[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v5 15/17] xenctx: Fix handling of !guest_protected_mode
On Thu, 2014-03-20 at 15:07 -0400, Don Slutz wrote: > @@ -851,6 +861,9 @@ static int print_stack(vcpu_guest_context_any_t *ctx, int > vcpu, int width, guest > return -1; > } > > + if ( !guest_protected_mode ) > + return 0; > + > if(xenctx.stack_trace) > printf("Stack Trace:\n"); > else > @@ -1016,7 +1029,8 @@ static void dump_ctx(int vcpu) > #ifndef NO_TRANSLATION > if (print_code(&ctx, vcpu)) > return; > - if ( kernel_addr(instr_pointer(&ctx)) >= KERNEL_TEXT_ADDR ) > + if ( !guest_protected_mode || Aren't this and the check in the previous hunk contradictory and/or equivalent (I can't decide which) > + kernel_addr(instr_pointer(&ctx)) >= KERNEL_TEXT_ADDR ) > if ( print_stack(&ctx, vcpu, guest_word_size, > stack_pointer(&ctx)) ) > return; _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |