|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-devel
[Xen-devel] [PATCH] Fix #GPF injection into compat guests in vm86	code 
| Fix #GPF injection into compat guests in vm86 code 
not to let the guest disable interrupts in the real EFLAGS.
This should be applied to all stable branches too, please. 
Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
diff -r eae66d92cee1 xen/arch/x86/x86_64/compat/traps.c
--- a/xen/arch/x86/x86_64/compat/traps.c        Wed Mar 24 15:26:57 2010 +0000
+++ b/xen/arch/x86/x86_64/compat/traps.c        Wed Mar 24 15:54:23 2010 +0000
@@ -101,9 +101,8 @@
         ti = &v->arch.guest_context.trap_ctxt[13];
         if ( TI_GET_IF(ti) )
             eflags &= ~X86_EFLAGS_IF;
-        regs->_eflags = eflags & ~(X86_EFLAGS_VM|X86_EFLAGS_RF|
-                                   X86_EFLAGS_NT|X86_EFLAGS_TF);
-
+        regs->_eflags &= ~(X86_EFLAGS_VM|X86_EFLAGS_RF|
+                           X86_EFLAGS_NT|X86_EFLAGS_TF);
         if ( unlikely(__put_user(0, (u32 *)regs->rsp)) )
             goto exit_and_crash;
         regs->_eip = ti->address;
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 | 
 
| <Prev in Thread] | Current Thread | [Next in Thread> |  | 
[Xen-devel] [PATCH] Fix #GPF injection into compat guests in vm86	code,
Tim Deegan <=
 |  |  | 
  
    |  |  |