summaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/net_dropmonitor.py
diff options
context:
space:
mode:
authorNadav Amit <namit@cs.technion.ac.il>2014-11-02 11:54:49 +0200
committerPaolo Bonzini <pbonzini@redhat.com>2014-11-07 15:44:05 +0100
commit807c142595abcb99285746bd5512447bdf40b9b1 (patch)
tree224e59cef2e14c9bca43a49be2695076a62eebbb /tools/perf/scripts/python/net_dropmonitor.py
parentb5bbf10ee6b65b70c10c139822bc2dc077cefa76 (diff)
KVM: x86: SYSCALL cannot clear eflags[1]
SYSCALL emulation currently clears in 64-bit mode eflags according to MSR_SYSCALL_MASK. However, on bare-metal eflags[1] which is fixed to one cannot be cleared, even if MSR_SYSCALL_MASK masks the bit. This wrong behavior may result in failed VM-entry, as VT disallows entry with eflags[1] cleared. This patch sets the bit after masking eflags on syscall. Signed-off-by: Nadav Amit <namit@cs.technion.ac.il> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python/net_dropmonitor.py')
0 files changed, 0 insertions, 0 deletions