On 10/25/2018 03:50 PM, Jan Beulich wrote:
>>>> On 22.10.18 at 16:55, <wei.l...@citrix.com> wrote:
>> On Thu, Oct 18, 2018 at 06:46:22PM +0100, Andrew Cooper wrote:
>>> An easy first step here is to remove Xen's directmap, which will mean
>>> that guests general RAM isn't mapped by default into Xen's address
>>> space.  This will come with some performance hit, as the
>>> map_domain_page() infrastructure will now have to actually
>>> create/destroy mappings, but removing the directmap will cause an
>>> improvement for non-speculative security as well (No possibility of
>>> ret2dir as an exploit technique).
>>
>> I have looked into making the "separate xenheap domheap with partial
>> direct map" mode (see common/page_alloc.c) work but found it not as
>> straight forward as it should've been.
>>
>> Before I spend more time on this, I would like some opinions on if there
>> is other approach which might be more useful than that mode.
> 
> How would such a split heap model help with L1TF, where the
> guest specifies host physical addresses in its vulnerable page
> table entries

I don't think it would.

> (and hence could spy at xenheap but - due to not
> being mapped - not domheap)?

Er, didn't follow this bit -- if L1TF is related to host physical
addresses, how does having a virtual mapping in Xen affect things in any
way?

 -George

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to