Re: [Xen-devel] [v8][PATCH 12/17] xen/x86/ept: handle reserved device memory in ept_handle_violation

2014-12-04 Thread Jan Beulich
On 01.12.14 at 10:24, tiejun.c...@intel.com wrote: We always reserve these ranges since we never allow any stuff to poke them. But in theory some untrusted VM can maliciously access them. So we need to intercept this approach. But we just don't want to leak anything or introduce any side

Re: [Xen-devel] [v8][PATCH 12/17] xen/x86/ept: handle reserved device memory in ept_handle_violation

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:25 PM We always reserve these ranges since we never allow any stuff to poke them. But in theory some untrusted VM can maliciously access them. So we need to intercept this approach. But we just don't want to leak anything or introduce

Re: [Xen-devel] [v8][PATCH 12/17] xen/x86/ept: handle reserved device memory in ept_handle_violation

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:30PM +0800, Tiejun Chen wrote: We always reserve these ranges since we never allow any stuff to poke them. s/any stuff to poke them/guest to access them./ But in theory some untrusted VM can maliciously access them. So we need to intercept this approach. But we

[Xen-devel] [v8][PATCH 12/17] xen/x86/ept: handle reserved device memory in ept_handle_violation

2014-12-01 Thread Tiejun Chen
We always reserve these ranges since we never allow any stuff to poke them. But in theory some untrusted VM can maliciously access them. So we need to intercept this approach. But we just don't want to leak anything or introduce any side affect since other OSs may touch them by careless behavior,