[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH 0/6] x86/vvmx: Fixes to MSR_BITMAP interception handling



This fixes a bug where HyperV (Windows Server 2012) crashes, because it
attempts to intercept the x2apic MSRs for its L2 guests, but Xen uses a stale
mapping of gfn 0 for the MSR_BITMAP.

There are many more bugs in this area.  I'm fairly sure the merging of
low/high half accesses aren't yet correct.

Andrew Cooper (6):
  x86/vmx: Improvements to vmx_{dis,en}able_intercept_for_msr()
  x86/vpmu: Use vmx_{clear,set}_msr_intercept() rather than opencoding them
  x86/vmx: Introduce and use struct vmx_msr_bitmap
  x86/vvmx: Switch nested MSR intercept handling to use struct vmx_msr_bitmap
  x86/vvmx: Fix handing of the MSR_BITMAP field with VMCS shadowing
  x86/vvmx: Fix auditing of MSR_BITMAP parameter

 xen/arch/x86/cpu/vpmu_intel.c      |  64 +++++++------------
 xen/arch/x86/hvm/vmx/vmcs.c        | 126 +++++++++++++++++--------------------
 xen/arch/x86/hvm/vmx/vmx.c         |  34 ++++------
 xen/arch/x86/hvm/vmx/vvmx.c        |  44 ++++++++-----
 xen/include/asm-x86/hvm/vmx/vmcs.h |  28 ++++++---
 5 files changed, 143 insertions(+), 153 deletions(-)

-- 
2.1.4


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.