[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Fwd: Xen-4.1.6.1 backport for XSA156
>>> On 20.11.15 at 17:15, <stefan.bader@xxxxxxxxxxxxx> wrote: > So this is a quick hack I just tried and that keeps the HVM alive: > > @@ -1294,7 +1288,6 @@ void vmx_inject_hw_exception(int trap, i > switch ( trap ) > { > case TRAP_debug: > - type = X86_EVENTTYPE_SW_EXCEPTION; > if ( guest_cpu_user_regs()->eflags & X86_EFLAGS_TF ) > { > __restore_debug_registers(curr); > @@ -1302,6 +1295,13 @@ void vmx_inject_hw_exception(int trap, i > } > if ( cpu_has_monitor_trap_flag ) > break; > + if ( curr->domain->debugger_attached ) > + { > + /* Debug/Int3: Trap to debugger. */ > + domain_pause_for_debugger(); > + return; > + } > + break; > case TRAP_int3: > if ( curr->domain->debugger_attached ) > { > > Though this looks like an ugly hack and probably is wrong in the other case of > TRAP_debug caused by an opcode... Right, and I'm afraid this case doesn't get handled correctly even on -unstable now. But apart from that aspect I think the change above is okay. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |