[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] [VMX] Make sure that the WP bit is always set in CR0 when running SVM guests.
# HG changeset patch # User Tim Deegan <Tim.Deegan@xxxxxxxxxxxxx> # Node ID 6d892ea6194db5af3c3bed814110194a6afbbc31 # Parent cd40792968cb8d7f561659d7427872c9518584ec [VMX] Make sure that the WP bit is always set in CR0 when running SVM guests. This is the VMX equivalent of cset 12525:4ddda0bbb57c. Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxxxxx> --- xen/arch/x86/hvm/vmx/vmx.c | 3 ++- 1 files changed, 2 insertions(+), 1 deletion(-) diff -r cd40792968cb -r 6d892ea6194d xen/arch/x86/hvm/vmx/vmx.c --- a/xen/arch/x86/hvm/vmx/vmx.c Thu Nov 23 17:54:06 2006 +0000 +++ b/xen/arch/x86/hvm/vmx/vmx.c Thu Nov 23 18:01:40 2006 +0000 @@ -1373,7 +1373,8 @@ static int vmx_set_cr0(unsigned long val __vm_clear_bit(EXCEPTION_BITMAP, EXCEPTION_BITMAP_NM); } - v->arch.hvm_vmx.cpu_cr0 = value | X86_CR0_PE | X86_CR0_PG | X86_CR0_NE; + v->arch.hvm_vmx.cpu_cr0 = (value | X86_CR0_PE | X86_CR0_PG + | X86_CR0_NE | X86_CR0_WP); __vmwrite(GUEST_CR0, v->arch.hvm_vmx.cpu_cr0); v->arch.hvm_vmx.cpu_shadow_cr0 = value; _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |