Displaying 2 results from an estimated 2 matches for "exit_reason_msr_write".
2006 Sep 27
1
RE: Testing status of HVM (Intel VT) on 64bit XENunstable c/s 11616
>Since this happens early in HVM guest boot, I suggest adding tracing
to
>vmx_vmexit_handler() to dump registers on every MSR write.
>Something like
>this early on in the function:
> if ( reason == EXIT_REASON_MSR_WRITE ) {
> printk("regs==%p, guest_regs==%p\n", ®s,
>guest_cpu_user_regs());
> show_registers(®s);
> }
>
>This will let us see if the EAX/EDX are garbage on entry to C code
>immediately after VMEXIT.
This patch doesn''t help, after applying...
2013 Oct 30
3
[PATCH 4/4] XSA-60 security hole: flush cache when vmentry back to UC guest
From 159251a04afcdcd8ca08e9f2bdfae279b2aa5471 Mon Sep 17 00:00:00 2001
From: Liu Jinsong <jinsong.liu@intel.com>
Date: Thu, 31 Oct 2013 06:38:15 +0800
Subject: [PATCH 4/4] XSA-60 security hole: flush cache when vmentry back to UC guest
This patch flush cache when vmentry back to UC guest, to prevent
cache polluted by hypervisor access guest memory during UC mode.
The elegant way to do this