Changeset 80840 in vbox for trunk/src/VBox/VMM/VMMR0/HMVMXR0.cpp
- Timestamp:
- Sep 17, 2019 5:44:30 AM (5 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/VMM/VMMR0/HMVMXR0.cpp
r80815 r80840 852 852 * Modifications to CR0 bits that VT-x ignores saving/restoring (CD, ET, NW) and 853 853 * to CR0 bits that we require for shadow paging (PG) by the guest must cause VM-exits. 854 * 855 * Furthermore, modifications to any bits that are reserved/unspecified currently 856 * by the Intel spec. must also cause a VM-exit. This prevents unpredictable behavior 857 * when future CPUs specify and use currently reserved/unspecified bits. 854 858 */ 855 859 /** @todo Avoid intercepting CR0.PE with unrestricted guest execution. Fix PGM 856 860 * enmGuestMode to be in-sync with the current mode. See @bugref{6398} 857 861 * and @bugref{6944}. */ 858 P VMCC pVM = pVCpu->CTX_SUFF(pVM);862 PCVMCC pVM = pVCpu->CTX_SUFF(pVM); 859 863 return ( X86_CR0_PE 860 864 | X86_CR0_NE 861 865 | (pVM->hm.s.fNestedPaging ? 0 : X86_CR0_WP) 862 866 | X86_CR0_PG 863 | X86_CR0_ET /* Bit ignored on VM-entry and VM-exit. Don't let the guest modify the host CR0.ET */ 864 | X86_CR0_CD /* Bit ignored on VM-entry and VM-exit. Don't let the guest modify the host CR0.CD */ 865 | X86_CR0_NW); /* Bit ignored on VM-entry and VM-exit. Don't let the guest modify the host CR0.NW */ 867 | VMX_EXIT_HOST_CR0_IGNORE_MASK); 866 868 } 867 869
Note:
See TracChangeset
for help on using the changeset viewer.