Re: [PATCH 2/3] KVM: x86: Control guest reads of MSR_PLATFORM_INFO

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Aug 13, 2018 at 1:45 PM, Konrad Rzeszutek Wilk
<konrad.wilk@xxxxxxxxxx> wrote:
> On Mon, Aug 13, 2018 at 09:31:42AM -0700, Drew Schmitt wrote:
>> On Mon, Aug 13, 2018 at 6:50 AM Konrad Rzeszutek Wilk
>> <konrad.wilk@xxxxxxxxxx> wrote:
>> >
>> > On Fri, Aug 10, 2018 at 02:26:03PM -0700, Drew Schmitt wrote:
>> > > Add KVM_CAP_MSR_PLATFORM_INFO so that userspace can disable guest access
>> > > to reads of MSR_PLATFORM_INFO.
>> >
>> > Or enable it - by default it is enabled. Perhaps by default it should
>> > be disabled?
>>
>> We wanted to make this an opt-out functionality in order to not change
>> the current default behavior (which today is a guest *can* read this
>> MSR).
>
> <nods> What is the danger of disabling access to this in the first place?
> Or providing by default some cooked up value ? Does it break Windows? Linux guests?

It breaks a specific non-Windows/non-Linux guest.



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux