x86/cpufeatures: expose UMIP to HVM guests
authorBoqun Feng (Intel) <boqun.feng@gmail.com>
Thu, 10 Aug 2017 10:33:27 +0000 (12:33 +0200)
committerJan Beulich <jbeulich@suse.com>
Thu, 10 Aug 2017 10:33:27 +0000 (12:33 +0200)
commit293a0a1fd712bb85bc695e86a519e8da67f1a39f
treeef2f5b54ee9a6242709e48df4541d068885f141d
parente489eb6138e7efe4214a7e9ba0d21f54fc5b7d35
x86/cpufeatures: expose UMIP to HVM guests

User-Mode Instruction Prevention (UMIP) is a security feature present in
new Intel Processors. With this feature, when the UMIP bit in CR4 set,
the following instructions cannot be executed if CPL > 0: SGDT, SIDT,
SLDT, SMSW, and STR. An attempt at such execution causes a general-
protection exception (#GP).

This patch simply adds necessary definitions to expose this feature to
hvm guests.

Signed-off-by: Boqun Feng (Intel) <boqun.feng@gmail.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
xen/arch/x86/hvm/hvm.c
xen/include/public/arch-x86/cpufeatureset.h