|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-devel
Re: [Xen-devel] [PATCH] MSR related clean up
 
On 24/06/2009 09:50, "Sheng Yang" <sheng@xxxxxxxxxxxxxxx> wrote:
> On Thursday 18 June 2009 17:57:06 Sheng Yang wrote:
>> rdmsr_safe() is used to access MSR unknown to Xen, and is not safe... I
>> think it is legacy.
>> 
>> Also let msr_write be parity with msr_read on MSR_IA32_MISC_ENABLE.
>> 
>> CC: Eddie Dong <eddie.dong@xxxxxxxxx>
>> Signed-off-by: Sheng Yang <sheng@xxxxxxxxxxxxxxx>
> 
> Keir?
Looks pretty dangerous to me. So I'm not sure. There are various MSRs that
are detected via CPU family/model (which we pass through) which would then
#GP on access. Also this doesn't change the AMD default. Overall, what we
have now does seem to work so I'm reluctant to mess with it.
 -- Keir
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 
 |   
 
 | 
    | 
  
  
    |   | 
    |