|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] RE: general protection fault: 0000 [#1]
The current let-anyone-RDMSR is pretty dodgy, to be honest. I think we
should whitelist with a default of returning 0 for the contents (rather than
#GP, which would be a bit harsh response for a PV kernel).
-- Keir
On 6/3/08 08:42, "Jan Beulich" <jbeulich@xxxxxxxxxx> wrote:
> Actually, it's not exactly that way - as long as an MSR can be read by
> Xen (i.e. is implemented), guests are permitted to read them (see the
> default case in the rdmsr handling part of emulate_privileged_op().
>
> However, I have a hard time understanding what need profiling code
> would have to access MSR 0x119 (which, according to my docs, is
> PentiumPro/II/III specific).
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|