[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] x2APIC MSR range (XSA-108 follow-up)



On Tue, Oct 14, 2014 at 06:23:52AM +0000, Zhang, Yang Z wrote:
> Wu, Feng wrote on 2014-10-14:
> > 
> > The SDM 10.12.1.2 says:
> > 
> > " Addresses in the range 800H¨CBFFH that are not listed in Table 10-6
> > (including 80EH and 831H) are reserved.
> > Executions of RDMSR and WRMSR that attempt to access such addresses
> > cause general-protection exceptions. "
> > 
> > Table 10-6. Local APIC Register Address Map Supported by x2APIC
> > 
> > Why should we virtualize those reserved MSRs for guests?
> 
> IIUC the question should be why those undocumented MSRs exist on
> real hardware and what do they do? Will guest access to them via
> check CPU model? If yes, how can we virtualize them correctly?

I suspect that Intel knows what they are and what they do. I imagine
that both are CPU model specific.

> I don't have the answer right now but I will forward the question to
> hardware guy for more help.

Since these MSRs are not part of the SDM or any public platform
documentation as far as I can tell, I imagine that they are for
BIOS-level functionality that does not have meaning in a virtual
environment today and presents no OS compatibility problem if we
choose to #GP all access to them.

Short of some reply from Intel saying "No! That will break some OS" I
think that we should make the x2APIC MSR code handle 0x800...0xbff and
#GP any access that is above the emulated area.

--msw

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.