x86: suppress SYSCALL feature for 32on64 guests
authorkfraser@localhost.localdomain <kfraser@localhost.localdomain>
Tue, 15 May 2007 08:54:27 +0000 (09:54 +0100)
committerkfraser@localhost.localdomain <kfraser@localhost.localdomain>
Tue, 15 May 2007 08:54:27 +0000 (09:54 +0100)
since Xen cannot handle it.

Signed-off-by: Jan Beulich <jbeulich@novell.com>
xen/arch/x86/traps.c

index e139a256ab70931996fc3d2a043c0eabc2a04410..61160cb5040a1a94b0adf838ac2761377aceff86 100644 (file)
@@ -597,6 +597,8 @@ static int emulate_forced_invalid_op(struct cpu_user_regs *regs)
     else if ( regs->eax == 0x80000001 )
     {
         /* Modify Feature Information. */
+        if ( is_pv_32bit_vcpu(current) )
+            clear_bit(X86_FEATURE_SYSCALL % 32, &d);
         clear_bit(X86_FEATURE_RDTSCP % 32, &d);
     }
     else