[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] Critical bug: VT-d fault causes disk corruption or Dom0 kernel panic.



I talked to Joe Cihula about this.  He is suggesting map only the RAM memory in 
E820 table.  This is more secure than map everything below max_page.  We can do 
this for x86_64 and x86_32.  For IA-64, we still map everything below max_page 
as there is no tboot issue.

What do you think of is approach?

Allen

-----Original Message-----
From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx 
[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Keir Fraser
Sent: Friday, January 23, 2009 10:44 AM
To: Kay, Allen M; Li, Xin; Li, Haicheng; 'xen-devel@xxxxxxxxxxxxxxxxxxx'
Subject: Re: [Xen-devel] Critical bug: VT-d fault causes disk corruption or 
Dom0 kernel panic.

On 23/01/2009 18:41, "Keir Fraser" <keir.fraser@xxxxxxxxxxxxx> wrote:

> Also it's going to be hard to do better while keeping efficiency since if you
> only map dom0's pages in its vtd tables then PV backend drivers will not work
> (which rely on DMAing to/from other domain's pages via grant references).
> You'd have to dynamically map/unmap as grants get mapped/unmapped, and you may
> not want the performance hit of that.
>
> I'd personally vote for getting rid of xen_in_range(). Alternatively we could
> have it merely check for is_kernel_text(), but really I think since it is not
> in any way full protection from dom0 I wonder if it is worth the bother at
> all.
>
> What do you think?

I should add that you could still implement the more sophisticated and
slower full protection, where dom0 only has DMA access to pages it currently
has access to via the host CPUs, as a boot option. For those who really
don't want to trust dom0 as far as possible.

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.