[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 1/8] x86/vmx: handle writes to MISC_ENABLE MSR


  • To: Roger Pau Monne <roger.pau@xxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Tue, 18 Aug 2020 15:57:51 +0100
  • Authentication-results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
  • Cc: Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Tue, 18 Aug 2020 14:57:59 +0000
  • Ironport-sdr: Wclxz6J56F+CIBLQES2hZMmv+Zyjbl9cUNAe0IVj0AwD4mLxwHF7t8i3s1gRngs4oum08oIPm9 G5HpxQXgtWvgIfwU5w0zEVAExj0P45/XGdSSCh7S1ZvgLLwvbZBGkYIe7ySTN81Y4KbCMD68L/ gouxiUZEQyOvyncHKCuU4smBy308vKzVd5yS6yszWLX6Do9txhuNvPj8IRW64OOSelOJCPopj0 ccJmesKCDYy3j4ji7n/D+Ujm42MotyHjP4EbZk4+cHpcPuja28l9M7nP/ciWk/67PO41piWSTO GIM=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 17/08/2020 16:57, Roger Pau Monne wrote:
> Such handling consist in checking that no bits have been changed from
> the read value, if that's the case silently drop the write, otherwise
> inject a fault.
>
> At least Windows guests will expect to write to the MISC_ENABLE MSR
> with the same value that's been read from it.
>
> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>

Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.