[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] [HVM][VMX] Safer treatment of VM_EXEC_CONTROL when dealing w/ PENDING_INTERRUPT vmexit.
# HG changeset patch # User kaf24@xxxxxxxxxxxxxxxxxxxx # Node ID 4105520841b3f2fae02adb153b9c8b32995293d6 # Parent 1e2ea40078f2ce25d55918ca3b7f9bf818b72bca [HVM][VMX] Safer treatment of VM_EXEC_CONTROL when dealing w/ PENDING_INTERRUPT vmexit. Signed-off-by: George Dunlap <dunlapg@xxxxxxxxx> --- xen/arch/x86/hvm/vmx/vmx.c | 12 ++++++++++-- 1 files changed, 10 insertions(+), 2 deletions(-) diff -r 1e2ea40078f2 -r 4105520841b3 xen/arch/x86/hvm/vmx/vmx.c --- a/xen/arch/x86/hvm/vmx/vmx.c Tue Jun 27 09:33:35 2006 +0100 +++ b/xen/arch/x86/hvm/vmx/vmx.c Tue Jun 27 09:41:09 2006 +0100 @@ -2148,9 +2148,17 @@ asmlinkage void vmx_vmexit_handler(struc vmx_vmexit_do_extint(®s); break; case EXIT_REASON_PENDING_INTERRUPT: + /* + * Not sure exactly what the purpose of this is. The only bits set + * and cleared at this point are CPU_BASED_VIRTUAL_INTR_PENDING. + * (in io.c:{enable,disable}_irq_window(). So presumably we want to + * set it to the original value... + */ + v->arch.hvm_vcpu.u.vmx.exec_control &= ~CPU_BASED_VIRTUAL_INTR_PENDING; + v->arch.hvm_vcpu.u.vmx.exec_control |= + (MONITOR_CPU_BASED_EXEC_CONTROLS & CPU_BASED_VIRTUAL_INTR_PENDING); __vmwrite(CPU_BASED_VM_EXEC_CONTROL, - MONITOR_CPU_BASED_EXEC_CONTROLS); - v->arch.hvm_vcpu.u.vmx.exec_control = MONITOR_CPU_BASED_EXEC_CONTROLS; + v->arch.hvm_vcpu.u.vmx.exec_control); break; case EXIT_REASON_TASK_SWITCH: __hvm_bug(®s); _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |