From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paolo Bonzini Subject: Re: [PATCH] HVM guests are allowed to use the entire virtual address space for Date: Mon, 26 Jul 2010 11:52:30 +0200 Message-ID: <4C4D5ADE.2050405@redhat.com> References: <0b3b2b31e962561390ca.1274798999@waitaha.uk.xensource.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <0b3b2b31e962561390ca.1274798999@waitaha.uk.xensource.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: Tim Deegan Cc: xen-devel@lists.xensource.com List-Id: xen-devel@lists.xenproject.org On 05/25/2010 04:49 PM, Tim Deegan wrote: > whatever they want, without any Xen hole. __addr_ok() is therefore > always true for such guests. > > Signed-off-by: Tim Deegan Sorry for picking up yet another old patch after two months. :) Do you have a testcase for this or the other patch in the thread? Paolo