* Andy Lutomirski <[email protected]> wrote:
> On Wed, May 25, 2016 at 2:50 AM, David Vrabel <[email protected]> wrote:
> > On 24/05/16 23:48, Andy Lutomirski wrote:
> >> In aa1acff356bb ("x86/xen: Probe target addresses in
> >> set_aliased_prot() before the hypercall"), I added an explicit probe
> >> to work around a hypercall issue. The code can be simplified by
> >> using probe_kernel_read.
> >
> > Acked-by: David Vrabel <[email protected]>
>
> Ingo, can you apply this one patch directly to x86/asm? The rest of
> the series is stalled pending my fixing Borislav's review comments
> and, more importantly, fixing the bugs that testing it has shaken
> loose. This patch is a nice cleanup all by itself, though.
Ok, agreed, done.
Note that I simplified it some more:
- probe_kernel_read(&dummy, (unsigned char *)v, 1);
+ probe_kernel_read(&dummy, v, 1);
... because 'v' already has a 'void *' natural type.
Thanks,
Ingo