From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Nakajima, Jun" Subject: Re: [PATCH v3 03/13] VMX: implement suppress #VE. Date: Tue, 7 Jul 2015 11:59:50 -0700 Message-ID: References: <1435774177-6345-1-git-send-email-edmund.h.white@intel.com> <1435774177-6345-4-git-send-email-edmund.h.white@intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1435774177-6345-4-git-send-email-edmund.h.white@intel.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Ed White Cc: Ravi Sahita , Wei Liu , George Dunlap , Tim Deegan , Ian Jackson , xen-devel , Jan Beulich , Andrew Cooper , tlengyel@novetta.com, Daniel De Graaf List-Id: xen-devel@lists.xenproject.org On Wed, Jul 1, 2015 at 11:09 AM, Ed White wrote: > In preparation for selectively enabling #VE in a later patch, set > suppress #VE on all EPTE's. > > Suppress #VE should always be the default condition for two reasons: > it is generally not safe to deliver #VE into a guest unless that guest > has been modified to receive it; and even then for most EPT violations only > the hypervisor is able to handle the violation. > > Signed-off-by: Ed White > > Reviewed-by: Andrew Cooper Acked-by: Jun Nakajima -- Jun Intel Open Source Technology Center