Public bug reported:

Description:
User IPI architecture depends on memory resident tables for IPI routing. This 
routing table, aka User Interrupt Target Table (UITT), are managed by the 
kernel. Since this UIPI is bond to user tasks, UITT is also allocated per task 
if UIPI connection is set up. The natural location of UITT is in task_struct 
where its life cycle are managed according to the task life cycle. This is how 
the initial implementation in SKX prototype is done.
However, with the aftermath of Meltdown vulnerability, KPTI is introduced. With 
KPTI, most kernel memory (task struct included) are no longer mapped into user 
process. We must address that by changing the allocation scheme of UITT.
This is no a unique situation, we can leverage existing infrastructure for LDT 
and IDT.

Target Release: 20.10
Target Kernel: TBD

** Affects: intel
     Importance: Undecided
         Status: New

** Affects: ubuntu
     Importance: Undecided
         Status: New


** Tags: intel-kernel-20.10

** Also affects: ubuntu
   Importance: Undecided
       Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878522

Title:
  [IOMMU] Support User IPI with kernel page table isolation (KPTI)

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1878522/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to