On 27/02/15 11:33, Roger Pau Monne wrote:
> iommu_share_p2m_table should not prevent PVH guests from using a shared page
> table between the IOMMU and EPT. Clean the code by removing the asserts in
> the vendor specific implementations (amd_iommu_share_p2m, iommu_set_pgd),
> and moving the hap_enabled assert to the caller (iommu_share_p2m_table).
> 
> Also fix another incorrect usage of is_hvm_domain usage in
> arch_iommu_populate_page_table. This has not given problems so far because
> all the pages in PVH guests are of type PGT_writable_page.

dom0 PVH failed to boot on my test system without this patch so:

Tested-by: David Vrabel <david.vra...@citrix.com>

Thanks.

David


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to