>>> On 13.09.18 at 08:41, <kevin.t...@intel.com> wrote:
>>  From: Paul Durrant
>> Sent: Wednesday, September 12, 2018 4:02 PM
>> 
>> > I also have another more general concern: Allowing the guest to
>> > manipulate its IOMMU page tables means that it can deliberately
>> > shatter large pages, growing the overall memory footprint of the
>> > domain. I'm hesitant to say this, but I'm afraid that resource
>> > tracking of such "behind the scenes" allocations might be a
>> > necessary prereq for the PV IOMMU work.
>> >
>> 
>> Remember that PV-IOMMU is only available for dom0 as it stands (and that
>> is the only use-case that XenServer currently has) so I think that, whilst 
>> the
>> concern is valid, there is no need danger in putting the code without such
>> tracking. Such work can be deferred to making PV-IOMMU for de-privileged
>> guests... if that facility is needed.
> 
> I didn't get why this is PV-IOMMU specific. Guest can always manipulate
> guest CPU page table to shatter large pages too...

Hmm, good point. I keep forgetting that we allow guests to fiddle with
their own p2m.

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to