[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH for-4.9 v2] VMX: PLATFORM_INFO MSR is r/o
Therefore all write attempts should produce #GP, just like on real hardware. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> --- v2: Group case label with other r/o MSRs. --- Assumed to be applied on top of the (trivial) backport of 46c3acb308 ("x86/vvmx: Fix WRMSR interception of VMX MSRs"). --- a/xen/arch/x86/hvm/vmx/vmx.c +++ b/xen/arch/x86/hvm/vmx/vmx.c @@ -3100,6 +3100,7 @@ static int vmx_msr_write_intercept(unsig break; } case MSR_IA32_FEATURE_CONTROL: + case MSR_INTEL_PLATFORM_INFO: case MSR_IA32_VMX_BASIC ... MSR_IA32_VMX_VMFUNC: /* None of these MSRs are writeable. */ goto gp_fault; @@ -3114,12 +3115,6 @@ static int vmx_msr_write_intercept(unsig goto gp_fault; break; - case MSR_INTEL_PLATFORM_INFO: - if ( msr_content || - rdmsr_safe(MSR_INTEL_PLATFORM_INFO, msr_content) ) - goto gp_fault; - break; - case MSR_INTEL_MISC_FEATURES_ENABLES: { bool old_cpuid_faulting = v->arch.cpuid_faulting; _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |