On 11/21/18 3:21 PM, Andrew Cooper wrote: > Seemingly, a majority of users either override the helpers anyway, or have an > gfn_t in their hands. > > Update the API, and adjust all users to match. > > Doing this highlighted a gaping altp2m security hole in > vmx_vcpu_update_vmfunc_ve(), which will need addressing now we can discuss the > problem and options publicly. > > Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
For the mem_access bits: Acked-by: Razvan Cojocaru <rcojoc...@bitdefender.com> Thanks, Razvan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel