[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] [HVM] Pass all non-RAM memory accesses to handle_mmio().



# HG changeset patch
# User kfraser@xxxxxxxxxxxxxxxxxxxxx
# Node ID 49d16162a5856e2a0987afb2071f67229a3f58be
# Parent  068aed15496dc0d1209ef2fbb19bba0f107b9cd6
[HVM] Pass all non-RAM memory accesses to handle_mmio().

It is up to handle_mmio() to correctly handle accesses outside
valid device mmio regions.

Signed-off-by: Keir Fraser <keir@xxxxxxxxxxxxx>
---
 xen/arch/x86/mm/shadow/multi.c |    9 ---------
 1 files changed, 9 deletions(-)

diff -r 068aed15496d -r 49d16162a585 xen/arch/x86/mm/shadow/multi.c
--- a/xen/arch/x86/mm/shadow/multi.c    Fri Oct 20 09:28:31 2006 +0100
+++ b/xen/arch/x86/mm/shadow/multi.c    Fri Oct 20 09:30:23 2006 +0100
@@ -2865,15 +2865,6 @@ static int sh_page_fault(struct vcpu *v,
 
  mmio:
     perfc_incrc(shadow_fault_mmio);
-    if ( !hvm_apic_support(d) && (gpa >= 0xFEC00000) )
-    {
-        /* Need to deal with these disabled-APIC accesses, as
-         * handle_mmio() apparently does not currently do that. */
-        /* TJD: What about it, then?   For now, I'm turning this BUG() 
-         * into a domain_crash() since we don't want to kill Xen. */
-        SHADOW_ERROR("disabled-APIC access: not supported\n.");
-        domain_crash(d); 
-    }
     sh_audit_gw(v, &gw);
     unmap_walk(v, &gw);
     SHADOW_PRINTK("mmio\n");

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.