x86, libxc: force-enable relevant MSR events
authorRazvan Cojocaru <rcojocaru@bitdefender.com>
Thu, 18 Sep 2014 12:56:43 +0000 (14:56 +0200)
committerJan Beulich <jbeulich@suse.com>
Thu, 18 Sep 2014 12:56:43 +0000 (14:56 +0200)
commit9b160a10cf730123c6c2eff1034825ce11181c85
tree93fe99e5450e15acc724eb7720a59953d6dd8fd9
parent9eb81d8bcb393fd2280bc6bc2d36fafa251fd9c0
x86, libxc: force-enable relevant MSR events

Vmx_disable_intercept_for_msr() will now refuse to disable interception of
MSRs needed for memory introspection. It is not possible to gate this on
mem_access being active for the domain, since by the time mem_access does
become active the interception for the interesting MSRs has already been
disabled (vmx_disable_intercept_for_msr() runs very early on).

Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
Acked-by: Tim Deegan <tim@xen.org>
tools/libxc/xc_mem_access.c
tools/libxc/xc_mem_event.c
tools/libxc/xc_private.h
tools/libxc/xenctrl.h
xen/arch/x86/hvm/vmx/vmcs.c
xen/arch/x86/hvm/vmx/vmx.c
xen/arch/x86/mm/mem_event.c
xen/include/asm-x86/hvm/domain.h
xen/include/asm-x86/hvm/hvm.h
xen/include/asm-x86/hvm/vmx/vmcs.h
xen/include/public/domctl.h