- Timestamp:
- Aug 11, 2012 8:18:00 PM (12 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/VMM/VMMRC/TRPMRC.cpp
r42186 r42775 168 168 { 169 169 PVMCPU pVCpu = VMMGetCpu0(pVM); 170 LogRel(("FATAL ERROR: trpmRCShadowIDTWriteHandler: eip=%08X pvFault=%RGv pvRange=%08 X\r\n", pRegFrame->eip, pvFault, pvRange));170 LogRel(("FATAL ERROR: trpmRCShadowIDTWriteHandler: eip=%08X pvFault=%RGv pvRange=%08RGv\r\n", pRegFrame->eip, pvFault, pvRange)); 171 171 NOREF(uErrorCode); NOREF(offRange); 172 172 173 173 /* 174 * If we ever get here, then the guest has executed an SIDT instruction 175 * that we failed to patch. In theory this could be very bad, but there 176 * are nasty applications out there that install device drivers that mess 177 * with the guest's IDT. In those cases, it's quite ok to simply ignore 178 * the writes and pretend success. 174 * If we ever get here, then the guest has *probably* executed an SIDT 175 * instruction that we failed to patch. In theory this could be very bad, 176 * but there are nasty applications out there that install device drivers 177 * that mess with the guest's IDT. In those cases, it's quite ok to simply 178 * ignore the writes and pretend success. 179 * 180 * Another posibility is that the guest is touching some page memory and 181 * it having nothing to do with our IDT or anything like that, just a 182 * potential conflict that we didn't discover in time. 179 183 */ 180 184 DISSTATE Dis;
Note:
See TracChangeset
for help on using the changeset viewer.