[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] RE: general protection fault: 0000 [#1]



The current let-anyone-RDMSR is pretty dodgy, to be honest. I think we
should whitelist with a default of returning 0 for the contents (rather than
#GP, which would be a bit harsh response for a PV kernel).

 -- Keir

On 6/3/08 08:42, "Jan Beulich" <jbeulich@xxxxxxxxxx> wrote:

> Actually, it's not exactly that way - as long as an MSR can be read by
> Xen (i.e. is implemented), guests are permitted to read them (see the
> default case in the rdmsr handling part of emulate_privileged_op().
> 
> However, I have a hard time understanding what need profiling code
> would have to access MSR 0x119 (which, according to my docs, is
> PentiumPro/II/III specific).



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.