WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] EFER in HVM guests

To: "Nakajima, Jun" <jun.nakajima@xxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>, Keir Fraser <keir@xxxxxxxxxxxxx>
Subject: Re: [Xen-devel] EFER in HVM guests
From: Keir Fraser <keir@xxxxxxxxxxxxx>
Date: Wed, 29 Nov 2006 17:21:50 +0000
Delivery-date: Wed, 29 Nov 2006 09:21:54 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <8FFF7E42E93CC646B632AB40643802A80184FF9F@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AccTv6r97XujPIxiQ5aNfYfQKg41qAAEUxeAAAJ45Nk=
Thread-topic: [Xen-devel] EFER in HVM guests
User-agent: Microsoft-Entourage/11.2.5.060620
*Please* can you make the handling of generic CPUID leaves and architectural
MSRs common HVM code? There is lots of needless code duplication right now
with niggling differences that shouldn't be necessary.

 -- Keir

On 29/11/06 16:34, "Nakajima, Jun" <jun.nakajima@xxxxxxxxx> wrote:

>> I think it does - allowing a guest to enable EFER.LME when the
>> hypervisor is a 32-bit one is clearly a security problem: While I
>> haven't tried it, I would suspect the moment you load a context
>> with such an EFER the whole system's dead.
>> Not being able to access EFER is also a potential problem, as a
>> guest should be allowed to set EFER.NX (at least) - the CPUID
>> handling code specifically does not suppress this bit if the guest
>> is allowed to use PAE (which we agreed a few days ago should
>> be the default anyway).
>> 
>> Jan
>> 
> 
> I agree that we should allow 32-bit guests to set EFER.NX on the PAE
> Xen. We'll fix it. EFER.SCE should not be set on IA-32. 


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel