[Bug 235010] bhyve: Linux guest crash due to unhandled MSR

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

[Bug 235010] bhyve: Linux guest crash due to unhandled MSR

bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=235010

--- Comment #2 from Conrad Meyer <[hidden email]> ---
This seems to be a good summary:

https://lkml.org/lkml/2019/1/9/448

We might be passing through CPUID bits that we should not be to the guest, at
least not without adding that MSR to our emulation list.

I'm not sure how we handle spectre/meltdown representations to guests on Intel.

I don't think guests should be able to set these MSRs and they probably
shouldn't do software mitigation -- it's up to the host to correct mitigate.
So maybe we should set whatever bit claims immunity to spectre/meltdown in
guest cpuid.

--
You are receiving this mail because:
You are the assignee for the bug.
_______________________________________________
[hidden email] mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-virtualization
To unsubscribe, send any mail to "[hidden email]"