Re: [PATCH v2 4/5] kvm: x86: mmu: Lockless access tracking for Intel CPUs without EPT A bits.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 30/11/2016 01:59, Junaid Shahid wrote:
>> > 
>> > Fair enough, but add a comment to explain the error_code check because I
>> > don't get it. :)
> The error_code check verifies that it was a Read access, as PFERR_USER_MASK
> is mapped to EPT_VIOLATION_READ. However, I have just realized that this isn’t
> the case when not using EPT. So I’ll just use the following instead, which 
> works for both EPT and non-EPT:

Looks good, thanks!

Paolo
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux