Re: 2.6.38-rc6: general protection error inside KVM 64 bits guest

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 03/06/2011 04:35 PM, Gleb Natapov wrote:
>  >+	r = ops->read_std(base + 102,&io_bitmap_ptr, 2, ctxt->vcpu, NULL);
>  >   	if (r != X86EMUL_CONTINUE)
>  >   		return false;
>
>  Note: if we get a fault here, we ought to propagate it.  Only
>  happens if there's a race, since the cpu checks for these
>  exceptions.
>
Do you mean we need to propagate fault that read_std() returns and not
always inject GP like we do now?

Yes, it could be a #PF (or #TS or #NPF).

(for #TS we need additional logic... will this arch never end?)

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux