[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] x86/cpufeatures: Expose UMIP to HVM guest
>>> On 20.07.17 at 07:29, <boqun.feng@xxxxxxxxx> wrote: > User-Mode Instruction Prevention (UMIP) is a security feature present in > new Intel Processors. With this feature, when the UMIP bit in CR4 set, > the following instructions cannot be executed if CPL > 0: SGDT, SIDT, > SLDT, SMSW, and STR. An attempt at such execution causes a general- > protection exception (#GP). > > This patch simply adds necessary definitions to expose this feature to > hvm guests. > > Signed-off-by: Boqun Feng (Intel) <boqun.feng@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |