[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [RFC PATCH 1/1] xen: Use a global mapping for runstate
Hi Jan > On 29 May 2020, at 08:35, Jan Beulich <jbeulich@xxxxxxxx> wrote: > > On 28.05.2020 20:54, Julien Grall wrote: >> On 28/05/2020 16:25, Bertrand Marquis wrote: >>> At the moment on Arm, a Linux guest running with KTPI enabled will >>> cause the following error when a context switch happens in user mode: >>> (XEN) p2m.c:1890: d1v0: Failed to walk page-table va 0xffffff837ebe0cd0 >>> >>> This patch is modifying runstate handling to map the area given by the >>> guest inside Xen during the hypercall. >>> This is removing the guest virtual to physical conversion during context >>> switches which removes the bug >> >> It would be good to spell out that a virtual address is not stable. So >> relying on it is wrong. > > Guests at present are permitted to change the mapping underneath the > virtual address provided (this may not be the best idea, but the > interface is like it is). Therefore I don't think the present > interface can be changed like this. Instead a new interface will need > adding which takes a guest physical address instead. (Which, in the > end, will merely be one tiny step towards making the hypercall > interfaces use guest physical addresses. And it would be nice if an > overall concept was hashed out first how that conversion should > occur, such that the change here could at least be made fit that > planned model. For example, an option might be to retain all present > hypercall numbering and simply dedicate a bit in the top level > hypercall numbers indicating whether _all_ involved addresses for > that operation are physical vs virtual ones.) I definitely fully agree that moving to interfaces using physical addresses would definitely be better but would need new hypercall numbers (or the bit system you suggest) to keep backward compatibility. Regarding the change of virtual address, even though this is theoretically possible with the current interface I do not really see how this could be handled cleanly with KPTI or even without it as this would not be an atomic change on the guest side so the only way to cleanly do this would be to do an hypercall to remove the address in xen and then recall the hypercall to register the new address. So the only way to solve the KPTI issue would actually be to create a new hypercall and keep the current bug/problem ? Bertrand
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |