>>> On 02.11.18 at 14:08, <wei.l...@citrix.com> wrote:
> On Mon, Oct 29, 2018 at 09:03:18AM -0600, Jan Beulich wrote:
>> >>> On 19.10.18 at 16:28, <wei.l...@citrix.com> wrote:
>> > @@ -548,10 +550,14 @@ ENTRY(ret_from_intr)
>> >          GET_CURRENT(bx)
>> >          testb $3, UREGS_cs(%rsp)
>> >          jz    restore_all_xen
>> > +#ifdef CONFIG_PV
>> >          movq  VCPU_domain(%rbx), %rax
>> >          cmpb  $0, DOMAIN_is_32bit_pv(%rax)
>> >          je    test_all_events
>> >          jmp   compat_test_all_events
>> > +#else
>> > +        BUG
>> > +#endif
>> 
>> Hmm, not sure here (and elsewhere): Another option is to
>> streamline execution by replacing the conditional branch with an
>> unconditional one in the !PV case. Andrew, do you have any
>> thoughts either way?
> 
> My original thought was to catch potential issues in Xen code which
> messes up with the permission level.  Using unconditional jump is fine
> by me, too. But in that case I will seek to at least add an assertion
> for debug build.

Assertion additions are definitely fine with me.

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to