Apply stricter checking to RDMSR/WRMSR emulations.
authorkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Tue, 7 Feb 2006 14:56:39 +0000 (15:56 +0100)
committerkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Tue, 7 Feb 2006 14:56:39 +0000 (15:56 +0100)
commitba9adb737ba22e433d671ffd34eed30ee292a454
tree2df3837f0499e68abc59c26ea17f5709a10e7ef4
parent3fcbbc1cfe901a86b8e70d77da9030ac0ec0768f
Apply stricter checking to RDMSR/WRMSR emulations.
In particular, MSRs that domain0 may write to must now
be 'white listed': default policy is to ignore the write.

This will prevent SYSCALL/SYSENTER instructions from
crashign Xen, by preventing the target MSRs from being
overwritten by domain 0.

Signed-off-by: Keir Fraser <keir@xensource.com>
xen/arch/x86/traps.c