|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] [PATCH] MSR related clean up
On 24/06/2009 10:45, "Dong, Eddie" <eddie.dong@xxxxxxxxx> wrote:
> Returning 0 solves the security concern. But the argument is still that if the
> guest should see same MSR sets with native. The CPUID virtualization provides
> close features with native, but still not identical.
> An ideal solution for those MSR read should consult guest CPUID and then
> decide to either inject #GP if guest CPUID doesn't indicate this MSR, or
> return a virtual MSR. In this case MSR write side should provide the virtual
> MSR too.
Nice plan, but apart from my doubts about anyone actually bothering to a
comprehensive job of this for current processors, there's also the problem
that future processors may have MSRs detected via means such as
model/family-id which we currently pass through.
-- Keir
> BTW, user can identify certain filtering policy or force some bits of guest
> CPUID, so current approach can't satisfy both cases.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|