summaryrefslogtreecommitdiff
path: root/arch/x86/kvm/cpuid.c
diff options
context:
space:
mode:
authorPaolo Bonzini <pbonzini@redhat.com>2016-07-12 10:44:55 +0200
committerPaolo Bonzini <pbonzini@redhat.com>2017-12-14 09:26:40 +0100
commit0367f205a3b7c0efe774634eef1f4697c79a4132 (patch)
tree15ce5791e2bf606791f32b85a8bb9425291302b2 /arch/x86/kvm/cpuid.c
parent66336cab3531d3325ebde36a04725dddd0c42cb5 (diff)
downloadlinux-0367f205a3b7c0efe774634eef1f4697c79a4132.tar.gz
linux-0367f205a3b7c0efe774634eef1f4697c79a4132.tar.xz
KVM: vmx: add support for emulating UMIP
UMIP can be emulated almost perfectly on Intel processor by enabling descriptor-table exits. SMSW does not cause a vmexit and hence it cannot be changed into a #GP fault, but all in all it's the most "innocuous" of the unprivileged instructions that UMIP blocks. In fact, Linux is _also_ emulating SMSW instructions on behalf of the program that executes them, because some 16-bit programs expect to use SMSW to detect vm86 mode, so this is an even smaller issue. Reviewed-by: Wanpeng Li <wanpeng.li@hotmail.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/kvm/cpuid.c')
0 files changed, 0 insertions, 0 deletions