> -----Original Message-----
> From: Andrew Cooper
> Sent: 03 December 2018 11:14
> To: Paul Durrant <paul.durr...@citrix.com>; Xen-devel <xen-
> de...@lists.xen.org>
> Cc: Jan Beulich <jbeul...@suse.com>; Wei Liu <wei.l...@citrix.com>; Roger
> Pau Monne <roger....@citrix.com>; Jun Nakajima <jun.nakaj...@intel.com>;
> Kevin Tian <kevin.t...@intel.com>; Boris Ostrovsky
> <boris.ostrov...@oracle.com>; Suravee Suthikulpanit
> <suravee.suthikulpa...@amd.com>; Brian Woods <brian.wo...@amd.com>;
> Juergen Gross <jgr...@suse.com>
> Subject: Re: [PATCH 2/2] x86/hvm: Corrections to RDTSCP intercept handling
> 
> On 03/12/2018 09:17, Paul Durrant wrote:
> >> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
> >> index 365eeb2..a9f9b9b 100644
> >> --- a/xen/arch/x86/hvm/vmx/vmx.c
> >> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> >> @@ -3589,6 +3589,7 @@ void vmx_vmexit_handler(struct cpu_user_regs
> *regs)
> >>      unsigned long exit_qualification, exit_reason, idtv_info,
> intr_info =
> >> 0;
> >>      unsigned int vector = 0, mode;
> >>      struct vcpu *v = current;
> >> +    struct domain *currd = v->domain;
> > ... following the usual rules, you should now convert all uses of v-
> >domain in this function to use currd.
> 
> If this were new development work then perhaps (although it would take a
> series to clean vmx_vmexit_handler() up to style).
> 
> In this case however, the patch needs backporting to all the stable
> trees, at which point minimum perturbance is the most important aspect.

Fair enough.

  Paul

> 
> ~Andrew
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to