Hello,

The current series attempts to change the current MSR default handling
behavior, which is to silently drop writes to writable MSRs, and allow
reading any MSR not explicitly handled.

After this series access to MSRs not explicitly handled will trigger a
#GP fault. I've tested this series with osstest and it doesn't introduce
any regression, at least on the boxes selected for testing:

http://logs.test-lab.xenproject.org/osstest/logs/153697/

Thanks, Roger.

Andrew Cooper (2):
  x86/hvm: Disallow access to unknown MSRs
  x86/msr: Drop compatibility #GP handling in guest_{rd,wr}msr()

Roger Pau Monne (3):
  x86/svm: handle BU_CFG and BU_CFG2 with cases
  x86/pv: allow reading FEATURE_CONTROL MSR
  x86/pv: disallow access to unknown MSRs

 xen/arch/x86/hvm/svm/svm.c     | 53 ++++++++++++++++++++------------
 xen/arch/x86/hvm/vmx/vmx.c     | 24 +++------------
 xen/arch/x86/msr.c             | 56 +++++++---------------------------
 xen/arch/x86/pv/emul-priv-op.c | 18 ++++++-----
 4 files changed, 60 insertions(+), 91 deletions(-)

-- 
2.28.0


Reply via email to