From mboxrd@z Thu Jan 1 00:00:00 1970 From: Mukesh Rathor Subject: [V1 PATCH 1/3] pvh: early return from hvm_hap_nested_page_fault Date: Mon, 24 Feb 2014 17:03:55 -0800 Message-ID: <1393290237-28427-2-git-send-email-mukesh.rathor@oracle.com> References: <1393290237-28427-1-git-send-email-mukesh.rathor@oracle.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mail6.bemta4.messagelabs.com ([85.158.143.247]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1WI6TP-0001rr-KM for xen-devel@lists.xenproject.org; Tue, 25 Feb 2014 01:06:15 +0000 Received: from ucsinet22.oracle.com (ucsinet22.oracle.com [156.151.31.94]) by aserp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id s1P16Bl0008809 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for ; Tue, 25 Feb 2014 01:06:12 GMT Received: from userz7022.oracle.com (userz7022.oracle.com [156.151.31.86]) by ucsinet22.oracle.com (8.14.5+Sun/8.14.5) with ESMTP id s1P16Bq4009630 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 25 Feb 2014 01:06:11 GMT Received: from abhmp0005.oracle.com (abhmp0005.oracle.com [141.146.116.11]) by userz7022.oracle.com (8.14.5+Sun/8.14.4) with ESMTP id s1P16AZ1009619 for ; Tue, 25 Feb 2014 01:06:11 GMT In-Reply-To: <1393290237-28427-1-git-send-email-mukesh.rathor@oracle.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: xen-devel@lists.xenproject.org List-Id: xen-devel@lists.xenproject.org pvh does not support nested hvm at present. As such, return if pvh. Signed-off-by: Mukesh Rathor --- xen/arch/x86/hvm/hvm.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 69f7e74..a4a3dcf 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -1416,6 +1416,9 @@ int hvm_hap_nested_page_fault(paddr_t gpa, int sharing_enomem = 0; mem_event_request_t *req_ptr = NULL; + if ( is_pvh_vcpu(v) ) + return 0; + /* On Nested Virtualization, walk the guest page table. * If this succeeds, all is fine. * If this fails, inject a nested page fault into the guest. -- 1.8.3.1