On Mon, Sep 26, 2011 at 10:45:35PM +0300, Pekka Enberg wrote: >> I'm not sure what Michael means with "theoretical issue" here. Can the guest >> driver assume that the hypervisor doesn't attempt to do nasty things? On Mon, Sep 26, 2011 at 10:57 PM, Michael S. Tsirkin <mst@xxxxxxxxxx> wrote: > IMO yes, hypervisor has full access to guest memory so it's a safe > assumption. But surviving in the face of hypervisor bugs > is laudable goal, bugs do happen. I was thinking of a compromised guest that is able to trick the hypervisor into doing nasty things to other guests without taking over the hypervisor completely. So for something like virtio networking, that's by definition exposed to rest of the world, I think it's very important not to be robust against hypervisor bugs. In any case, we were able to trigger this particular case rather easily with our buggy tool, so it's definitely worth fixing. ;-) FWIW, Acked-by: Pekka Enberg <penberg@xxxxxxxxxx> Pekka -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html