On 27/02/15 11:33, Roger Pau Monne wrote: > iommu_share_p2m_table should not prevent PVH guests from using a shared page > table between the IOMMU and EPT. Clean the code by removing the asserts in > the vendor specific implementations (amd_iommu_share_p2m, iommu_set_pgd), > and moving the hap_enabled assert to the caller (iommu_share_p2m_table). > > Also fix another incorrect usage of is_hvm_domain usage in > arch_iommu_populate_page_table. This has not given problems so far because > all the pages in PVH guests are of type PGT_writable_page.
dom0 PVH failed to boot on my test system without this patch so: Tested-by: David Vrabel <david.vra...@citrix.com> Thanks. David _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel