[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 1/4] x86/vmx: Don't leak host syscall MSR state into HVM guests
>>> On 13.02.17 at 15:32, <andrew.cooper3@xxxxxxxxxx> wrote: > hvm_hw_cpu->msr_flags is in fact the VMX dirty bitmap of MSRs needing to be > restored when switching into guest context. It should never have been part of > the migration state to start with, and Xen must not make any decisions based > on the value seen during restore. > > Identify it as obsolete in the header files, consistently save it as zero and > ignore it on restore. > > The MSRs must be considered dirty during VMCS creation to cause the proper > defaults of 0 to be visible to the guest. > > Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |