WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

[Xen-ia64-devel] RE: [PATCH] use shared version of iva/dcr

To: "Matt Chapman" <matthewc@xxxxxxxxxxxxxxx>
Subject: [Xen-ia64-devel] RE: [PATCH] use shared version of iva/dcr
From: "Magenheimer, Dan (HP Labs Fort Collins)" <dan.magenheimer@xxxxxx>
Date: Tue, 23 Aug 2005 13:56:17 -0700
Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Tue, 23 Aug 2005 20:54:13 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: DIscussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcWnyGyjTkZc04hgRcG7hQsIeNbf6AAXFWYQ
Thread-topic: [PATCH] use shared version of iva/dcr
The question that I was asking is:

Assume a hostile paravirtualized guest writes, say, -1
into the virtual iva (or dcr).  Is there any possibility that
this could crash Xen if Xen blindly uses the value
to branch to?  You are probably correct that the answer
is "no", but we should make sure of this before moving
it out of the private data structure.

> -----Original Message-----
> From: Matt Chapman [mailto:matthewc@xxxxxxxxxxxxxxx] 
> Sent: Tuesday, August 23, 2005 3:53 AM
> To: Magenheimer, Dan (HP Labs Fort Collins)
> Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
> Subject: Re: [PATCH] use shared version of iva/dcr
> 
> On Mon, Aug 22, 2005 at 09:56:57AM -0700, Magenheimer, Dan 
> (HP Labs Fort Collins) wrote:
> > For dcr, this may not matter, but for iva, there
> > are some semantics that need to be checked every
> > virtual interrupt delivery.  At a minimum, if virtual
> > iva is not private, bits 0-14 should be zeroed
> > before every use by Xen, correct?
> 
> We could do that, but I don't think it's necessary.  The 
> shared page is
> only written directly by paravirtualised guests, and for 
> those guests we
> can just define the guest interface such that that field must 
> be zero -
> it seems unlikely that any OS would intentionally write that field.
> If an OS were to write that field, it just shoots itself in 
> the foot as
> exceptions are vectored to the wrong address - no loss of isolation
> occurs.
> 
> Matt
> 
> 

_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel

<Prev in Thread] Current Thread [Next in Thread>