VirtualBox

Changeset 102059 in vbox for trunk/src/VBox/VMM


Ignore:
Timestamp:
Nov 10, 2023 8:26:16 AM (15 months ago)
Author:
vboxsync
Message:

VMM/PGM: Nested VMX: bugref:10318 Disabled overly strict assertion for Windows 10 Hyper-V.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/VMM/VMMAll/PGMAllBth.h

    r101058 r102059  
    30083008        PGMPOOLACCESS enmAccess;
    30093009        {
    3010             Assert(!(pGstWalkAll->u.Ept.Pde.u & EPT_E_USER_EXECUTE));  /* Mode-based execute control for EPT not supported. */
     3010            /*
     3011             * Mode-based execute control for EPT not supported.
     3012             * 
     3013             * However, Windows 10 with Hyper-V enabled sets the EPT_E_USER_EXECUTE bit but does
     3014             * not enable "mode-based execute control for EPT" in the VT-x secondary VM-execution
     3015             * controls. The CPU ignores this bit when the control isn't set. Hence, the assertion
     3016             * below is commented out.
     3017             */
     3018            /* Assert(!(pGstWalkAll->u.Ept.Pde.u & EPT_E_USER_EXECUTE)); */
     3019            Assert(!pVCpu->CTX_SUFF(pVM)->cpum.ro.GuestFeatures.fVmxModeBasedExecuteEpt);
    30113020            bool const fNoExecute = !(pGstWalkAll->u.Ept.Pde.u & EPT_E_EXECUTE);
    30123021            if (pGstWalkAll->u.Ept.Pde.u & EPT_E_WRITE)
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette