On Wed, Jul 09, 2014 at 06:26:23PM +0200, Paolo Bonzini wrote:
> Il 26/06/2014 14:22, Matthias Lange ha scritto:
> >Linux' AMD MCE code tries to read from the MC4_MISC1 (0xc408) MSR.
> >Because
> >this read is not virtualized within KVM, a GPE is injected into the gu
When running Linux as a guest with KVM on an AMD CPU, the guest Linux kernel
tries to read the MC4_MISC1 MSR from its MCE code. Because this MSR is not
virtualized within KVM a GPE is injected into the guest. This patch adds
support to virtualize the MC4_MSR.
Matthias Lange (1):
KVM: svm
Linux' AMD MCE code tries to read from the MC4_MISC1 (0xc408) MSR. Because
this read is not virtualized within KVM, a GPE is injected into the guest.
This patch handles guest reads from MC4_MISC and returns 0 to the guest.
Signed-off-by: Matthias Lange
---
arch/x86/kvm/x86.c | 3 +++
1
This patch prevents a Linux guest running on an AMD processor from getting a
GPE upon setting bit 18 in MSR_K7_HWCR.
Matthias Lange (1):
KVM: svm: writes to MSR_K7_HWCR generates GPE in guest
arch/x86/kvm/x86.c | 1 +
1 file changed, 1 insertion(+)
--
1.9.1
--
To unsubscribe from this list
the guest.
Signed-off-by: Matthias Lange
---
arch/x86/kvm/x86.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 57eac30..24d70d4 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -2029,6 +2029,7 @@ int kvm_set_msr_common(struct kvm_vcpu
On Wed, Jun 06, 2012 at 03:12:56PM +0300, Avi Kivity wrote:
> On 06/06/2012 02:37 PM, Matthias Lange wrote:
> > @@ -6536,6 +6538,7 @@ static void prepare_vmcs02(struct kvm_vcpu *vcpu,
> > struct vmcs12 *vmcs12)
> > vmcs_write32(GUEST_INTERRUPTIBILITY_INFO,
&
ST_ACTIVITY_STATE);
+ vmcs12->guest_smbase = vmcs_read32(GUEST_SMBASE);
vmcs12->guest_interruptibility_info =
vmcs_read32(GUEST_INTERRUPTIBILITY_INFO);
vmcs12->guest_pending_dbg_exceptions =
--
1.7.9.5
--
Dipl.-Inf. Matthias Lange
Security in Teleco
On Tue, Jun 05, 2012 at 04:09:30PM +0300, Avi Kivity wrote:
> On 06/05/2012 02:59 PM, Matthias Lange wrote:
> > Do you mean the ABI defined in the Intel Software Developer's manual 3B? Or
> > is
> > vmcs12 only an ABI internal to the kvm module?
>
> The lat
On Sun, May 20, 2012 at 03:39:30PM +0300, Avi Kivity wrote:
> On 05/18/2012 12:34 PM, Matthias Lange wrote:
> > The following patch adds support for the GUEST_SMBASE field. This allows
> > hypervisors running inside kvm read/write access to this field. I have
> > tested this
a Core i5 machine.
Best,
Matthias.
--
Dipl.-Inf. Matthias Lange
Security in Telecommunications
TU Berlin / Telekom Innovation Laboratories
Ernst-Reuter-Platz 7, 10587 Berlin
Phone: +49 - 30 - 8353 58 553
Mobile: +49 - 160 - 587 28 07
Web: http://www.t-labs.tu-berlin.de/sect
From 266eaaea392db8ed9b9
10 matches
Mail list logo