|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v8][PATCH 03/17] introduce XENMEM_reserved_device_memory_map
On 12/08/2014 05:00 AM, Jan Beulich wrote: On 08.12.14 at 07:17, <tiejun.chen@xxxxxxxxx> wrote:On 2014/12/3 3:47, Konrad Rzeszutek Wilk wrote:On Mon, Dec 01, 2014 at 05:24:21PM +0800, Tiejun Chen wrote: I can see a possible reason why an XSM check might be needed here, but I'm not sufficiently clear on what reserved device memory is to tell for sure. My best guess is that it is not needed. From my reading of this patchset, this hypercall just identifies regions of memory that are reserved, similar to exposing the host's e820 map to a guest. That seems similar enough to the other XENMEM_* leaks that it is acceptable to also allow it. If there is a reason that it would be useful to hide this, adding hooks to all these locations so that only domains that use passthrough devices (and therefore need to know about the host system's memory) will have access is probably the best option. If a guest who has control of a passthrough device can cause these reserved ranges to change, then there may be reason to prevent others from querying them, but that doesn't appear to be the case here. -- Daniel De Graaf National Security Agency _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |