WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-changelog

[Xen-changelog] [xen-unstable] Remove over-zealous assertion.

To: xen-changelog@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-changelog] [xen-unstable] Remove over-zealous assertion.
From: Xen patchbot-unstable <patchbot-unstable@xxxxxxxxxxxxxxxxxxx>
Date: Tue, 03 Jul 2007 13:35:23 -0700
Delivery-date: Tue, 03 Jul 2007 13:33:40 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-changelog-request@lists.xensource.com?subject=help>
List-id: BK change log <xen-changelog.lists.xensource.com>
List-post: <mailto:xen-changelog@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=unsubscribe>
Reply-to: xen-devel@xxxxxxxxxxxxxxxxxxx
Sender: xen-changelog-bounces@xxxxxxxxxxxxxxxxxxx
# HG changeset patch
# User Steven Hand <steven@xxxxxxxxxxxxx>
# Date 1183474156 -3600
# Node ID 0528bc25c4042188bf25f5f0c365f7849d63a684
# Parent  b8e8061c5a9862d11f95e717c12c451182a0dc76
Remove over-zealous assertion.

Signed-off-by: Steven Hand <steven@xxxxxxxxxxxxx>
---
 xen/include/asm-x86/regs.h |    5 -----
 1 files changed, 5 deletions(-)

diff -r b8e8061c5a98 -r 0528bc25c404 xen/include/asm-x86/regs.h
--- a/xen/include/asm-x86/regs.h        Tue Jul 03 14:57:59 2007 +0100
+++ b/xen/include/asm-x86/regs.h        Tue Jul 03 15:49:16 2007 +0100
@@ -36,11 +36,6 @@ enum EFLAGS {
     unsigned long diff = (char *)guest_cpu_user_regs() - (char *)(r);         \
     /* Frame pointer must point into current CPU stack. */                    \
     ASSERT(diff < STACK_SIZE);                                                \
-    /* If a guest frame, it must be have guest privs (unless HVM guest).   */ \
-    /* We permit CS==0 which can come from an uninitialised trap entry. */    \
-    ASSERT((diff != 0) || vm86_mode(r) ||                                     \
-           ((r->cs&3) >= GUEST_KERNEL_RPL(current->domain)) ||                \
-           (r->cs == 0) || is_hvm_vcpu(current));                             \
     /* If not a guest frame, it must be a hypervisor frame. */                \
     ASSERT((diff == 0) || (!vm86_mode(r) && (r->cs == __HYPERVISOR_CS)));     \
     /* Return TRUE if it's a guest frame. */                                  \

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-changelog] [xen-unstable] Remove over-zealous assertion., Xen patchbot-unstable <=