[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 0/2] Validate host VMX MSRs before accessing them
On 09/06/16 11:14, Euan Harris wrote: > nvmx_msr_read_intercept() does not check the prerequisites before > accessing MSR_IA32_VMX_PROCBASED_CTLS2, MSR_IA32_VMX_EPT_VPID_CAP, > MSR_IA32_VMX_VMFUNC on the host. Accessing these MSRs from a nested > VMX guest running on a host which does not support them will cause > Xen to crash with a GPF. > > Euan Harris (2): > nested vmx: Fix comment typos in nvmx_msr_read_intercept() > nested vmx: Validate host VMX MSRs before accessing them > > xen/arch/x86/hvm/vmx/vvmx.c | 32 +++++++++++++++++++++++--------- > 1 file changed, 23 insertions(+), 9 deletions(-) > Committed, with the indicated fixup. Thanks, ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |