x/KaCooFy9Qu4zTP35icEq0FJsq0IkMppE/DpiGKQEJand0gfIzzuVCNgSBLkN0EI0a5NYoUVJ25UR3tKR1CjpR58NfMGtGWEuaPixm5XTIDsm1h2yQUDk57caiIuuClhtyKj3gaxLxWzU+JS3Z4q5THvCzy1897JFOfgQnzHhm+dbzYIwn4ojjvnRtqJbssayQ99UjNAaakw7eet9SvLp8UwZuNcocY4RZCMaM7+ZARiw==
  • Authentication-results: spf=none (sender IP is ) smtp.mailfrom=aisaila@xxxxxxxxxxxxxxx;
  • Cc: Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx>, "andrew.cooper3@xxxxxxxxxx" <andrew.cooper3@xxxxxxxxxx>, "wl@xxxxxxx" <wl@xxxxxxx>, "jbeulich@xxxxxxxx" <jbeulich@xxxxxxxx>, "roger.pau@xxxxxxxxxx" <roger.pau@xxxxxxxxxx>
  • Delivery-date: Wed, 30 Oct 2019 13:02:36 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHVjyJG8jOGSwzG50aoFrq0l89wTg==
  • Thread-topic: [PATCH v1] x86/hvm: Update code in HVMOP_altp2m_set_suppress_ve

Originally the gfn and altp2m_idx are assigned from the a.u.mem_access union.
This works because it's the same memory used. This patch addresses this
issue by changing the mem_access union with the suppress_ve union for
consistency.

Signed-off-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx>
---
 xen/arch/x86/hvm/hvm.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index e4c0425330..06a7b40107 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -4685,8 +4685,8 @@ static int do_altp2m_op(
             rc = -EINVAL;
         else
         {
-            gfn_t gfn = _gfn(a.u.mem_access.gfn);
-            unsigned int altp2m_idx = a.u.mem_access.view;
+            gfn_t gfn = _gfn(a.u.suppress_ve.gfn);
+            unsigned int altp2m_idx = a.u.suppress_ve.view;
             bool suppress_ve = a.u.suppress_ve.suppress_ve;
 
             rc = p2m_set_suppress_ve(d, gfn, suppress_ve, altp2m_idx);
-- 
2.17.1


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.