aboutsummaryrefslogtreecommitdiff
path: root/target-i386/translate.c
diff options
context:
space:
mode:
authorPaolo Bonzini <pbonzini@redhat.com>2015-04-22 11:40:41 +0200
committerPaolo Bonzini <pbonzini@redhat.com>2015-06-05 17:10:01 +0200
commit9982f74bad70479939491b69522da047a3be5a0d (patch)
tree419ce637c765afe938c462f48ed42a085fb2cb0a /target-i386/translate.c
parent3f7d84648607cc0fcb3812bb4b88978e2a7aa24f (diff)
downloadqemu-9982f74bad70479939491b69522da047a3be5a0d.zip
qemu-9982f74bad70479939491b69522da047a3be5a0d.tar.gz
qemu-9982f74bad70479939491b69522da047a3be5a0d.tar.bz2
target-i386: mask NMIs on entry to SMM
QEMU is not blocking NMIs on entry to SMM. Implementing this has to cover a few corner cases, because: - NMIs can then be enabled by an IRET instruction and there is no mechanism to _set_ the "NMIs masked" flag on exit from SMM: "A special case can occur if an SMI handler nests inside an NMI handler and then another NMI occurs. [...] When the processor enters SMM while executing an NMI handler, the processor saves the SMRAM state save map but does not save the attribute to keep NMI interrupts disabled. - However, there is some hidden state, because "If NMIs were blocked before the SMI occurred [and no IRET is executed while in SMM], they are blocked after execution of RSM." This is represented by the new HF2_SMM_INSIDE_NMI_MASK bit. If it is zero, NMIs are _unblocked_ on exit from RSM. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'target-i386/translate.c')
0 files changed, 0 insertions, 0 deletions