[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 0/9] x86/vmx: Don't leak EFER.NXE into guest context
The purpose of this patchset is to fix a longstanding bug whereby Xen's NXE setting leaks into HVM context, and has a visible effect on the guests pagewalk. To allow patch 9 to function, there are 7 patches of improvements to the MSR load/save infrastructure, purely to support first-gen VT-x hardware. Along the way, there is a bugfix to how MSR_DEBUGCTL is handled, noticed while doing the load/save list improvements. It really does want backporting to the stable releases, but I can't find any clean way of disentanging it from the series. Andrew Cooper (9): x86/vmx: API improvements for MSR load/save infrastructure x86/vmx: Internal cleanup for MSR load/save infrastructure x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() x86/vmx: Support remote access to the MSR lists x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit x86/vmx: Pass an MSR value into vmx_msr_add() x86/vmx: Support load-only guest MSR list entries x86/vmx: Support removing MSRs from the host/guest load/save lists x86/vmx: Don't leak EFER.NXE into guest context xen/arch/x86/cpu/vpmu_intel.c | 14 +- xen/arch/x86/domain.c | 10 -- xen/arch/x86/hvm/vmx/vmcs.c | 303 ++++++++++++++++++++++++++----------- xen/arch/x86/hvm/vmx/vmx.c | 115 ++++++++++---- xen/include/asm-x86/hvm/hvm.h | 4 +- xen/include/asm-x86/hvm/vmx/vmcs.h | 84 +++++++--- 6 files changed, 374 insertions(+), 156 deletions(-) -- 2.1.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |