https://bugzilla.kernel.org/show_bug.cgi?id=65561

--- Comment #22 from Jidong Xiao <[email protected]> ---
Alright, I added a printk statement in the wrmsr case, like this:

        case 0x30:
                printk(KERN_ERR "DEBUG: Passed %s %d
\n",__FUNCTION__,__LINE__);
                /* wrmsr */
                msr_data = (u32)c->regs[VCPU_REGS_RAX]
                        | ((u64)c->regs[VCPU_REGS_RDX] << 32);
                rc = kvm_set_msr(ctxt->vcpu, c->regs[VCPU_REGS_RCX], msr_data);
                if (rc) {
                        kvm_inject_gp(ctxt->vcpu, 0);
                        c->eip = kvm_rip_read(ctxt->vcpu);
                }
                rc = X86EMUL_CONTINUE;
                c->dst.type = OP_NONE;
                break;

And i run a c program to access msr, like this:

linux:~/code/cvedr # cat accessmsr.c
#include <stdio.h>

main(){
        asm volatile("wrmsr");
        printf("test msr\n");
}

linux:~/code/cvedr # ./accessmsr
Segmentation fault

Even though my c program in the guest os got a segmentation fault, from the
host os level, I don't see the printk statement is triggered, so this is not
about privileged instructions or unprivileged instructions. I think there must
be some other conditions to trigger these printk statements.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to