Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
xen.4507
56b0a884-x86-vmx-don-t-clobber-exception_bitmap...
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 56b0a884-x86-vmx-don-t-clobber-exception_bitmap-for-emulated-real-mode.patch of Package xen.4507
# Commit 78c93adf0a7f6a7abe249a63e7398ca1221a6d25 # Date 2016-02-02 14:00:52 +0100 # Author Andrew Cooper <andrew.cooper3@citrix.com> # Committer Jan Beulich <jbeulich@suse.com> x86/vmx: don't clobber exception_bitmap when entering/leaving emulated real mode Most updates to the exception bitmaps set or clear an individual bits. However, entering or exiting emulated real mode unilaterally clobbers it, leaving the exit code to recalculate what it should have been. This is error prone, and indeed currently fails to recalculate the TRAP_no_device intercept appropriately. Instead of overwriting exception_bitmap when entering emulated real mode, move the override into vmx_update_exception_bitmap() and leave exception_bitmap unmodified. This means that recalculation is unnecessary, and that the use of vmx_fpu_leave() and vmx_update_debug_state() while in emulated real mode doesn't result in TRAP_no_device and TRAP_int3 being un-intercepted. This is only a functional change on hardware lacking unrestricted guest support. Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Reviewed-by: Jan Beulich <jbeulich@suse.com> Acked-by: Kevin Tian <kevin.tian@intel.com> --- a/xen/arch/x86/hvm/vmx/vmx.c +++ b/xen/arch/x86/hvm/vmx/vmx.c @@ -341,10 +341,13 @@ void vmx_update_secondary_exec_control(s void vmx_update_exception_bitmap(struct vcpu *v) { + u32 bitmap = unlikely(v->arch.hvm_vmx.vmx_realmode) + ? 0xffffffffu : v->arch.hvm_vmx.exception_bitmap; + if ( nestedhvm_vcpu_in_guestmode(v) ) - nvmx_update_exception_bitmap(v, v->arch.hvm_vmx.exception_bitmap); + nvmx_update_exception_bitmap(v, bitmap); else - __vmwrite(EXCEPTION_BITMAP, v->arch.hvm_vmx.exception_bitmap); + __vmwrite(EXCEPTION_BITMAP, bitmap); } static int vmx_guest_x86_mode(struct vcpu *v) @@ -1206,8 +1209,6 @@ static void vmx_update_guest_cr(struct v { for ( s = x86_seg_cs ; s <= x86_seg_tr ; s++ ) vmx_set_segment_register(v, s, ®[s]); - v->arch.hvm_vmx.exception_bitmap = 0xffffffff; - vmx_update_exception_bitmap(v); } else { @@ -1215,13 +1216,9 @@ static void vmx_update_guest_cr(struct v if ( !(v->arch.hvm_vmx.vm86_segment_mask & (1<<s)) ) vmx_set_segment_register( v, s, &v->arch.hvm_vmx.vm86_saved_seg[s]); - v->arch.hvm_vmx.exception_bitmap = HVM_TRAP_MASK - | (paging_mode_hap(v->domain) ? - 0 : (1U << TRAP_page_fault)) - | (1U << TRAP_no_device); - vmx_update_exception_bitmap(v); - vmx_update_debug_state(v); } + + vmx_update_exception_bitmap(v); } v->arch.hvm_vcpu.hw_cr[0] =
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor