[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v6 1/5] x86: allow reading MSR_IA32_TSC with XENPF_resource_op



>>> On 26.01.15 at 11:10, <chao.p.peng@xxxxxxxxxxxxxxx> wrote:
> On Fri, Jan 23, 2015 at 02:28:04PM +0000, Jan Beulich wrote:
>> >>> On 23.01.15 at 14:40, <chao.p.peng@xxxxxxxxxxxxxxx> wrote:
>> > --- a/xen/include/public/platform.h
>> > +++ b/xen/include/public/platform.h
>> > @@ -540,6 +540,16 @@ DEFINE_XEN_GUEST_HANDLE(xenpf_core_parking_t);
>> >  #define XEN_RESOURCE_OP_MSR_READ  0
>> >  #define XEN_RESOURCE_OP_MSR_WRITE 1
>> >  
>> > +/*
>> > + * Specially handled MSRs:
>> > + * - MSR_IA32_TSC
>> > + * READ: Returns the scaled system time(ns) instead of raw timestamp. In
>> > + *       multiple entry case, if other MSR read is followed by a 
>> > MSR_IA32_TSC
>> > + *       read, then both reads are guaranteed to be performed atomically 
>> > (with
>> > + *       IRQ disabled). The return time indicates the point of reading 
>> > that MSR.
>> > + * WRITE: Not supported.
>> > + */
>> 
>> So before adding this I'd really like to once again understand what
>> the consumer of this is going to use this for: The scaled system time
>> normally isn't very useful to user mode code, hence whether we
>> return ticks or nanoseconds doesn't seem to make a big difference -
>> unless user mode code is expected to only ever look at the delta of
>> two such values. In which case I'd consider obfuscating the real
>> value by some artificial (and perhaps randomized at boot time) bias.
>> 
> 
> Since Andrew has answered this (in another reply), I don't have to say much
> here. Just one thing to make sure: Is obfuscating the return value still 
> your
> expectation?

As expressed above - I think it would be worthwhile to consider, to
avoid accidental or deliberate abuse of the new interface. Yet I'm
not going to make this a hard requirement, especially if you find it's
harder to implement than I suppose it would be.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.