|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH v2 4/8] x86/emul: Populate pending_dbg field of x86_event from {svm,vmx}_get_pending_event()
Ensure that we pass the correct pending_dbg value to
hvm_monitor_interrupt().
Signed-off-by: Jinoh Kang <jinoh.kang.kr@xxxxxxxxx>
---
CC: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
CC: Jan Beulich <JBeulich@xxxxxxxx>
CC: Wei Liu <wl@xxxxxxx>
CC: Roger Pau Monné <roger.pau@xxxxxxxxxx>
CC: Jun Nakajima <jun.nakajima@xxxxxxxxx>
CC: Kevin Tian <kevin.tian@xxxxxxxxx>
CC: Tamas K Lengyel <tamas@xxxxxxxxxxxxx>
CC: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx>
CC: Petre Pircalabu <ppircalabu@xxxxxxxxxxxxxxx>
v1 -> v2: new patch
---
xen/arch/x86/hvm/svm/svm.c | 8 ++++++++
xen/arch/x86/hvm/vmx/vmx.c | 8 ++++++++
2 files changed, 16 insertions(+)
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
index 3d0402cb10..038c8d6e7e 100644
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -2422,6 +2422,14 @@ static bool cf_check svm_get_pending_event(
info->type = vmcb->event_inj.type;
info->error_code = vmcb->event_inj.ec;
+ if ( info->type == X86_EVENTTYPE_HW_EXCEPTION &&
+ info->vector == X86_EXC_DB )
+ {
+ unsigned long dr6 = v->arch.hvm.flag_dr_dirty ?
+ vmcb_get_dr6(vmcb) : v->arch.dr6;
+ info->pending_dbg = dr6 ^ X86_DR6_DEFAULT;
+ }
+
return true;
}
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index 9c92d2be92..9b59374258 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -2469,6 +2469,14 @@ static bool cf_check vmx_get_pending_event(
info->type = MASK_EXTR(intr_info, INTR_INFO_INTR_TYPE_MASK);
info->error_code = error_code;
+ if ( info->type == X86_EVENTTYPE_HW_EXCEPTION &&
+ info->vector == X86_EXC_DB )
+ {
+ unsigned long dr6 = v->arch.hvm.flag_dr_dirty ?
+ read_debugreg(6) : v->arch.dr6;
+ info->pending_dbg = dr6 ^ X86_DR6_DEFAULT;
+ }
+
return true;
}
--
2.41.0
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |