[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] Fix injection of guest faults resulting from failed injection of a



# HG changeset patch
# User kaf24@xxxxxxxxxxxxxxxxxxxx
# Node ID 28f9610447b277d65cb8f1b716ad55bd2aaf3e01
# Parent  24b81d9eb81c0a6b2f8acec42290536b0edf3aa4
The current Xen code for VMX is setting the gp fault vmexiting in
the EXCEPTION_BITMAP vmcs control. There is no need for that as VMM is
just plainly re-injecting back to the guest. The attached is a simple
patch to set the vmcs control properly.

Signed-off-by: Nitin A Kamble <nitin.a.kamble@xxxxxxxxx>
Signed-off-by: Jun Nakajima <jun.nakajima@xxxxxxxxx>
xen-unstable changeset:   9956:a658da3a22dd3413a87b35496a490db028f98b19
xen-unstable date:        Mon May  8 14:53:09 2006 +0100
---
 xen/include/asm-x86/hvm/support.h |    3 +--
 1 files changed, 1 insertion(+), 2 deletions(-)

diff -r 24b81d9eb81c -r 28f9610447b2 xen/include/asm-x86/hvm/support.h
--- a/xen/include/asm-x86/hvm/support.h Fri May 05 14:07:53 2006 +0100
+++ b/xen/include/asm-x86/hvm/support.h Mon May 08 14:55:42 2006 +0100
@@ -94,8 +94,7 @@ enum hval_bitmaps {
 #else
 #define MONITOR_DEFAULT_EXCEPTION_BITMAP        \
     ( EXCEPTION_BITMAP_PG |                     \
-      EXCEPTION_BITMAP_BP |                     \
-      EXCEPTION_BITMAP_GP )
+      EXCEPTION_BITMAP_BP )
 #endif
 
 #define PC_DEBUG_PORT   0x80

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.