On 01.12.14 at 10:24, tiejun.c...@intel.com wrote:
We always reserve these ranges since we never allow any stuff to
poke them.
But in theory some untrusted VM can maliciously access them. So we
need to intercept this approach. But we just don't want to leak
anything or introduce any side
From: Chen, Tiejun
Sent: Monday, December 01, 2014 5:25 PM
We always reserve these ranges since we never allow any stuff to
poke them.
But in theory some untrusted VM can maliciously access them. So we
need to intercept this approach. But we just don't want to leak
anything or introduce
On Mon, Dec 01, 2014 at 05:24:30PM +0800, Tiejun Chen wrote:
We always reserve these ranges since we never allow any stuff to
poke them.
s/any stuff to poke them/guest to access them./
But in theory some untrusted VM can maliciously access them. So we
need to intercept this approach. But we
We always reserve these ranges since we never allow any stuff to
poke them.
But in theory some untrusted VM can maliciously access them. So we
need to intercept this approach. But we just don't want to leak
anything or introduce any side affect since other OSs may touch them
by careless behavior,