On Thu, Oct 01, 2015 at 11:44:28AM +0300, Michael S. Tsirkin wrote: > On Wed, Sep 30, 2015 at 11:40:16PM +0300, Michael S. Tsirkin wrote: > > > And for what, to prevent > > > root from touching memory via dma that they can access in a million other > > > ways? > > > > So one can be reasonably sure a kernel oops is not a result of a > > userspace bug. > > Actually, I thought about this overnight, and it should be possible to > drive it securely from userspace, without hypervisor changes. > > See > > https://mid.gmane.org/20151001104505-mutt-send-email-mst at redhat.com
Ouch, looks like gmane doesn't do https. Sorry, this is the correct link: http://mid.gmane.org/20151001104505-mutt-send-email-mst at redhat.com > > > > -- > > MST