[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-3.0.3-testing] [HVM][VMX] Clear vmxe when VMX is not enabled.
# HG changeset patch # User kfraser@xxxxxxxxxxxxxxxxxxxxx # Date 1159525593 -3600 # Node ID bcd0e18f7881edee8ef8cd915cdf000ec84a2468 # Parent be78be7009c55c1f8bbaf0cb90283d1aa71627fb [HVM][VMX] Clear vmxe when VMX is not enabled. The current Xen code keeps X86_CR4_VMXE set even if VMXON has not been executed. The stop_vmx() code assumes that it is possible to call VMXOFF if X86_CR4_VMXE is set which is not always true. Calling VMXOFF without VMXON results in an illegal opcode trap, and to avoid this condition this patch makes sure that X86_CR4_VMXE is only set when VMXON has been called. Tested using x86_32 on a Pentium D 930. Signed-Off-By: Magnus Damm <magnus@xxxxxxxxxxxxx> --- xen/arch/x86/hvm/vmx/vmx.c | 8 ++++++-- 1 files changed, 6 insertions(+), 2 deletions(-) diff -r be78be7009c5 -r bcd0e18f7881 xen/arch/x86/hvm/vmx/vmx.c --- a/xen/arch/x86/hvm/vmx/vmx.c Fri Sep 29 11:22:24 2006 +0100 +++ b/xen/arch/x86/hvm/vmx/vmx.c Fri Sep 29 11:26:33 2006 +0100 @@ -485,8 +485,10 @@ static void vmx_ctxt_switch_to(struct vc static void stop_vmx(void) { - if (read_cr4() & X86_CR4_VMXE) - __vmxoff(); + if ( !(read_cr4() & X86_CR4_VMXE) ) + return; + __vmxoff(); + clear_in_cr4(X86_CR4_VMXE); } void vmx_migrate_timers(struct vcpu *v) @@ -806,12 +808,14 @@ int start_vmx(void) if ( (vmcs = vmx_alloc_host_vmcs()) == NULL ) { + clear_in_cr4(X86_CR4_VMXE); printk("Failed to allocate host VMCS\n"); return 0; } if ( __vmxon(virt_to_maddr(vmcs)) ) { + clear_in_cr4(X86_CR4_VMXE); printk("VMXON failed\n"); vmx_free_host_vmcs(vmcs); return 0; _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |