[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] x86/vvmx: Fix WRMSR interception of VMX MSRs



> From: Andrew Cooper [mailto:andrew.cooper3@xxxxxxxxxx]
> Sent: Wednesday, June 28, 2017 10:16 PM
> 
> FEATURE_CONTROL is already read with LOCK bit set (so is unmodifiable),
> and
> all VMX MSRs are read-only.  Also, fix the
> MSR_IA32_VMX_TRUE_ENTRY_CTLS bound
> to be MSR_IA32_VMX_VMFUNC, rather than having the intervening MSRs
> falling
> into the default case.
> 
> Raise #GP faults if the guest tries to modify any of them.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.