diff options
author | Gleb Natapov <gleb@redhat.com> | 2009-05-11 12:35:46 +0200 |
---|---|---|
committer | Avi Kivity <avi@redhat.com> | 2009-06-10 10:48:57 +0200 |
commit | 3298b75c880d6f0fd70750233c0f3e71a72a5bfb (patch) | |
tree | 8472e1747ac49a43d13e8c4c232415d107c6f3bc /arch/x86/kvm/vmx.c | |
parent | KVM: s390: Verify memory in kvm run (diff) | |
download | linux-3298b75c880d6f0fd70750233c0f3e71a72a5bfb.tar.xz linux-3298b75c880d6f0fd70750233c0f3e71a72a5bfb.zip |
KVM: Unprotect a page if #PF happens during NMI injection.
It is done for exception and interrupt already.
Signed-off-by: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'arch/x86/kvm/vmx.c')
-rw-r--r-- | arch/x86/kvm/vmx.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index f3ab27b5a6b2..8981654ad061 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -2615,7 +2615,7 @@ static int handle_exception(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) cr2 = vmcs_readl(EXIT_QUALIFICATION); KVMTRACE_3D(PAGE_FAULT, vcpu, error_code, (u32)cr2, (u32)((u64)cr2 >> 32), handler); - if (vcpu->arch.interrupt.pending || vcpu->arch.exception.pending) + if (kvm_event_needs_reinjection(vcpu)) kvm_mmu_unprotect_page_virt(vcpu, cr2); return kvm_mmu_page_fault(vcpu, cr2, error_code); } |