x86/hvm: Raise #SS faults for %ss-based segmentation violations
authorAndrew Cooper <andrew.cooper3@citrix.com>
Sat, 7 May 2016 12:41:05 +0000 (13:41 +0100)
committerAndrew Cooper <andrew.cooper3@citrix.com>
Tue, 10 May 2016 17:08:50 +0000 (18:08 +0100)
commita94b35ddedf5c7327c6b2d9205d0a2aef2e4cfed
tree306d12613d7226cf94fd6acd59d1d10ebb29687e
parent60935158cbf74f4cd6f69190ced9be0391cfa506
x86/hvm: Raise #SS faults for %ss-based segmentation violations

Raising #GP under such circumstances is architecturally wrong.

Refer to the Intel or AMD manuals describing faults, and the conditions
under which #SS is raised.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Tim Deegan <tim@xen.org>
Release-acked-by: Wei Liu <wei.liu2@citrix.com>
xen/arch/x86/hvm/emulate.c
xen/arch/x86/mm/shadow/common.c