>>> On 13.12.16 at 15:50, <rcojoc...@bitdefender.com> wrote:
> Added support for a new event type, VM_EVENT_REASON_INTERRUPT,
> which is now fired in a one-shot manner when enabled via the new
> VM_EVENT_FLAG_GET_NEXT_INTERRUPT vm_event response flag.
> The patch also fixes the behaviour of the xc_hvm_inject_trap()
> hypercall, which would lead to non-architectural interrupts
> overwriting pending (specifically reinjected) architectural ones.
> 
> Signed-off-by: Razvan Cojocaru <rcojoc...@bitdefender.com>
> Acked-by: Tamas K Lengyel <ta...@tklengyel.com>
> Acked-by: Jan Beulich <jbeul...@suse.com>
> Acked-by: Kevin Tian <kevin.t...@intel.com>
> Acked-by: Suravee Suthikulpanit <suravee.suthikulpa...@amd.com>
> Acked-by: Julien Grall <julien.gr...@arm.com>
> 
> ---
> Changes since V5:
>  - Rebased on master and re-tested.

I have to admit that I find this rather annoying: The patch still
didn't apply cleanly (perhaps because you indeed did what is
written above, instead of re-basing onto staging, albeit otoh I
don't see how you would then have run into the build issue you
reported), which again I took the time to fix up, just to find that
again things don't build (for ARM at least).

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

Reply via email to