0d71e75f73
26369-libxl-devid.patch - fate##313584: pass bios information to XEN HVM guest 26554-hvm-firmware-passthrough.patch 26555-hvm-firmware-passthrough.patch 26556-hvm-firmware-passthrough.patch - Upstream patches from Jan 26516-ACPI-parse-table-retval.patch (Replaces CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch (Replaces CVE-2013-0153-xsa36.patch) 26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces CVE-2013-0153-xsa36.patch) 26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch 26529-gcc48-build-fix.patch 26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces CVE-2013-0153-xsa36.patch) 26532-AMD-IOMMU-phantom-MSI.patch 26536-xenoprof-div-by-0.patch 26576-x86-APICV-migration.patch 26577-x86-APICV-x2APIC.patch 26578-AMD-IOMMU-replace-BUG_ON.patch - bnc#797014 - no way to control live migrations 26547-tools-xc_fix_logic_error_in_stdiostream_progress.patch 26548-tools-xc_handle_tty_output_differently_in_stdiostream_progress.patch 26549-tools-xc_turn_XCFLAGS_*_into_shifts.patch 26550-tools-xc_restore_logging_in_xc_save.patch 26551-tools-xc_log_pid_in_xc_save-xc_restore_output.patch - PVonHVM: __devinit was removed in linux-3.8 OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=229
65 lines
2.9 KiB
Diff
65 lines
2.9 KiB
Diff
# HG changeset patch
|
|
# User Keir Fraser <keir@xen.org>
|
|
# Date 1359566139 28800
|
|
# Node ID 8201b6ec3564c80db5516cdcf36dcfa9b7fdd93b
|
|
# Parent 1fe8ecfdf10cc9077fc810364663a0f25a5c5b96
|
|
vmx: Simplify cr0 update handling by deferring cr4 changes to the cr4 handler.
|
|
|
|
Signed-off-by: Keir Fraser <keir@xen.org>
|
|
|
|
--- a/xen/arch/x86/hvm/vmx/vmx.c
|
|
+++ b/xen/arch/x86/hvm/vmx/vmx.c
|
|
@@ -1133,20 +1133,18 @@ static void vmx_update_guest_cr(struct v
|
|
|
|
if ( paging_mode_hap(v->domain) )
|
|
{
|
|
- /* We manage GUEST_CR3 when guest CR0.PE is zero or when cr3 memevents are on */
|
|
+ /* Manage GUEST_CR3 when CR0.PE=0. */
|
|
uint32_t cr3_ctls = (CPU_BASED_CR3_LOAD_EXITING |
|
|
CPU_BASED_CR3_STORE_EXITING);
|
|
v->arch.hvm_vmx.exec_control &= ~cr3_ctls;
|
|
if ( !hvm_paging_enabled(v) )
|
|
v->arch.hvm_vmx.exec_control |= cr3_ctls;
|
|
|
|
+ /* Trap CR3 updates if CR3 memory events are enabled. */
|
|
if ( v->domain->arch.hvm_domain.params[HVM_PARAM_MEMORY_EVENT_CR3] )
|
|
v->arch.hvm_vmx.exec_control |= CPU_BASED_CR3_LOAD_EXITING;
|
|
|
|
vmx_update_cpu_exec_control(v);
|
|
-
|
|
- /* Changing CR0.PE can change some bits in real CR4. */
|
|
- vmx_update_guest_cr(v, 4);
|
|
}
|
|
|
|
if ( !(v->arch.hvm_vcpu.guest_cr[0] & X86_CR0_TS) )
|
|
@@ -1176,8 +1174,6 @@ static void vmx_update_guest_cr(struct v
|
|
{
|
|
for ( s = x86_seg_cs ; s <= x86_seg_tr ; s++ )
|
|
vmx_set_segment_register(v, s, ®[s]);
|
|
- v->arch.hvm_vcpu.hw_cr[4] |= X86_CR4_VME;
|
|
- __vmwrite(GUEST_CR4, v->arch.hvm_vcpu.hw_cr[4]);
|
|
v->arch.hvm_vmx.exception_bitmap = 0xffffffff;
|
|
vmx_update_exception_bitmap(v);
|
|
}
|
|
@@ -1187,10 +1183,6 @@ static void vmx_update_guest_cr(struct v
|
|
if ( !(v->arch.hvm_vmx.vm86_segment_mask & (1<<s)) )
|
|
vmx_set_segment_register(
|
|
v, s, &v->arch.hvm_vmx.vm86_saved_seg[s]);
|
|
- v->arch.hvm_vcpu.hw_cr[4] =
|
|
- ((v->arch.hvm_vcpu.hw_cr[4] & ~X86_CR4_VME)
|
|
- |(v->arch.hvm_vcpu.guest_cr[4] & X86_CR4_VME));
|
|
- __vmwrite(GUEST_CR4, v->arch.hvm_vcpu.hw_cr[4]);
|
|
v->arch.hvm_vmx.exception_bitmap = HVM_TRAP_MASK
|
|
| (paging_mode_hap(v->domain) ?
|
|
0 : (1U << TRAP_page_fault))
|
|
@@ -1204,6 +1196,9 @@ static void vmx_update_guest_cr(struct v
|
|
v->arch.hvm_vcpu.guest_cr[0] | hw_cr0_mask;
|
|
__vmwrite(GUEST_CR0, v->arch.hvm_vcpu.hw_cr[0]);
|
|
__vmwrite(CR0_READ_SHADOW, v->arch.hvm_vcpu.guest_cr[0]);
|
|
+
|
|
+ /* Changing CR0 can change some bits in real CR4. */
|
|
+ vmx_update_guest_cr(v, 4);
|
|
break;
|
|
}
|
|
case 2:
|