|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] [PATCH]Remove EPT guest linear address validation
Remove EPT guest linear address validation
For EPT violation resulting from an attempt to load the guest PDPTEs as part of
the execution of the MOV CR instruction, the EPT_GLA_VALID is not valid.
This situation should not happen in most situation, since we always populate
guest memory. But this is not ture for PAE guest under the PoD/Page sharing
situation. In that situation, a page pointed by CR3 may be un-populated, and we
need handle it in such situation.
Signed-off-by: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx>
diff -r ff1b80ccecd9 xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c Fri Dec 17 16:12:37 2010 +0000
+++ b/xen/arch/x86/hvm/vmx/vmx.c Mon Dec 20 18:52:16 2010 +0800
@@ -2079,8 +2079,7 @@ static void ept_handle_violation(unsigne
__trace_var(TRC_HVM_NPF, 0, sizeof(_d), &_d);
}
- if ( (qualification & EPT_GLA_VALID) &&
- hvm_hap_nested_page_fault(gfn) )
+ if ( hvm_hap_nested_page_fault(gfn) )
return;
/* Everything else is an error. */
remove_ept_linear_address_validation.patch
Description: remove_ept_linear_address_validation.patch
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-devel] [PATCH]Remove EPT guest linear address validation,
Jiang, Yunhong <=
|
|
|
|
|