|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2 0/9] x86/vmx: Don't leak EFER.NXE into guest context
The purpose of this patchset is to fix a longstanding bug whereby Xen's NXE
setting leaks into HVM context, and has a visible effect on the guests
pagewalk.
To allow patch 9 to function, there are 8 patches of improvements to the MSR
load/save infrastructure, purely to support first-gen VT-x hardware.
This series is based on the x86-next branch, which has the prerequisite
content to split out MSR_DEBUGCTL handling.
Major changes from v1:
* MSR_DEBUGCTL handling fixes disentangled, and already completed.
* Improvements to LBR handling to fix a logic bug with the behavioural
changes to vmx_add_msr().
* Fix a regression introduced on certain Nehalem/Westmere hardware. See
patch 9 for more details.
Andrew Cooper (9):
x86/vmx: API improvements for MSR load/save infrastructure
x86/vmx: Internal cleanup for MSR load/save infrastructure
x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr()
x86/vmx: Support remote access to the MSR lists
x86/vmx: Improvements to LBR MSR handling
x86/vmx: Pass an MSR value into vmx_msr_add()
x86/vmx: Support load-only guest MSR list entries
x86/vmx: Support removing MSRs from the host/guest load/save lists
x86/vmx: Don't leak EFER.NXE into guest context
xen/arch/x86/cpu/vpmu_intel.c | 14 +-
xen/arch/x86/domain.c | 10 --
xen/arch/x86/hvm/vmx/vmcs.c | 313 ++++++++++++++++++++++++++-----------
xen/arch/x86/hvm/vmx/vmx.c | 127 +++++++++------
xen/include/asm-x86/hvm/hvm.h | 4 +-
xen/include/asm-x86/hvm/vmx/vmcs.h | 118 +++++++++++---
xen/include/xen/sched.h | 2 +-
7 files changed, 414 insertions(+), 174 deletions(-)
--
2.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |