[prev in list] [next in list] [prev in thread] [next in thread]
List: xen-cvs
Subject: [Xen-changelog] [xen-unstable] x86 vmx: Reuse idtv_info to avoid
From: Xen patchbot-unstable <patchbot-unstable () lists ! xensource ! com>
Date: 2009-04-29 3:35:09
Message-ID: 200904290335.n3T3ZA8H022805 () xenbits ! xensource ! com
[Download RAW message or body]
# HG changeset patch
# User Keir Fraser <keir.fraser@citrix.com>
# Date 1240922708 -3600
# Node ID 648d7de355ddfda2c8c2836ee947f9fa323be5ac
# Parent f734a724902b10ead458f41d57322ef9756512ea
x86 vmx: Reuse idtv_info to avoid double read of IDT_VECTORING.
Signed-off-by: Eddie Dong <eddie.dong@intel.com>
---
xen/arch/x86/hvm/vmx/vmx.c | 2 +-
1 files changed, 1 insertion(+), 1 deletion(-)
diff -r f734a724902b -r 648d7de355dd xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c Mon Apr 27 18:59:56 2009 +0100
+++ b/xen/arch/x86/hvm/vmx/vmx.c Tue Apr 28 13:45:08 2009 +0100
@@ -2347,7 +2347,7 @@ asmlinkage void vmx_vmexit_handler(struc
* (NB. If we emulate this IRET for any reason, we should re-clear!)
*/
if ( unlikely(intr_info & INTR_INFO_NMI_UNBLOCKED_BY_IRET) &&
- !(__vmread(IDT_VECTORING_INFO) & INTR_INFO_VALID_MASK) &&
+ !(idtv_info & INTR_INFO_VALID_MASK) &&
(vector != TRAP_double_fault) )
__vmwrite(GUEST_INTERRUPTIBILITY_INFO,
__vmread(GUEST_INTERRUPTIBILITY_INFO)
_______________________________________________
Xen-changelog mailing list
Xen-changelog@lists.xensource.com
http://lists.xensource.com/xen-changelog
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic