[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] VPMU interrupt unreliability
On Fri, Oct 20, 2017 at 3:07 AM, Jan Beulich <JBeulich@xxxxxxxx> wrote: > > >>> On 19.10.17 at 20:20, <xumengpanda@xxxxxxxxx> wrote: > > Is there any document about the possible attack via the vPMU? The > > document I found (such as [1] and XSA-163) just briefly say that the > > vPMU should be disabled due to security concern. > > Besides the other responses you've already got, I also recall there > being at least some CPU models that would live lock upon the > debug store being placed into virtual space not mapped by present > pages. Thank you very much for your explanation! :) Best Regards, Meng ----------- Meng Xu Ph.D. Candidate in Computer and Information Science University of Pennsylvania http://www.cis.upenn.edu/~mengxu/ _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |