[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3] x86: allow 64-bit PV guest kernels to suppress user mode exposure of M2P
>>> On 30.04.15 at 13:18, <tim@xxxxxxx> wrote: > At 15:31 +0100 on 24 Apr (1429889471), Jan Beulich wrote: >> --- a/xen/arch/x86/mm/shadow/multi.c >> +++ b/xen/arch/x86/mm/shadow/multi.c >> @@ -1435,6 +1435,14 @@ void sh_install_xen_entries_in_l4(struct >> shadow_l4e_from_mfn(page_to_mfn(d->arch.perdomain_l3_pg), >> __PAGE_HYPERVISOR); >> >> + if ( !shadow_mode_refcounts(d) && !is_pv_32on64_domain(d) && > > I think the right check here is !shadow_mode_external(d), i.e. that > this l4e is a mapping of the M2P and not some guest-controlled mapping. Done. As before I'm most of the time uncertain which one to use and hence simply matched it with the paging_mode_refcounts() use elsewhere in the patch (which you approved already). >> + !VM_ASSIST(d, m2p_strict) ) >> + { >> + /* zap_ro_mpt(mfn_x(sl4mfn)); */ >> + sl4e[shadow_l4_table_offset(RO_MPT_VIRT_START)] = >> shadow_l4e_empty(); >> + zap_ro_mpt(mfn_x(gl4mfn)); > > Here and below -- shouldn't the existing PV paths be taking care of > zapping/filling the guest pagetable before we get here? It doesn't > seem right for shadow pagetable code to be making this kind of change > - especially in a mapping that's not actually "shadowed" per se. Right, and I actually wasn't sure - I added them just to be on the safe side and had meant to try without, but then forgot. Will do so now. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |