[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] [VMX] Make sure that the WP bit is always set in CR0 when running SVM guests.



# HG changeset patch
# User Tim Deegan <Tim.Deegan@xxxxxxxxxxxxx>
# Node ID 6d892ea6194db5af3c3bed814110194a6afbbc31
# Parent  cd40792968cb8d7f561659d7427872c9518584ec
[VMX] Make sure that the WP bit is always set in CR0 when running SVM guests.
This is the VMX equivalent of cset 12525:4ddda0bbb57c.
Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxxxxx>
---
 xen/arch/x86/hvm/vmx/vmx.c |    3 ++-
 1 files changed, 2 insertions(+), 1 deletion(-)

diff -r cd40792968cb -r 6d892ea6194d xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c        Thu Nov 23 17:54:06 2006 +0000
+++ b/xen/arch/x86/hvm/vmx/vmx.c        Thu Nov 23 18:01:40 2006 +0000
@@ -1373,7 +1373,8 @@ static int vmx_set_cr0(unsigned long val
         __vm_clear_bit(EXCEPTION_BITMAP, EXCEPTION_BITMAP_NM);
     }
 
-    v->arch.hvm_vmx.cpu_cr0 = value | X86_CR0_PE | X86_CR0_PG | X86_CR0_NE;
+    v->arch.hvm_vmx.cpu_cr0 = (value | X86_CR0_PE | X86_CR0_PG 
+                               | X86_CR0_NE | X86_CR0_WP);
     __vmwrite(GUEST_CR0, v->arch.hvm_vmx.cpu_cr0);
 
     v->arch.hvm_vmx.cpu_shadow_cr0 = value;

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.