Re: [Xen-devel] [PATCH 0/2] Validate host VMX MSRs before accessing them

2016-06-13 Thread Andrew Cooper
On 09/06/16 11:14, Euan Harris wrote: > nvmx_msr_read_intercept() does not check the prerequisites before > accessing MSR_IA32_VMX_PROCBASED_CTLS2, MSR_IA32_VMX_EPT_VPID_CAP, > MSR_IA32_VMX_VMFUNC on the host. Accessing these MSRs from a nested > VMX guest running on a host which does not

[Xen-devel] [PATCH 0/2] Validate host VMX MSRs before accessing them

2016-06-09 Thread Euan Harris
nvmx_msr_read_intercept() does not check the prerequisites before accessing MSR_IA32_VMX_PROCBASED_CTLS2, MSR_IA32_VMX_EPT_VPID_CAP, MSR_IA32_VMX_VMFUNC on the host. Accessing these MSRs from a nested VMX guest running on a host which does not support them will cause Xen to crash with a GPF.