On Wed, May 25, 2016 at 2:50 AM, David Vrabel <david.vra...@citrix.com> wrote: > On 24/05/16 23:48, Andy Lutomirski wrote: >> In aa1acff356bb ("x86/xen: Probe target addresses in >> set_aliased_prot() before the hypercall"), I added an explicit probe >> to work around a hypercall issue. The code can be simplified by >> using probe_kernel_read. > > Acked-by: David Vrabel <david.vra...@citrix.com>
Ingo, can you apply this one patch directly to x86/asm? The rest of the series is stalled pending my fixing Borislav's review comments and, more importantly, fixing the bugs that testing it has shaken loose. This patch is a nice cleanup all by itself, though. --Andy _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel