Public bug reported:
Description:
User IPI architecture depends on memory resident tables for IPI routing. This
routing table, aka User Interrupt Target Table (UITT), are managed by the
kernel. Since this UIPI is bond to user tasks, UITT is also allocated per task
if UIPI connection is set up. The natural location of UITT is in task_struct
where its life cycle are managed according to the task life cycle. This is how
the initial implementation in SKX prototype is done.
However, with the aftermath of Meltdown vulnerability, KPTI is introduced. With
KPTI, most kernel memory (task struct included) are no longer mapped into user
process. We must address that by changing the allocation scheme of UITT.
This is no a unique situation, we can leverage existing infrastructure for LDT
and IDT.
Target Release: 20.10
Target Kernel: TBD
** Affects: intel
Importance: Undecided
Status: New
** Affects: ubuntu
Importance: Undecided
Status: New
** Tags: intel-kernel-20.10
** Also affects: ubuntu
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878522
Title:
[IOMMU] Support User IPI with kernel page table isolation (KPTI)
To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1878522/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs