|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-devel
RE: [Xen-devel] [PATCH] Unified shutdown code 
| Keir Fraser <mailto:Keir.Fraser@xxxxxxxxxxxx> scribbled on Monday,
September 10, 2007 11:17 PM:
> On 10/9/07 22:22, "Cihula, Joseph" <joseph.cihula@xxxxxxxxx> wrote:
> 
>> But the purpose of centralizing it was so that the hook into sboot's
>> shutdown wouldn't need to be in multiple place.  And the reason to
>> hook into sboot's shutdown (which also supports the halt action)
>> even though the system is being halt'ed is so that we don't leave
>> some path that allows the system to be subverted or misused while
>> still having privileged access to the TPM, etc.
> 
> Why is Xen running a halt loop on every CPU any more exploitable than
> Xen running normal Xen code on every CPU? If every CPU is spinning on
HLT
> with interrupts disabled then the only signals that will change state
are
> things like NMI, INIT, reset?
I agree that with:  interrupts disabled, a halt loop, VT-d protections
still in place, the IDT in place, and TXT blocking INIT--that I cannot
think of any way to exploit the halt loop.  And I believe that all of
these conditions are true for all cases where Xen uses halt loops.  So
I'm OK with leaving the halt routines as-is.
> 
>  -- Keir
> 
>> That said, I'm not aware of any exploitable
>> conditions/paths/environment when Xen is placed in a halt loop (at
>> least none that JTAG users wouldn't already have without waiting for
>> the system to halt), so I suppose that this extra bit of caution is
>> not really necessary.  But if the EARLY_FAIL behavior gets changed
>> back to halt, is there any harm? 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 | 
 |  | 
  
    |  |  |