[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] vt-d: fix wrong addr in IOTLB invalidation descriptor
Zhang, Yang Z writes ("[Xen-devel] [PATCH] vt-d: fix wrong addr in IOTLB invalidation descriptor"): > According to vt-d specs, the addr in IOTLB invalidation descriptor should be > 4K page aligned. > > Signed-off-by: Yang Zhang <yang.z.zhang@xxxxxxxxx> > > diff -r 0455d8317631 xen/drivers/passthrough/vtd/qinval.c > --- a/xen/drivers/passthrough/vtd/qinval.c Thu Jun 28 18:43:28 2012 +0100 > +++ b/xen/drivers/passthrough/vtd/qinval.c Wed Jul 11 08:43:24 2012 +0800 > @@ -140,7 +140,7 @@ static int gen_iotlb_inv_dsc(struct iomm > qinval_entry->q.iotlb_inv_dsc.hi.am = am; > qinval_entry->q.iotlb_inv_dsc.hi.ih = ih; > qinval_entry->q.iotlb_inv_dsc.hi.res_1 = 0; > - qinval_entry->q.iotlb_inv_dsc.hi.addr = addr; > + qinval_entry->q.iotlb_inv_dsc.hi.addr = addr >> PAGE_SHIFT_4K; > > unmap_vtd_domain_page(qinval_entries); > spin_unlock_irqrestore(&qi_ctrl->qinval_lock, flags); Does this mean that previously we were invalidating the wrong place and therefore our invalidations were ineffective ? Can this be exploited somehow by a malicious guest ? Ian. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |