[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] MSR related clean up
On 24/06/2009 10:21, "Sheng Yang" <sheng@xxxxxxxxxxxxxxx> wrote: > What we suffered now is, there are some MSRs existed in CPU, but shouldn't be > accessed by guest. And guest should expected a GP fault for accessing, but we > return a real value, which is not desired at all. > > And in general, reading from unknown native MSR is dangerous, and also break > host/guest isolation. I think we at least should control what we read from > native. Maybe add more MSR handling is necessary. I kind of agree with you, up to but not including delivering #GPs that would not be delivered when running the guest OS natively. A middle ground might be to return all zeros for unknown MSRs for which rdmsr_safe() succeeds. That is by far the most popular bodge value we manually use to fix up cases where returning the real MSR value was actually a proven problem. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |