[prev in list] [next in list] [prev in thread] [next in thread] 

List:       xen-cvs
Subject:    [Xen-changelog] [xen-unstable] x86 vmx: Reuse idtv_info to avoid
From:       Xen patchbot-unstable <patchbot-unstable () lists ! xensource ! com>
Date:       2009-04-29 3:35:09
Message-ID: 200904290335.n3T3ZA8H022805 () xenbits ! xensource ! com
[Download RAW message or body]

# HG changeset patch
# User Keir Fraser <keir.fraser@citrix.com>
# Date 1240922708 -3600
# Node ID 648d7de355ddfda2c8c2836ee947f9fa323be5ac
# Parent  f734a724902b10ead458f41d57322ef9756512ea
x86 vmx: Reuse idtv_info to avoid double read of IDT_VECTORING.

Signed-off-by: Eddie Dong <eddie.dong@intel.com>
---
 xen/arch/x86/hvm/vmx/vmx.c |    2 +-
 1 files changed, 1 insertion(+), 1 deletion(-)

diff -r f734a724902b -r 648d7de355dd xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c	Mon Apr 27 18:59:56 2009 +0100
+++ b/xen/arch/x86/hvm/vmx/vmx.c	Tue Apr 28 13:45:08 2009 +0100
@@ -2347,7 +2347,7 @@ asmlinkage void vmx_vmexit_handler(struc
          * (NB. If we emulate this IRET for any reason, we should re-clear!)
          */
         if ( unlikely(intr_info & INTR_INFO_NMI_UNBLOCKED_BY_IRET) &&
-             !(__vmread(IDT_VECTORING_INFO) & INTR_INFO_VALID_MASK) &&
+             !(idtv_info & INTR_INFO_VALID_MASK) &&
              (vector != TRAP_double_fault) )
             __vmwrite(GUEST_INTERRUPTIBILITY_INFO,
                       __vmread(GUEST_INTERRUPTIBILITY_INFO)

_______________________________________________
Xen-changelog mailing list
Xen-changelog@lists.xensource.com
http://lists.xensource.com/xen-changelog
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic