[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH v2 0/8] x86: switch default MSR behavior
Hello, The current series attempts to change the current MSR default handling behavior, which is to silently drop writes to writable MSRs, and allow reading any MSR not explicitly handled. After this series access to MSRs not explicitly handled will trigger a #GP fault. I've tested this series with osstest and it doesn't introduce any regression, at least on the boxes selected for testing: http://logs.test-lab.xenproject.org/osstest/logs/152630/ Thanks, Roger. Andrew Cooper (2): x86/hvm: Disallow access to unknown MSRs x86/msr: Drop compatibility #GP handling in guest_{rd,wr}msr() Roger Pau Monne (6): x86/vmx: handle writes to MISC_ENABLE MSR x86/svm: silently drop writes to SYSCFG and related MSRs x86/msr: explicitly handle AMD DE_CFG x86/svm: drop writes to BU_CFG on revF chips x86/pv: allow reading FEATURE_CONTROL MSR x86/pv: disallow access to unknown MSRs xen/arch/x86/hvm/svm/svm.c | 38 ++++++++++++++---- xen/arch/x86/hvm/vmx/vmx.c | 31 ++++++--------- xen/arch/x86/msr.c | 71 +++++++++++++--------------------- xen/arch/x86/pv/emul-priv-op.c | 18 +++++---- 4 files changed, 79 insertions(+), 79 deletions(-) -- 2.28.0
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |