>>> On 20.11.17 at 10:35, <ppircal...@bitdefender.com> wrote: > On Ma, 2017-10-24 at 13:19 +0300, Petre Pircalabu wrote: >> From: Razvan Cojocaru <rcojoc...@bitdefender.com> >> >> For the default EPT view we have xc_set_mem_access_multi(), which >> is able to set an array of pages to an array of access rights with >> a single hypercall. However, this functionality was lacking for the >> altp2m subsystem, which could only set page restrictions for one >> page at a time. This patch addresses the gap. >> >> HVMOP_altp2m_set_mem_access_multi has been added as a HVMOP (as >> opposed to a >> DOMCTL) for consistency with its HVMOP_altp2m_set_mem_access >> counterpart (and >> hence with the original altp2m design, where domains are allowed - >> with the >> proper altp2m access rights - to alter these settings), in the >> absence of an >> official position on the issue from the original altp2m designers. >> >> Signed-off-by: Razvan Cojocaru <rcojoc...@bitdefender.com> >> Signed-off-by: Petre Pircalabu <ppircal...@bitdefender.com> > > Are there still any outstanding issues with this patch?
I for one don't know - I simply did't get around to look at it yet. The tree's still frozen right now anyway. Jan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel