[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC PATCH 0/5] x86: Multiple fixes to MSR_TSC_AUX and RDTSCP handling for guests
On 09/03/2018 18:05, Boris Ostrovsky wrote: > > > On 02/26/2018 06:30 PM, Andrew Cooper wrote: >> On 26/02/2018 19:44, Boris Ostrovsky wrote: >>> On 02/26/2018 02:12 PM, Andrew Cooper wrote: >>>> On 20/02/18 11:58, Andrew Cooper wrote: >>>>> This rats nest was discovered when finding that MSR_TSC_AUX leaked >>>>> into PV >>>>> guests. It is RFC because I haven't done extensive testing on the >>>>> result, and >>>>> because there are some functional changes for the virtualised TSC >>>>> modes. >>>>> >>>>> Andrew Cooper (5): >>>>> x86/hvm: Don't shadow the domain parameter in hvm_save_cpu_msrs() >>>>> x86/pv: Avoid leaking other guests' MSR_TSC_AUX values into PV >>>>> context >>>>> x86/time: Rework pv_soft_rdtsc() to aid further cleanup >>>>> x86/pv: Remove deferred RDTSC{,P} handling in >>>>> pv_emulate_privileged_op() >>>>> x86: Rework MSR_TSC_AUX handling from scratch. >>>> Konrad/Boris: Can we have any input WRT TSC_MODE_PVRDTSCP usage? Are >>>> you still using the feature, or is it abandoned? >>> I already asked a few internal teams about, haven't heard back. >> >> Ah ok - thanks. I'll wait to hear back from you then. > > > Took longer than I hoped, sorry. > > Couldn't find anyone who is still using this mode (or perhaps noone > wanted to admit to this ;-)). Is this your (Oracle's) blessing to purge the feature and pretend that it never existed? ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |