[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v14 07/17] pvh: vmx-specific changes
At 12:14 +0000 on 04 Nov (1383563696), George Dunlap wrote: > + if ( is_pvh_domain(d) ) > + { > + /* Disable virtual apics, TPR */ > + v->arch.hvm_vmx.secondary_exec_control &= > + ~(SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES > + | SECONDARY_EXEC_APIC_REGISTER_VIRT > + | SECONDARY_EXEC_VIRTUAL_INTR_DELIVERY); > + v->arch.hvm_vmx.exec_control &= ~CPU_BASED_TPR_SHADOW; > + > + /* Disable wbinvd (only necessary for MMIO), > + * unrestricted guest (real mode for EPT) */ > + v->arch.hvm_vmx.secondary_exec_control &= > + ~(SECONDARY_EXEC_UNRESTRICTED_GUEST > + | SECONDARY_EXEC_WBINVD_EXITING); WBINVD exiting is used for supporting _real_ MMIO, which PVH guetst will still have, right? > + if ( is_pvh_domain(d) ) > + vmx_disable_intercept_for_msr(v, MSR_SHADOW_GS_BASE, MSR_TYPE_R > | MSR_TYPE_W); > + > + /* > + * PVH: We don't disable intercepts for MSRs: MSR_STAR, MSR_LSTAR, > + * MSR_CSTAR, and MSR_SYSCALL_MASK because we need to specify > + * save/restore area to save/restore at every VM exit and entry. > + * Instead, let the intercept functions save them into > + * vmx_msr_state fields. See comment in vmx_restore_host_msrs(). > + * See also vmx_restore_guest_msrs(). > + */ Why are these MSRs special for PVH guests? Are PVH guests restricted in how they can use SHADOW_GS? Tim. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |