http://bugzilla.novell.com/show_bug.cgi?id=604966
http://bugzilla.novell.com/show_bug.cgi?id=604966#c12
--- Comment #12 from Stefan Dirsch 2010-06-01 12:16:42 UTC ---
(In reply to comment #11)
Created an attachment (id=366092)
--> (http://bugzilla.novell.com/attachment.cgi?id=366092) [details]
suggested patch
Although I can't explain why, this patch resolves the problem for me.
Subject: Not calling iopl() is triggering an undesired SEGV
References: bnc#604966
Reverts the following upstream commit:
commit bcdec3d0cd4434770cd841c33c030e0d7203881f
Author: Philip Langdale
Date: Thu Oct 23 23:35:28 2008 -0700
Remove call to iopl(). It's not portable and isn't necessary.
diff --git a/tools/vmmouse_detect.c b/tools/vmmouse_detect.c
index e5f14a3..0dd4827 100644
--- a/tools/vmmouse_detect.c
+++ b/tools/vmmouse_detect.c
@@ -47,6 +47,11 @@ main(void)
signal(SIGSEGV, segvCB);
#if defined __i386__ || defined __x86_64__
+ /*
+ * To access i/o ports above 0x3ff, we need to be in iopl(3).
+ */
+
+ iopl(3);
if (VMMouseClient_Enable()) {
VMMouseClient_Disable();
return 0;
And the upstream commit was:
commit bcdec3d0cd4434770cd841c33c030e0d7203881f
Author: Philip Langdale
Date: Thu Oct 23 23:35:28 2008 -0700
Remove call to iopl(). It's not portable and isn't necessary.
diff --git a/tools/vmmouse_detect.c b/tools/vmmouse_detect.c
index e5f14a3..0dd4827 100644
--- a/tools/vmmouse_detect.c
+++ b/tools/vmmouse_detect.c
@@ -47,11 +47,6 @@ main(void)
signal(SIGSEGV, segvCB);
#if defined __i386__ || defined __x86_64__
- /*
- * To access i/o ports above 0x3ff, we need to be in iopl(3).
- */
-
- iopl(3);
if (VMMouseClient_Enable()) {
VMMouseClient_Disable();
return 0;
--
Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.