On 12/13/2016 11:09 AM, Jan Beulich wrote: >>>> On 13.12.16 at 09:50, <rcojoc...@bitdefender.com> wrote: >> On 11/17/2016 07:11 AM, Tian, Kevin wrote: >>>> From: Razvan Cojocaru [mailto:rcojoc...@bitdefender.com] >>>> Sent: Wednesday, November 16, 2016 3:49 PM >>>> >>>> On 11/16/2016 09:22 AM, Tian, Kevin wrote: >>>>> Looks not working with APICv virtual interrupt delivery... >>>> >>>> It's only meant to work with "regular" injections (we'd like to be able >>>> to tell if xc_hvm_inject_trap() can succeed). APICv support could be a >>>> later patch, if desirable (AFAICT, the two types shouldn't collide, i.e. >>>> impede trap delivery as done by the xc_hvm_inject_trap() hypercall). >>>> >>>> >>> >>> OK then. Acked-by: Kevin Tian <kevin.t...@intel.com> >> >> AFAIK this has been acked by everyone a while back, > > Has it? I've meant to apply it the other day, but couldn't find > any ARM or AMD SVM maintainer acks.
Oh I see. At one point Julien came into the conversation but it was just a friendly discussion about spelling somewhere - I've misremembered that as an ack, I now see. Thanks, Razvan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel