Re: [PATCH 2/3] KVM: x86: Control guest reads of MSR_PLATFORM_INFO

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Aug 13, 2018 at 1:58 PM Jim Mattson <jmattson@xxxxxxxxxx> wrote:
>
> On Mon, Aug 13, 2018 at 1:45 PM, Konrad Rzeszutek Wilk
> <konrad.wilk@xxxxxxxxxx> wrote:
> > On Mon, Aug 13, 2018 at 09:31:42AM -0700, Drew Schmitt wrote:
> >> On Mon, Aug 13, 2018 at 6:50 AM Konrad Rzeszutek Wilk
> >> <konrad.wilk@xxxxxxxxxx> wrote:
> >> >
> >> > On Fri, Aug 10, 2018 at 02:26:03PM -0700, Drew Schmitt wrote:
> >> > > Add KVM_CAP_MSR_PLATFORM_INFO so that userspace can disable guest access
> >> > > to reads of MSR_PLATFORM_INFO.
> >> >
> >> > Or enable it - by default it is enabled. Perhaps by default it should
> >> > be disabled?
> >>
> >> We wanted to make this an opt-out functionality in order to not change
> >> the current default behavior (which today is a guest *can* read this
> >> MSR).
> >
> > <nods> What is the danger of disabling access to this in the first place?

Disabling access to reads of this MSR gives userspace the control to
"expose" this platform-dependent information to guests in a clear way.
As it exists today, guests that read this MSR would get unpopulated
information if userspace hadn't already set it (and prior to this
patch series, only the CPUID faulting information could have been
populated). This existing interface could be confusing if guests don't
handle the potential for incorrect/incomplete information gracefully
(e.g. zero reported for base frequency).

> > Or providing by default some cooked up value ? Does it break Windows? Linux guests?
>
> It breaks a specific non-Windows/non-Linux guest.



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux