[Bug 235010] bhyve: Linux guest crash due to unhandled MSR
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Wed Jan 16 23:35:39 UTC 2019
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=235010
--- Comment #2 from Conrad Meyer <cem at freebsd.org> ---
This seems to be a good summary:
https://lkml.org/lkml/2019/1/9/448
We might be passing through CPUID bits that we should not be to the guest, at
least not without adding that MSR to our emulation list.
I'm not sure how we handle spectre/meltdown representations to guests on Intel.
I don't think guests should be able to set these MSRs and they probably
shouldn't do software mitigation -- it's up to the host to correct mitigate.
So maybe we should set whatever bit claims immunity to spectre/meltdown in
guest cpuid.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-virtualization
mailing list