[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] RE: general protection fault: 0000 [#1]
The current let-anyone-RDMSR is pretty dodgy, to be honest. I think we should whitelist with a default of returning 0 for the contents (rather than #GP, which would be a bit harsh response for a PV kernel). -- Keir On 6/3/08 08:42, "Jan Beulich" <jbeulich@xxxxxxxxxx> wrote: > Actually, it's not exactly that way - as long as an MSR can be read by > Xen (i.e. is implemented), guests are permitted to read them (see the > default case in the rdmsr handling part of emulate_privileged_op(). > > However, I have a hard time understanding what need profiling code > would have to access MSR 0x119 (which, according to my docs, is > PentiumPro/II/III specific). _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |