|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [for-4.15][PATCH v2 1/5] xen/x86: p2m: Don't map the special pages in the IOMMU page-tables
Hi Jan, On 15/02/2021 12:36, Jan Beulich wrote: On 15.02.2021 12:38, Julien Grall wrote:On 10/02/2021 11:26, Jan Beulich wrote:On 09.02.2021 16:28, Julien Grall wrote:From: Julien Grall <jgrall@xxxxxxxxxx> Currently, the IOMMU page-tables will be populated early in the domain creation if the hardware is able to virtualize the local APIC. However, the IOMMU page tables will not be freed during early failure and will result to a leak. An assigned device should not need to DMA into the vLAPIC page, so we can avoid to map the page in the IOMMU page-tables.Here and below, may I ask that you use the correct term "APIC access page", as there are other pages involved in vLAPIC handling (in particular the virtual APIC page, which is where accesses actually go to that translate to the APIC access page in EPT).This statement is also true for any special pages (the vLAPIC page is one of them). So to take the opportunity to prevent the mapping for all of them.I probably should have realized this earlier, but there is a downside to this: A guest wanting to core dump itself may want to dump e.g. shared info and vcpu info pages. Hence ... Do you have a link to v2? I would like to try with my series. [1] <1b6a411b-84e7-bfb1-647e-511a13df838c@xxxxxxxx>Given the context I was able to guess what mail you refer to, but I would very much like to ask you and anyone else to provide links rather than mail IDs as references. Not every mail UI allows looking up by ID. It is pretty trivial nowadays to search for a message by ID online: https://lore.kernel.org/xen-devel/<message-id> Cheers, -- Julien Grall
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |