From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [PATCH 01/10] Unprotect a page if #PF happens during NMI injection. Date: Wed, 13 May 2009 15:07:01 +0300 Message-ID: <4A0AB7E5.5000705@redhat.com> References: <1242038155-8759-1-git-send-email-gleb@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org To: Gleb Natapov Return-path: Received: from mx2.redhat.com ([66.187.237.31]:38704 "EHLO mx2.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756666AbZEMMHd (ORCPT ); Wed, 13 May 2009 08:07:33 -0400 Received: from int-mx2.corp.redhat.com (int-mx2.corp.redhat.com [172.16.27.26]) by mx2.redhat.com (8.13.8/8.13.8) with ESMTP id n4DC7XXC007591 for ; Wed, 13 May 2009 08:07:33 -0400 In-Reply-To: <1242038155-8759-1-git-send-email-gleb@redhat.com> Sender: kvm-owner@vger.kernel.org List-ID: Gleb Natapov wrote: > It is done for exception and interrupt already. > Applied, thanks. -- Do not meddle in the internals of kernels, for they are subtle and quick to panic.