[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen Introspection, KPTI, and CR3 bit 63 leads to guest VMENTRY failures during introspection
On 01/26/2018 06:17 PM, Bitweasil . wrote: > The proposed changes would only have an impact if CR3 exiting is > enabled, which implies a pair of world switches and other code execution > in a different region of memory and with different page tables anyway. > > Under normal operation, CR3 exiting is not turned on, so this will have > no impact on operation. > > Are there any non-introspection cases in which CR3 exiting will be > enabled for hardware virtualized guests? Given the time cost of a pair > of world switches and handling the associated code, I question if one > could even measure the difference of the TLB flush or not. The CR3 > reporting performance hit under KPTI is quite catastrophic anyway, > though I expect one could mitigate that somewhat with CR3-targets, if > one wanted to. CR3 exits seem indeed to be enabled via {hvm,vmx}_update_cr(v, 0), however I believe that they currently remain enabled even after the vm_event consumer detaches from the guest (I dont think CPU_BASED_CR3_LOAD_EXITING is being cleared from v->arch.hvm_vmx.exec_control). This needs testing, but I believe it to be correct. Thanks, Razvan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |