>>> On 21.03.17 at 18:25, <tamas.leng...@zentific.com> wrote:
> On Tue, Mar 21, 2017 at 11:19 AM, Jan Beulich <jbeul...@suse.com> wrote:
>> Hmm, the original (abstract) VMFUNC use case, as I have
>> understood it, allows a guest to actively select between EPT
>> variants without having (direct) control over their contents.
> 
> Correct. But even when altp2m is enabled on the domain VMFUNC and #VE
> is not available to the guest unless vmx_vcpu_update_vmfunc_ve is
> called via HVMOP_altp2m_vcpu_enable_notify. That HVMOP is created such
> that it can be called from the guest, which I need to be able to deny.

All understood, but with you agreeing with my statement above,
I think you also agree that there need to be two levels of what
can be denied: altp2m ops in general vs altp2m ops except
HVMOP_altp2m_vcpu_enable_notify (then implying the guest
being allowed to use VMFUNC and receive #VE). Which, as
suggested earlier, results in a total of 3 modes (besides fully
disabled altp2m).

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

Reply via email to