[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 5/5] x86/msr: Blacklist various MSRs which guests definitely shouldn't be using
On Wed, Mar 07, 2018 at 06:58:36PM +0000, Andrew Cooper wrote: > The main purpose is to blacklist the Intel Resource Director Technology MSRs. > We do not yet virtualise support for guests, but Linux has been observed to > probe for these MSRs without checking CPUID first. Bad bad guest.. > > The architecturally inaccessable ranges don't need to fall back into the > legacy ranges, because they are not going to eventually evaluate as > accessible. > > The Silicon Debug interface will probably never be virtualised for guests, but > doesn't want to leak through from real hardware. SGX isn't yet virtualised, > but likely will be in the future. > > Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Thank you! _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |