[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [RFC PATCH 0/5] x86: Multiple fixes to MSR_TSC_AUX and RDTSCP handling for guests



On 09/03/2018 18:05, Boris Ostrovsky wrote:
>
>
> On 02/26/2018 06:30 PM, Andrew Cooper wrote:
>> On 26/02/2018 19:44, Boris Ostrovsky wrote:
>>> On 02/26/2018 02:12 PM, Andrew Cooper wrote:
>>>> On 20/02/18 11:58, Andrew Cooper wrote:
>>>>> This rats nest was discovered when finding that MSR_TSC_AUX leaked
>>>>> into PV
>>>>> guests.  It is RFC because I haven't done extensive testing on the
>>>>> result, and
>>>>> because there are some functional changes for the virtualised TSC
>>>>> modes.
>>>>>
>>>>> Andrew Cooper (5):
>>>>>    x86/hvm: Don't shadow the domain parameter in hvm_save_cpu_msrs()
>>>>>    x86/pv: Avoid leaking other guests' MSR_TSC_AUX values into PV
>>>>> context
>>>>>    x86/time: Rework pv_soft_rdtsc() to aid further cleanup
>>>>>    x86/pv: Remove deferred RDTSC{,P} handling in
>>>>> pv_emulate_privileged_op()
>>>>>    x86: Rework MSR_TSC_AUX handling from scratch.
>>>> Konrad/Boris: Can we have any input WRT TSC_MODE_PVRDTSCP usage?  Are
>>>> you still using the feature, or is it abandoned?
>>> I already asked a few internal teams about, haven't heard back.
>>
>> Ah ok - thanks.  I'll wait to hear back from you then.
>
>
> Took longer than I hoped, sorry.
>
> Couldn't find anyone who is still using this mode (or perhaps noone
> wanted to admit to this ;-)).

Is this your (Oracle's) blessing to purge the feature and pretend that
it never existed?

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.