|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH]Remove EPT guest linear address validation
Remove EPT guest linear address validation
For EPT violation resulting from an attempt to load the guest PDPTEs as part of
the execution of the MOV CR instruction, the EPT_GLA_VALID is not valid.
This situation should not happen in most situation, since we always populate
guest memory. But this is not ture for PAE guest under the PoD/Page sharing
situation. In that situation, a page pointed by CR3 may be un-populated, and we
need handle it in such situation.
Signed-off-by: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx>
diff -r ff1b80ccecd9 xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c Fri Dec 17 16:12:37 2010 +0000
+++ b/xen/arch/x86/hvm/vmx/vmx.c Mon Dec 20 18:52:16 2010 +0800
@@ -2079,8 +2079,7 @@ static void ept_handle_violation(unsigne
__trace_var(TRC_HVM_NPF, 0, sizeof(_d), &_d);
}
- if ( (qualification & EPT_GLA_VALID) &&
- hvm_hap_nested_page_fault(gfn) )
+ if ( hvm_hap_nested_page_fault(gfn) )
return;
/* Everything else is an error. */
Attachment:
remove_ept_linear_address_validation.patch _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |