diff options
author | 2010-02-18 12:15:00 +0200 | |
---|---|---|
committer | 2010-03-01 12:36:13 -0300 | |
commit | 6f550484a15ea1b468665cdf59f020bf08ccb292 (patch) | |
tree | d4088b1aa157dca4dadc2a99969299dc46098148 /lib/debugobjects.c | |
parent | KVM: x86 emulator: Forbid modifying CS segment register by mov instruction (diff) | |
download | wireguard-linux-6f550484a15ea1b468665cdf59f020bf08ccb292.tar.xz wireguard-linux-6f550484a15ea1b468665cdf59f020bf08ccb292.zip |
KVM: Fix load_guest_segment_descriptor() to inject page fault
This patch injects page fault when reading descriptor in
load_guest_segment_descriptor() fails with FAULT.
Effects of this injection: This function is used by
kvm_load_segment_descriptor() which is necessary for the
following instructions:
- mov seg,r/m16
- jmp far
- pop ?s
This patch makes it possible to emulate the page faults
generated by these instructions. But be sure that unless
we change the kvm_load_segment_descriptor()'s ret value
propagation this patch has no effect.
Signed-off-by: Takuya Yoshikawa <yoshikawa.takuya@oss.ntt.co.jp>
Signed-off-by: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'lib/debugobjects.c')
0 files changed, 0 insertions, 0 deletions