Date: Wed, 16 Jan 2019 23:35:37 +0000 From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 235010] bhyve: Linux guest crash due to unhandled MSR Message-ID: <bug-235010-27103-ECTOW4wWDh@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-235010-27103@https.bugs.freebsd.org/bugzilla/> References: <bug-235010-27103@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=235010 --- Comment #2 from Conrad Meyer <cem@freebsd.org> --- This seems to be a good summary: https://lkml.org/lkml/2019/1/9/448 We might be passing through CPUID bits that we should not be to the guest, at least not without adding that MSR to our emulation list. I'm not sure how we handle spectre/meltdown representations to guests on Intel. I don't think guests should be able to set these MSRs and they probably shouldn't do software mitigation -- it's up to the host to correct mitigate. So maybe we should set whatever bit claims immunity to spectre/meltdown in guest cpuid. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-235010-27103-ECTOW4wWDh>
