diff options
author | Avi Kivity <avi@qumranet.com> | 2007-03-20 18:40:40 +0200 |
---|---|---|
committer | Avi Kivity <avi@qumranet.com> | 2007-05-03 10:52:25 +0300 |
commit | 8cb5b0333250beb382624f626851a31f601b4830 (patch) | |
tree | f2406e4eb5c668f22eb4f53995c1928d9eebf42b /drivers/kvm/vmx.c | |
parent | aac012245a59d78372dc66d292ba567367d86b60 (diff) | |
download | kernel-crypto-8cb5b0333250beb382624f626851a31f601b4830.tar.gz kernel-crypto-8cb5b0333250beb382624f626851a31f601b4830.tar.xz kernel-crypto-8cb5b0333250beb382624f626851a31f601b4830.zip |
KVM: Workaround vmx inability to virtualize the reset state
The reset state has cs.selector == 0xf000 and cs.base == 0xffff0000,
which aren't compatible with vm86 mode, which is used for real mode
virtualization.
When we create a vcpu, we set cs.base to 0xf0000, but if we get there by
way of a reset, the values are inconsistent and vmx refuses to enter
guest mode.
Workaround by detecting the state and munging it appropriately.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Diffstat (limited to 'drivers/kvm/vmx.c')
-rw-r--r-- | drivers/kvm/vmx.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c index 0d9bf0b36d3..aa7e2ba6fb5 100644 --- a/drivers/kvm/vmx.c +++ b/drivers/kvm/vmx.c @@ -712,6 +712,8 @@ static void enter_rmode(struct kvm_vcpu *vcpu) vmcs_write32(GUEST_CS_AR_BYTES, 0xf3); vmcs_write32(GUEST_CS_LIMIT, 0xffff); + if (vmcs_readl(GUEST_CS_BASE) == 0xffff0000) + vmcs_writel(GUEST_CS_BASE, 0xf0000); vmcs_write16(GUEST_CS_SELECTOR, vmcs_readl(GUEST_CS_BASE) >> 4); fix_rmode_seg(VCPU_SREG_ES, &vcpu->rmode.es); |