[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH 1/8] x86/vmx: handle writes to MISC_ENABLE MSR
- To: Roger Pau Monne <roger.pau@xxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Date: Tue, 18 Aug 2020 15:57:51 +0100
- Authentication-results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
- Cc: Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Wei Liu <wl@xxxxxxx>
- Delivery-date: Tue, 18 Aug 2020 14:57:59 +0000
- Ironport-sdr: Wclxz6J56F+CIBLQES2hZMmv+Zyjbl9cUNAe0IVj0AwD4mLxwHF7t8i3s1gRngs4oum08oIPm9 G5HpxQXgtWvgIfwU5w0zEVAExj0P45/XGdSSCh7S1ZvgLLwvbZBGkYIe7ySTN81Y4KbCMD68L/ gouxiUZEQyOvyncHKCuU4smBy308vKzVd5yS6yszWLX6Do9txhuNvPj8IRW64OOSelOJCPopj0 ccJmesKCDYy3j4ji7n/D+Ujm42MotyHjP4EbZk4+cHpcPuja28l9M7nP/ciWk/67PO41piWSTO GIM=
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 17/08/2020 16:57, Roger Pau Monne wrote:
> Such handling consist in checking that no bits have been changed from
> the read value, if that's the case silently drop the write, otherwise
> inject a fault.
>
> At least Windows guests will expect to write to the MISC_ENABLE MSR
> with the same value that's been read from it.
>
> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
|