| Deutsch English Français Italiano |
|
<f15591af7afc40ebf74588686d9ea34e@www.novabbs.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!usenet.network!news.neodome.net!rocksolid2!i2pn2.org!.POSTED!not-for-mail From: mitchalsup@aol.com (MitchAlsup1) Newsgroups: comp.arch Subject: Re: Constant Stack Canaries Date: Wed, 9 Apr 2025 00:23:09 +0000 Organization: Rocksolid Light Message-ID: <f15591af7afc40ebf74588686d9ea34e@www.novabbs.org> References: <vsbcnl$1d4m5$1@dont-email.me> <vsidun$sput$2@dont-email.me> <jwvtt752vg1.fsf-monnier+comp.arch@gnu.org> <vsmg8a$16gr3$1@dont-email.me> <vsnksc$2fkk9$1@dont-email.me> <6a77fabdb64f59e4497ef3353d747441@www.novabbs.org> <vsq91i$18k1q$1@dont-email.me> <760b3834d1202502f5f63e52b51cfdc8@www.novabbs.org> <kGeIP.467285$d51.395138@fx46.iad> <ee644124d3b2562986842766af421577@www.novabbs.org> <fgwIP.1525957$eNx6.1219389@fx14.iad> <1a0a4bdf578ae29ba9c2d20f19d0adde@www.novabbs.org> <O0RIP.1475758$SZca.1399925@fx13.iad> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Info: i2pn2.org; logging-data="3729099"; mail-complaints-to="usenet@i2pn2.org"; posting-account="o5SwNDfMfYu6Mv4wwLiW6e/jbA93UAdzFodw5PEa6eU"; User-Agent: Rocksolid Light X-Rslight-Site: $2y$10$T2Esdn/EeoR6t1JIpDH2JOojRY985goC6bYKNKjAgT/gzAe1a0INe X-Rslight-Posting-User: cb29269328a20fe5719ed6a1c397e21f651bda71 X-Spam-Checker-Version: SpamAssassin 4.0.0 On Mon, 7 Apr 2025 14:09:50 +0000, Scott Lurndal wrote: > mitchalsup@aol.com (MitchAlsup1) writes: >>On Sun, 6 Apr 2025 14:21:26 +0000, Scott Lurndal wrote: >>---------------- >>> When the exception (in this case an upcall to a more privileged >>> regime) occurs, the saved state register/stack word should contain the >>> prior privilege level. The hypervisor will know from that whether >>> the upcall was from the guest OS or a guest Application. >>> >>> Note that on ARM, there are restrictions on upcalls to >>> more privileged regimes - generally a particular regime >>> can only upcall the next higher privileged regime, so >>> the user app can only upcall the GuestOS, the guest OS can only >>> upcall the HV and the HV is the only regime that can >>> upcall the secure monitor. >> >>On Sun, 6 Apr 2025 14:32:43 +0000, Scott Lurndal wrote: >> >>> That presumes a shared address space between the privilege >>> levels - which is common for the OS and user-modes. It's >>> not common (or particularly useful[*]) at any other privilege >>> level. >> >>So, is this dichotomy because:: >> >>a) HVs are good enough at virtualizing raw HW that GuestOS >> does not need a lot of paravirtualization to be efficient ?? > > Yes. Once AMD added Nested Page Tables to SVM and the PCI-SIG > proposed the SR-IOV capability, paravirtualization became anathema. > >> >>b) GuestOS does not need "that much paravirtualization" to be >> efficient anyway. > > With modern hardware support, yes. > >> >>c) the kinds of things GuestOS ask HVs to perform is just not >> enough like the kind of things user asks of GuestOS. > > Yes, that's also a truism. > >> >>d) User and GuestOS evolved in a time before virtualization >> and simply prefer to exist as it used to be ?? > > Typically an OS doesn't know if it is a guest or bare metal. > That characteristic means that a given distribution can > operate as either. Thank you for updating a piece of history apparently I did not live through !!