[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] MSR related clean up



On 24/06/2009 10:45, "Dong, Eddie" <eddie.dong@xxxxxxxxx> wrote:

> Returning 0 solves the security concern. But the argument is still that if the
> guest should see same MSR sets with native. The CPUID virtualization provides
> close features with native, but still not identical.
> An ideal solution for those MSR read should consult guest CPUID and then
> decide to either inject #GP if guest CPUID doesn't indicate this MSR, or
> return a virtual MSR. In this case MSR write side should provide the virtual
> MSR too.

Nice plan, but apart from my doubts about anyone actually bothering to a
comprehensive job of this for current processors, there's also the problem
that future processors may have MSRs detected via means such as
model/family-id which we currently pass through.

 -- Keir

> BTW, user can identify certain filtering policy or force some bits of guest
> CPUID, so current approach can't satisfy both cases.



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.