WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-changelog

[Xen-changelog] [xen-unstable] hvm: Intercept reads of MSR_IA32_MCG_CAP

To: xen-changelog@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-changelog] [xen-unstable] hvm: Intercept reads of MSR_IA32_MCG_CAP and return 0.
From: Xen patchbot-unstable <patchbot-unstable@xxxxxxxxxxxxxxxxxxx>
Date: Fri, 07 Sep 2007 09:13:19 -0700
Delivery-date: Fri, 07 Sep 2007 10:33:28 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-changelog-request@lists.xensource.com?subject=help>
List-id: BK change log <xen-changelog.lists.xensource.com>
List-post: <mailto:xen-changelog@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=unsubscribe>
Reply-to: xen-devel@xxxxxxxxxxxxxxxxxxx
Sender: xen-changelog-bounces@xxxxxxxxxxxxxxxxxxx
# HG changeset patch
# User kfraser@xxxxxxxxxxxxxxxxxxxxx
# Date 1188395832 -3600
# Node ID 828e1df114d4b59ebc0a84db3b079f7087fc9b20
# Parent  747b71c8c4a8d0a7e72c2bbadba23d974ba5d10b
hvm: Intercept reads of MSR_IA32_MCG_CAP and return 0.

This indicates no  machine check "units", which agrees more closely
with Xen's super-minimal machine check architecture (just enough to
allow Windows to run). This fixes a bug that occurs when migrating a
RHEL4-64bit guest to a host with fewer machine check units than the
original host.  These host physical details shouldn't be leaking
through to guests.

Signed-off-by: David Lively <dlively@xxxxxxxxxxxxxxx>
---
 xen/arch/x86/hvm/svm/svm.c |    1 +
 xen/arch/x86/hvm/vmx/vmx.c |    1 +
 2 files changed, 2 insertions(+)

diff -r 747b71c8c4a8 -r 828e1df114d4 xen/arch/x86/hvm/svm/svm.c
--- a/xen/arch/x86/hvm/svm/svm.c        Wed Aug 29 14:54:14 2007 +0100
+++ b/xen/arch/x86/hvm/svm/svm.c        Wed Aug 29 14:57:12 2007 +0100
@@ -1876,6 +1876,7 @@ static void svm_do_msr_access(
             svm_inject_exception(v, TRAP_gp_fault, 1, 0);
             break;
 
+        case MSR_IA32_MCG_CAP:
         case MSR_IA32_MCG_STATUS:
         case MSR_IA32_MC0_STATUS:
         case MSR_K8_MC1_STATUS:
diff -r 747b71c8c4a8 -r 828e1df114d4 xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c        Wed Aug 29 14:54:14 2007 +0100
+++ b/xen/arch/x86/hvm/vmx/vmx.c        Wed Aug 29 14:57:12 2007 +0100
@@ -2314,6 +2314,7 @@ static int vmx_do_msr_read(struct cpu_us
         break;
     case MSR_IA32_VMX_BASIC...MSR_IA32_VMX_PROCBASED_CTLS2:
         goto gp_fault;
+    case MSR_IA32_MCG_CAP:
     case MSR_IA32_MCG_STATUS:
     case MSR_IA32_MC0_STATUS:
     case MSR_K8_MC1_STATUS:

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-changelog] [xen-unstable] hvm: Intercept reads of MSR_IA32_MCG_CAP and return 0., Xen patchbot-unstable <=