[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-4.0-testing] x86 hvm ept: Remove EPT guest linear address validation
# HG changeset patch # User Keir Fraser <keir@xxxxxxx> # Date 1293186515 0 # Node ID 9d8d436ca319fa1bbdc180e4258baea8355931a3 # Parent 9c2fdcff370481f6bbef854741cd19c1413dc018 x86 hvm ept: Remove EPT guest linear address validation For EPT violation resulting from an attempt to load the guest PDPTEs as part of the execution of the MOV CR instruction, the EPT_GLA_VALID is not valid. This situation should not happen in most situation, since we always populate guest memory. But this is not ture for PAE guest under the PoD/Page sharing situation. In that situation, a page pointed by CR3 may be un-populated, and we need handle it in such situation. Signed-off-by: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx> xen-unstable changeset: 22574:b5418c045d02 xen-unstable date: Tue Dec 21 18:09:34 2010 +0000 --- xen/arch/x86/hvm/vmx/vmx.c | 3 +-- 1 files changed, 1 insertion(+), 2 deletions(-) diff -r 9c2fdcff3704 -r 9d8d436ca319 xen/arch/x86/hvm/vmx/vmx.c --- a/xen/arch/x86/hvm/vmx/vmx.c Mon Dec 20 10:21:20 2010 +0000 +++ b/xen/arch/x86/hvm/vmx/vmx.c Fri Dec 24 10:28:35 2010 +0000 @@ -2129,8 +2129,7 @@ static void ept_handle_violation(unsigne __trace_var(TRC_HVM_NPF, 0, sizeof(_d), &_d); } - if ( (qualification & EPT_GLA_VALID) && - hvm_hap_nested_page_fault(gfn) ) + if ( hvm_hap_nested_page_fault(gfn) ) return; /* Everything else is an error. */ _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |