[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] x86: don't expose SYSENTER on unknown CPUs


  • To: xen-changelog@xxxxxxxxxxxxxxxxxxx
  • From: Xen patchbot-unstable <patchbot@xxxxxxx>
  • Date: Mon, 20 Aug 2012 21:22:07 +0000
  • Delivery-date: Mon, 20 Aug 2012 21:22:19 +0000
  • List-id: "Change log for Mercurial \(receive only\)" <xen-changelog.lists.xen.org>

# HG changeset patch
# User Jan Beulich <jbeulich@xxxxxxxx>
# Date 1345444801 -7200
# Node ID 4b0d263008cdf4585fe30ec2847b0a810db12354
# Parent  73ac4b7ad2e14bf468fe7d4d032c80c6bd7350ad
x86: don't expose SYSENTER on unknown CPUs

So far we only ever set up the respective MSRs on Intel CPUs, yet we
hide the feature only on a 32-bit hypervisor. That prevents booting of
PV guests on top of a 64-bit hypervisor making use of the instruction
on unknown CPUs (VIA in this case).

Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
Acked-by: Keir Fraser <keir@xxxxxxx>
---


diff -r 73ac4b7ad2e1 -r 4b0d263008cd xen/arch/x86/cpu/common.c
--- a/xen/arch/x86/cpu/common.c Fri Aug 17 14:57:29 2012 +0100
+++ b/xen/arch/x86/cpu/common.c Mon Aug 20 08:40:01 2012 +0200
@@ -55,6 +55,7 @@ static void default_init(struct cpuinfo_
        /* Not much we can do here... */
        /* Check if at least it has cpuid */
        BUG_ON(c->cpuid_level == -1);
+       __clear_bit(X86_FEATURE_SEP, c->x86_capability);
 }
 
 static struct cpu_dev default_cpu = {

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.