On 12/13/2016 11:09 AM, Jan Beulich wrote:
>>>> On 13.12.16 at 09:50, <rcojoc...@bitdefender.com> wrote:
>> On 11/17/2016 07:11 AM, Tian, Kevin wrote:
>>>> From: Razvan Cojocaru [mailto:rcojoc...@bitdefender.com]
>>>> Sent: Wednesday, November 16, 2016 3:49 PM
>>>>
>>>> On 11/16/2016 09:22 AM, Tian, Kevin wrote:
>>>>> Looks not working with APICv virtual interrupt delivery...
>>>>
>>>> It's only meant to work with "regular" injections (we'd like to be able
>>>> to tell if xc_hvm_inject_trap() can succeed). APICv support could be a
>>>> later patch, if desirable (AFAICT, the two types shouldn't collide, i.e.
>>>> impede trap delivery as done by the xc_hvm_inject_trap() hypercall).
>>>>
>>>>
>>>
>>> OK then. Acked-by: Kevin Tian <kevin.t...@intel.com>
>>
>> AFAIK this has been acked by everyone a while back,
> 
> Has it? I've meant to apply it the other day, but couldn't find
> any ARM or AMD SVM maintainer acks.

Oh I see. At one point Julien came into the conversation but it was just
a friendly discussion about spelling somewhere - I've misremembered that
as an ack, I now see.


Thanks,
Razvan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

Reply via email to