Branch: refs/heads/next
Home: https://github.com/siemens/jailhouse
Commit: 0238bf8e9751a36ba66ea6c1f8968fae21a6c6e4
https://github.com/siemens/jailhouse/commit/0238bf8e9751a36ba66ea6c1f8968fae21a6c6e4
Author: Ralf Ramsauer <[email protected]>
Date: 2019-06-17 (Mon, 17 Jun 2019)
Changed paths:
M hypervisor/arch/x86/svm.c
Log Message:
-----------
x86: amd: fix comment in MSR bitmap
So far, the MSR bitmap intercepted writes to 0x803 (APIC_REG_LVR). But
we need to intercept reads. We don't have a real x2apic, so we need to
forward reads to the apic.
Interestingly, APIC_REG_LVR reads via MSR never happened so far:
Root-Cell Linux won't use x2apic's MSR-based access, as, of course, it
doesn't see a x2apic in case of an AMD.
On the other hand, we emulate and use x2apic for non-root inmates. But
our inmate library won't issue REG_LVR.
The correctness of the comments of rest of the list was checked with a
short helper tool.
There's also a read-intercepted area that can be zipped.
Signed-off-by: Ralf Ramsauer <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>
--
You received this message because you are subscribed to the Google Groups
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/jailhouse-dev/siemens/jailhouse/push/refs/heads/next/4abf1c-0238bf%40github.com.
For more options, visit https://groups.google.com/d/optout.