|
|
|
|
|
|
|
|
|
|
xen-changelog
[Xen-changelog] [xen-unstable] x86 hvm ept: Remove EPT guest linear addr
# HG changeset patch
# User Keir Fraser <keir@xxxxxxx>
# Date 1292954974 0
# Node ID b5418c045d029e8bf5eadfd4e1ef0b1822da7186
# Parent ff1b80ccecd9ed049cc694ab117100e83eab179f
x86 hvm ept: Remove EPT guest linear address validation
For EPT violation resulting from an attempt to load the guest PDPTEs
as part of the execution of the MOV CR instruction, the EPT_GLA_VALID
is not valid. This situation should not happen in most situation,
since we always populate guest memory. But this is not ture for PAE
guest under the PoD/Page sharing situation. In that situation, a page
pointed by CR3 may be un-populated, and we need handle it in such
situation.
Signed-off-by: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx>
---
xen/arch/x86/hvm/vmx/vmx.c | 3 +--
1 files changed, 1 insertion(+), 2 deletions(-)
diff -r ff1b80ccecd9 -r b5418c045d02 xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c Fri Dec 17 16:12:37 2010 +0000
+++ b/xen/arch/x86/hvm/vmx/vmx.c Tue Dec 21 18:09:34 2010 +0000
@@ -2079,8 +2079,7 @@ static void ept_handle_violation(unsigne
__trace_var(TRC_HVM_NPF, 0, sizeof(_d), &_d);
}
- if ( (qualification & EPT_GLA_VALID) &&
- hvm_hap_nested_page_fault(gfn) )
+ if ( hvm_hap_nested_page_fault(gfn) )
return;
/* Everything else is an error. */
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-changelog] [xen-unstable] x86 hvm ept: Remove EPT guest linear address validation,
Xen patchbot-unstable <=
|
|
|
|
|