|
|
|
|
|
|
|
|
|
|
xen-changelog
[Xen-changelog] [xen-unstable] [HVM] Pass all non-RAM memory accesses to
# HG changeset patch
# User kfraser@xxxxxxxxxxxxxxxxxxxxx
# Node ID 49d16162a5856e2a0987afb2071f67229a3f58be
# Parent 068aed15496dc0d1209ef2fbb19bba0f107b9cd6
[HVM] Pass all non-RAM memory accesses to handle_mmio().
It is up to handle_mmio() to correctly handle accesses outside
valid device mmio regions.
Signed-off-by: Keir Fraser <keir@xxxxxxxxxxxxx>
---
xen/arch/x86/mm/shadow/multi.c | 9 ---------
1 files changed, 9 deletions(-)
diff -r 068aed15496d -r 49d16162a585 xen/arch/x86/mm/shadow/multi.c
--- a/xen/arch/x86/mm/shadow/multi.c Fri Oct 20 09:28:31 2006 +0100
+++ b/xen/arch/x86/mm/shadow/multi.c Fri Oct 20 09:30:23 2006 +0100
@@ -2865,15 +2865,6 @@ static int sh_page_fault(struct vcpu *v,
mmio:
perfc_incrc(shadow_fault_mmio);
- if ( !hvm_apic_support(d) && (gpa >= 0xFEC00000) )
- {
- /* Need to deal with these disabled-APIC accesses, as
- * handle_mmio() apparently does not currently do that. */
- /* TJD: What about it, then? For now, I'm turning this BUG()
- * into a domain_crash() since we don't want to kill Xen. */
- SHADOW_ERROR("disabled-APIC access: not supported\n.");
- domain_crash(d);
- }
sh_audit_gw(v, &gw);
unmap_walk(v, &gw);
SHADOW_PRINTK("mmio\n");
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-changelog] [xen-unstable] [HVM] Pass all non-RAM memory accesses to handle_mmio().,
Xen patchbot-unstable <=
|
|
|
|
|