|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RESEND v7 2/9] xsm bits for vNUMA hypercalls
>>> On 21.08.14 at 07:09, <ufimtseva@xxxxxxxxx> wrote:
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -989,6 +989,13 @@ long do_memory_op(unsigned long cmd,
> XEN_GUEST_HANDLE_PARAM(void) arg)
> if ( (d = rcu_lock_domain_by_any_id(topology.domid)) == NULL )
> return -ESRCH;
>
> + rc = xsm_get_vnumainfo(XSM_HOOK, d);
I think this needs to be XSM_TARGET, not XSM_HOOK.
Jan
> + if ( rc )
> + {
> + rcu_unlock_domain(d);
> + return rc;
> + }
> +
> rc = -EOPNOTSUPP;
>
> read_lock(&d->vnuma_rwlock);
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |