[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] x86: don't expose SYSENTER on unknown CPUs
# HG changeset patch # User Jan Beulich <jbeulich@xxxxxxxx> # Date 1345444801 -7200 # Node ID 4b0d263008cdf4585fe30ec2847b0a810db12354 # Parent 73ac4b7ad2e14bf468fe7d4d032c80c6bd7350ad x86: don't expose SYSENTER on unknown CPUs So far we only ever set up the respective MSRs on Intel CPUs, yet we hide the feature only on a 32-bit hypervisor. That prevents booting of PV guests on top of a 64-bit hypervisor making use of the instruction on unknown CPUs (VIA in this case). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> --- diff -r 73ac4b7ad2e1 -r 4b0d263008cd xen/arch/x86/cpu/common.c --- a/xen/arch/x86/cpu/common.c Fri Aug 17 14:57:29 2012 +0100 +++ b/xen/arch/x86/cpu/common.c Mon Aug 20 08:40:01 2012 +0200 @@ -55,6 +55,7 @@ static void default_init(struct cpuinfo_ /* Not much we can do here... */ /* Check if at least it has cpuid */ BUG_ON(c->cpuid_level == -1); + __clear_bit(X86_FEATURE_SEP, c->x86_capability); } static struct cpu_dev default_cpu = { _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |