On Wed, Nov 16, 2022 at 09:40:23AM +, Alex Bennée wrote:
>
> Chao Peng writes:
>
> > On Mon, Nov 14, 2022 at 11:43:37AM +, Alex Bennée wrote:
> >>
> >> Chao Peng writes:
> >>
> >>
> >> > Introduction
> >> >
> >> > KVM userspace being able to crash the host is horrible. U
Chao Peng writes:
> On Mon, Nov 14, 2022 at 11:43:37AM +, Alex Bennée wrote:
>>
>> Chao Peng writes:
>>
>>
>> > Introduction
>> >
>> > KVM userspace being able to crash the host is horrible. Under current
>> > KVM architecture, all guest memory is inherently accessible from
On Mon, Nov 14, 2022 at 11:43:37AM +, Alex Bennée wrote:
>
> Chao Peng writes:
>
>
> > Introduction
> >
> > KVM userspace being able to crash the host is horrible. Under current
> > KVM architecture, all guest memory is inherently accessible from KVM
> > userspace and is expose
On Wed, Nov 09, 2022 at 06:54:04PM +0300, Kirill A. Shutemov wrote:
> On Mon, Nov 07, 2022 at 04:41:41PM -0800, Isaku Yamahata wrote:
> > On Thu, Nov 03, 2022 at 05:43:52PM +0530,
> > Vishal Annapurve wrote:
> >
> > > On Tue, Oct 25, 2022 at 8:48 PM Chao Peng
> > > wrote:
> > > >
> > > > This p
Chao Peng writes:
> Introduction
>
> KVM userspace being able to crash the host is horrible. Under current
> KVM architecture, all guest memory is inherently accessible from KVM
> userspace and is exposed to the mentioned crash issue. The goal of this
> series is to provide a solu
On Mon, Nov 07, 2022 at 04:41:41PM -0800, Isaku Yamahata wrote:
> On Thu, Nov 03, 2022 at 05:43:52PM +0530,
> Vishal Annapurve wrote:
>
> > On Tue, Oct 25, 2022 at 8:48 PM Chao Peng
> > wrote:
> > >
> > > This patch series implements KVM guest private memory for confidential
> > > computing sce
On Thu, Nov 03, 2022 at 05:43:52PM +0530,
Vishal Annapurve wrote:
> On Tue, Oct 25, 2022 at 8:48 PM Chao Peng wrote:
> >
> > This patch series implements KVM guest private memory for confidential
> > computing scenarios like Intel TDX[1]. If a TDX host accesses
> > TDX-protected guest memory, ma
On Tue, Oct 25, 2022 at 8:48 PM Chao Peng wrote:
>
> This patch series implements KVM guest private memory for confidential
> computing scenarios like Intel TDX[1]. If a TDX host accesses
> TDX-protected guest memory, machine check can happen which can further
> crash the running host system, this
This patch series implements KVM guest private memory for confidential
computing scenarios like Intel TDX[1]. If a TDX host accesses
TDX-protected guest memory, machine check can happen which can further
crash the running host system, this is terrible for multi-tenant
configurations. The host acces