[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 00/10] x86/hvm: pkeys, add memory protection-key support
> -----Original Message----- > From: Jan Beulich [mailto:JBeulich@xxxxxxxx] > Sent: Thursday, November 19, 2015 4:44 PM > To: Wu, Feng <feng.wu@xxxxxxxxx> > Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>; ian.campbell@xxxxxxxxxx; > wei.liu2@xxxxxxxxxx; george.dunlap@xxxxxxxxxxxxx; > ian.jackson@xxxxxxxxxxxxx; stefano.stabellini@xxxxxxxxxxxxx; Han, Huaitong > <huaitong.han@xxxxxxxxx>; Nakajima, Jun <jun.nakajima@xxxxxxxxx>; Tian, > Kevin <kevin.tian@xxxxxxxxx>; xen-devel@xxxxxxxxxxxxx; keir@xxxxxxx > Subject: RE: [Xen-devel] [PATCH 00/10] x86/hvm: pkeys, add memory > protection-key support > > >>> On 19.11.15 at 08:44, <feng.wu@xxxxxxxxx> wrote: > > > > Correct, but this is connected to the earlier item. I.e. if only you make > sure Xen and PV guests get run with CR4.PKE always clear, then no > extra auditing will be necessary. Yes, I think we will make it clear. We only expose this to HVM. And for Xen and PV, the CR4.PKE should be zero. Thanks, Feng _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |