|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-changelog
[Xen-changelog] [xen-4.0-testing] x86 hvm ept: Remove EPT guest	linear a
 
# HG changeset patch
# User Keir Fraser <keir@xxxxxxx>
# Date 1293186515 0
# Node ID 9d8d436ca319fa1bbdc180e4258baea8355931a3
# Parent  9c2fdcff370481f6bbef854741cd19c1413dc018
x86 hvm ept: Remove EPT guest linear address validation
For EPT violation resulting from an attempt to load the guest PDPTEs
as part of the execution of the MOV CR instruction, the EPT_GLA_VALID
is not valid.  This situation should not happen in most situation,
since we always populate guest memory. But this is not ture for PAE
guest under the PoD/Page sharing situation. In that situation, a page
pointed by CR3 may be un-populated, and we need handle it in such
situation.
Signed-off-by: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx>
xen-unstable changeset:   22574:b5418c045d02
xen-unstable date:        Tue Dec 21 18:09:34 2010 +0000
---
 xen/arch/x86/hvm/vmx/vmx.c |    3 +--
 1 files changed, 1 insertion(+), 2 deletions(-)
diff -r 9c2fdcff3704 -r 9d8d436ca319 xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c        Mon Dec 20 10:21:20 2010 +0000
+++ b/xen/arch/x86/hvm/vmx/vmx.c        Fri Dec 24 10:28:35 2010 +0000
@@ -2129,8 +2129,7 @@ static void ept_handle_violation(unsigne
         __trace_var(TRC_HVM_NPF, 0, sizeof(_d), &_d);
     }
 
-    if ( (qualification & EPT_GLA_VALID) &&
-         hvm_hap_nested_page_fault(gfn) )
+    if ( hvm_hap_nested_page_fault(gfn) )
         return;
 
     /* Everything else is an error. */
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog
 |   
 
| <Prev in Thread] | 
Current Thread | 
[Next in Thread> |  
- [Xen-changelog] [xen-4.0-testing] x86 hvm ept: Remove EPT guest	linear address validation,
Xen patchbot-4.0-testing <=
  
 |  
  
 | 
    | 
  
  
    |   | 
    |