From mboxrd@z Thu Jan 1 00:00:00 1970 From: Marcelo Tosatti Subject: Re: [PATCH v2] x86: svm: use cr_interception for SVM_EXIT_CR0_SEL_WRITE Date: Fri, 13 Mar 2015 11:47:01 -0300 Message-ID: <20150313144701.GA15129@amt.cnet> References: <20150306204435.18348.72139.stgit@joelvmguard2.amd.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Gleb Natapov , Paolo Bonzini , kvm@vger.kernel.org, Joerg Roedel , Borislav Petkov , linux-kernel@vger.kernel.org, David Kaplan , rkrcmar@redhat.com To: Joel Schopp Return-path: Content-Disposition: inline In-Reply-To: <20150306204435.18348.72139.stgit@joelvmguard2.amd.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: kvm.vger.kernel.org On Fri, Mar 06, 2015 at 02:44:35PM -0600, Joel Schopp wrote: > From: David Kaplan > > Another patch in my war on emulate_on_interception() use as a svm exit handler. > > These were pulled out of a larger patch at the suggestion of Radim Krcmar, see > https://lkml.org/lkml/2015/2/25/559 > > Changes since v1: > * fixed typo introduced after test, retested > > Signed-off-by: David Kaplan > [separated out just cr_interception part from larger removal of > INTERCEPT_CR0_WRITE, forward ported, tested] > Signed-off-by: Joel Schopp Applied, thanks.