<kevin.t...@intel.com>; wei.l...@citrix.com;
>> >> ian.campb...@citrix.com; stefano.stabell...@eu.citrix.com;
>> >> george.dun...@eu.citrix.com; ian.jack...@eu.citrix.com; xen-
>> >> de...@lists.xen.org; Nakajima, Jun <jun.nakaj...@intel.com>; Han,
n...@eu.citrix.com;
> ian.jack...@eu.citrix.com; stefano.stabell...@eu.citrix.com; Han, Huaitong
> <huaitong@intel.com>; Nakajima, Jun <jun.nakaj...@intel.com>; Tian,
> Kevin <kevin.t...@intel.com>; xen-devel@lists.xen.org; k...@xen.org
> Subject: RE: [Xen-devel] [PATC
gt;; Han,
>> Huaitong <huaitong....@intel.com>; k...@xen.org
>> Subject: Re: [Xen-devel] [PATCH 00/10] x86/hvm: pkeys, add memory
>> protection-key support
>>
>>>>> On 16.11.15 at 18:45, <andrew.coop...@citrix.com> wrote:
>>> Furthermore, it
l.com>; wei.l...@citrix.com;
> ian.campb...@citrix.com; stefano.stabell...@eu.citrix.com;
> george.dun...@eu.citrix.com; ian.jack...@eu.citrix.com; xen-
> de...@lists.xen.org; Nakajima, Jun <jun.nakaj...@intel.com>; Han,
> Huaitong <huaitong@intel.com>; k...@xen.org
> S
ix.com;
> ian.campb...@citrix.com; stefano.stabell...@eu.citrix.com;
> george.dun...@eu.citrix.com; ian.jack...@eu.citrix.com; xen-
> de...@lists.xen.org; Nakajima, Jun <jun.nakaj...@intel.com>; Han,
> Huaitong <huaitong....@intel.com>; k...@xen.org
> Subject: Re: [Xen-devel] [PATC
>>> On 17.11.15 at 17:24, wrote:
> On 17/11/15 10:26, Jan Beulich wrote:
> On 16.11.15 at 18:45, wrote:
>>> Furthermore, it is unclear (given the unwritten ABI) whether it is even
>>> safe to move _PAGE_GNTTAB out of the way, as this is
On 17/11/15 10:26, Jan Beulich wrote:
On 16.11.15 at 18:45, wrote:
>> Furthermore, it is unclear (given the unwritten ABI) whether it is even
>> safe to move _PAGE_GNTTAB out of the way, as this is visible to a PV guest.
> It seems pretty clear to me that this
>>> On 16.11.15 at 18:45, wrote:
> Furthermore, it is unclear (given the unwritten ABI) whether it is even
> safe to move _PAGE_GNTTAB out of the way, as this is visible to a PV guest.
It seems pretty clear to me that this would be unsafe: It being
part of
The protection-key feature provides an additional mechanism by which IA-32e
paging controls access to usermode addresses.
Hardware support for protection keys for user pages is enumerated with CPUID
feature flag CPUID.7.0.ECX[3]:PKU. Software support is CPUID.7.0.ECX[4]:OSPKE
with the setting of