x86/altp2m: clean up p2m_{get/set}_suppress_ve()
authorRazvan Cojocaru <rcojocaru@bitdefender.com>
Tue, 25 Sep 2018 14:35:52 +0000 (15:35 +0100)
committerGeorge Dunlap <george.dunlap@citrix.com>
Tue, 25 Sep 2018 14:35:52 +0000 (15:35 +0100)
commit0348184dd2ee43d343623d3db647af3e635fd0c3
treec873843b85a7268a9965fbd0eef22bc1cafb51cb
parente8dfbc2962365ffa3d7ddcacaa5baaf4ed24b2af
x86/altp2m: clean up p2m_{get/set}_suppress_ve()

Move p2m_{get/set}_suppress_ve() to p2m.c, replace incorrect
ASSERT() in p2m-pt.c (since a guest can run in shadow mode even on
a system with virt exceptions, which would trigger the ASSERT()),
move the VMX-isms (cpu_has_vmx_virt_exceptions checks) to
p2m_ept_{get/set}_entry(), and fix locking code in
p2m_get_suppress_ve().

Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
Reviewed-by: George Dunlap <george.dunlap@citrix.com>
xen/arch/x86/mm/mem_access.c
xen/arch/x86/mm/p2m-ept.c
xen/arch/x86/mm/p2m-pt.c
xen/arch/x86/mm/p2m.c