[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] x86/pvh: Fix pvh dom0 boot after dab11417d
Changeset dab11417d "x86/HVM: consolidate and sanitize CR4 guest reserved bit determination" did not take into account the fact that dom0 does not have a cpuid policy. As a result, PVH dom0s would be given unexpected #GP faults on boot. In addition to the restore case (where the toolstack has not had time to load a cpuid policy), unconditionally exempt the hardware domain from needing a policy. Reported-by: Roger Pau Monnà <roger.pau@xxxxxxxxxx> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CC: Jan Beulich <JBeulich@xxxxxxxx> --- xen/arch/x86/hvm/hvm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index ef2411c..db54814 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -1738,7 +1738,7 @@ static unsigned long hvm_cr4_guest_reserved_bits(const struct vcpu *v, unsigned int leaf1_ecx = 0, leaf1_edx = 0; unsigned int leaf7_0_ebx = 0, leaf7_0_ecx = 0; - if ( likely(!restore) ) + if ( !restore && !is_hardware_domain(v->domain) ) { unsigned int level; -- 1.7.10.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |