[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v9 03/11] x86/msr: Emulation of MSR_{SPEC_CTRL, PRED_CMD} for guests
>>> On 18.01.18 at 16:46, <andrew.cooper3@xxxxxxxxxx> wrote: > @@ -153,14 +168,44 @@ int guest_wrmsr(struct vcpu *v, uint32_t msr, uint64_t > val) > { > const struct vcpu *curr = current; > struct domain *d = v->domain; > + const struct cpuid_policy *cp = d->arch.cpuid; > struct msr_domain_policy *dp = d->arch.msr; > struct msr_vcpu_policy *vp = v->arch.msr; > > switch ( msr ) > { > case MSR_INTEL_PLATFORM_INFO: > + case MSR_ARCH_CAPABILITIES: > + /* Read-only */ > goto gp_fault; > > + case MSR_SPEC_CTRL: > + if ( !cp->feat.ibrsb ) > + goto gp_fault; /* MSR available? */ > + > + /* > + * Note: SPEC_CTRL_STIBP is specified as safe to use (i.e. ignored) > + * when STIBP isn't enumerated in hardware. > + */ > + > + if ( val & ~(SPEC_CTRL_IBRS | SPEC_CTRL_STIBP) ) > + goto gp_fault; /* Rsvd bit set? */ > + > + vp->spec_ctrl.raw = val; > + break; Did you check (or inquire) whether reading back the value on a system which ignores the write to 1 actually produces the written value? I'd sort of expect zero to come back instead. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |