On Tue, Oct 24, 2017 at 11:19 AM, Petre Pircalabu
<ppircal...@bitdefender.com> wrote:
> From: Razvan Cojocaru <rcojoc...@bitdefender.com>
>
> For the default EPT view we have xc_set_mem_access_multi(), which
> is able to set an array of pages to an array of access rights with
> a single hypercall. However, this functionality was lacking for the
> altp2m subsystem, which could only set page restrictions for one
> page at a time. This patch addresses the gap.
>
> HVMOP_altp2m_set_mem_access_multi has been added as a HVMOP (as opposed to a
> DOMCTL) for consistency with its HVMOP_altp2m_set_mem_access counterpart (and
> hence with the original altp2m design, where domains are allowed - with the
> proper altp2m access rights - to alter these settings), in the absence of an
> official position on the issue from the original altp2m designers.
>
> Signed-off-by: Razvan Cojocaru <rcojoc...@bitdefender.com>
> Signed-off-by: Petre Pircalabu <ppircal...@bitdefender.com>

FWIW the approach looks good to me here.

You mainly need an x86 maintainer's ack and a toolstack maintainer's
ack (of which I am neither).

 -George

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to