Currently if one tries to execute VMX instruction from inside the
authorkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Sat, 11 Mar 2006 09:47:55 +0000 (10:47 +0100)
committerkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Sat, 11 Mar 2006 09:47:55 +0000 (10:47 +0100)
commit228c2668d19d9691fba5fab4b6d84607a3b4a04a
treeff053781877f26cacc21eddac4c1992de289511d
parent996548fdac5a60f8fcc9363412a4a85c02f70e32
 Currently if one tries to execute VMX instruction from inside the
VMX guest, the Xen hyper visor has no handling of it resulting in a
bug(). This patch handles such VMX instructions from the guest returning
invalid opcode to the guest. Also the macro VMX_INVALID_ERROR_CODE is
renamed to the more meaningful VMX_DELIVER_NO_ERROR_CODE.

Signed-Off-By: Nitin A Kamble <nitin.a.kamble@intel.com>
Signed-Off-By: Jun Nakajima <jun.nakajima@intel.com>=20
xen/arch/x86/hvm/svm/intr.c
xen/arch/x86/hvm/vmx/io.c
xen/arch/x86/hvm/vmx/vmx.c
xen/include/asm-x86/hvm/support.h
xen/include/asm-x86/hvm/vmx/vmx.h