> -----Original Message-----
> From: Tian, Kevin [mailto:kevin.t...@intel.com]
> Sent: 13 September 2018 07:41
> To: Paul Durrant <paul.durr...@citrix.com>; 'Jan Beulich'
> <jbeul...@suse.com>
> Cc: Stefano Stabellini <sstabell...@kernel.org>; Wei Liu
> <wei.l...@citrix.com>; Konrad Rzeszutek Wilk <konrad.w...@oracle.com>;
> Andrew Cooper <andrew.coop...@citrix.com>; Tim (Xen.org)
> <t...@xen.org>; George Dunlap <george.dun...@citrix.com>; Julien Grall
> <julien.gr...@arm.com>; xen-devel <xen-devel@lists.xenproject.org>; Ian
> Jackson <ian.jack...@citrix.com>
> Subject: RE: [PATCH v6 13/14] x86: add iommu_ops to modify and flush
> IOMMU mappings
> 
> > From: Paul Durrant
> > Sent: Wednesday, September 12, 2018 4:02 PM
> >
> >
> > > In order to avoid shooting down all pre-existing RAM mappings - is
> > > there no way the page table entries could be marked to identify
> > > their origin?
> > >
> >
> > I don't know whether that is possible; I'll have to find specs for Intel and
> > AMD IOMMUs and see if they have PTE bits available for such a use.
> 
> there are ignored bits
> 
> >
> > > I also have another more general concern: Allowing the guest to
> > > manipulate its IOMMU page tables means that it can deliberately
> > > shatter large pages, growing the overall memory footprint of the
> > > domain. I'm hesitant to say this, but I'm afraid that resource
> > > tracking of such "behind the scenes" allocations might be a
> > > necessary prereq for the PV IOMMU work.
> > >
> >
> > Remember that PV-IOMMU is only available for dom0 as it stands (and that
> > is the only use-case that XenServer currently has) so I think that, whilst 
> > the
> > concern is valid, there is no need danger in putting the code without such
> > tracking. Such work can be deferred to making PV-IOMMU for de-
> privileged
> > guests... if that facility is needed.
> >
> 
> I didn't get why this is PV-IOMMU specific. Guest can always manipulate
> guest CPU page table to shatter large pages too...
> 

At the moment that is true. I guess Jan doesn't want to introduce another way 
for a guest to cause Xen to consume large amounts of memory.

  Paul

> Thanks
> Kevin
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to