aboutsummaryrefslogtreecommitdiff
path: root/lib/test_fortify/write_overflow-strncpy-src.c
diff options
context:
space:
mode:
authorSean Christopherson <[email protected]>2024-04-05 16:55:59 -0700
committerSean Christopherson <[email protected]>2024-06-10 14:29:38 -0700
commitd99e4cb2ae2e02a632d3587d710eecf5a02c20e7 (patch)
treeec3976612a52508e66649196fbb7ffe885e91820 /lib/test_fortify/write_overflow-strncpy-src.c
parentc092fc879f99cf536881892e2dbe2a70074e9915 (diff)
KVM: x86: Use "is Intel compatible" helper to emulate SYSCALL in !64-bit
Use guest_cpuid_is_intel_compatible() to determine whether SYSCALL in 32-bit Protected Mode (including Compatibility Mode) should #UD or succeed. The existing code already does the exact equivalent of guest_cpuid_is_intel_compatible(), just in a rather roundabout way. No functional change intended. Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Sean Christopherson <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow-strncpy-src.c')
0 files changed, 0 insertions, 0 deletions