>>> On 05.12.16 at 19:24, <andrew.coop...@citrix.com> wrote: > core2_no_vpmu_ops exists solely to work around the default-leaking of > CPUID/MSR > values in Xen. > > With CPUID handling removed from arch_vpmu_ops, the RDMSR handling is the last > remaining hook. Since core2_no_vpmu_ops's introduction in c/s 25250ed7 "vpmu > intel: Add cpuid handling when vpmu disabled", a lot of work has been done and > the nop path in vpmu_do_msr() now suffices. > > vpmu_do_msr() also falls into the nop path for un-configured or unprivileged > domains, which enables the removal the duplicate logic in priv_op_read_msr(). > > Finally, make all arch_vpmu_ops structures const as they are never modified, > and make them static as they are not referred to externally. > > Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com> > Acked-by: Kevin Tian <kevin.t...@intel.com>
Acked-by: Jan Beulich <jbeul...@suse.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel