> -----Original Message-----
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, November 19, 2015 4:44 PM
> To: Wu, Feng <feng...@intel.com>
> Cc: Andrew Cooper <andrew.coop...@citrix.com>; ian.campb...@citrix.com;
> wei.l...@citrix.com; george.dun...@eu.citrix.com;
> ian.jack...@eu.citrix.com; stefano.stabell...@eu.citrix.com; Han, Huaitong
> <huaitong....@intel.com>; Nakajima, Jun <jun.nakaj...@intel.com>; Tian,
> Kevin <kevin.t...@intel.com>; xen-devel@lists.xen.org; k...@xen.org
> Subject: RE: [Xen-devel] [PATCH 00/10] x86/hvm: pkeys, add memory
> protection-key support
> 
> >>> On 19.11.15 at 08:44, <feng...@intel.com> wrote:
> 
> >
> Correct, but this is connected to the earlier item. I.e. if only you make
> sure Xen and PV guests get run with CR4.PKE always clear, then no
> extra auditing will be necessary.

Yes, I think we will make it clear. We only expose this to HVM. And for
Xen and PV, the CR4.PKE should be zero.

Thanks,
Feng

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to