[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] MSR related clean up
On Wednesday 24 June 2009 17:03:56 Keir Fraser wrote: > On 24/06/2009 09:50, "Sheng Yang" <sheng@xxxxxxxxxxxxxxx> wrote: > > On Thursday 18 June 2009 17:57:06 Sheng Yang wrote: > >> rdmsr_safe() is used to access MSR unknown to Xen, and is not safe... I > >> think it is legacy. > >> > >> Also let msr_write be parity with msr_read on MSR_IA32_MISC_ENABLE. > >> > >> CC: Eddie Dong <eddie.dong@xxxxxxxxx> > >> Signed-off-by: Sheng Yang <sheng@xxxxxxxxxxxxxxx> > > > > Keir? > > Looks pretty dangerous to me. So I'm not sure. There are various MSRs that > are detected via CPU family/model (which we pass through) which would then > #GP on access. Also this doesn't change the AMD default. Overall, what we > have now does seem to work so I'm reluctant to mess with it. > Hi Keir What we suffered now is, there are some MSRs existed in CPU, but shouldn't be accessed by guest. And guest should expected a GP fault for accessing, but we return a real value, which is not desired at all. And in general, reading from unknown native MSR is dangerous, and also break host/guest isolation. I think we at least should control what we read from native. Maybe add more MSR handling is necessary. -- regards Yang, Sheng _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |