xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Tamas K Lengyel <tamas@tklengyel.com>
To: George Dunlap <george.dunlap@citrix.com>
Cc: "Tamas K Lengyel" <tamas.lengyel@intel.com>,
	"Wei Liu" <wl@xen.org>,
	"George Dunlap" <george.dunlap@eu.citrix.com>,
	"Andrew Cooper" <andrew.cooper3@citrix.com>,
	Xen-devel <xen-devel@lists.xenproject.org>,
	"Roger Pau Monné" <roger.pau@citrix.com>
Subject: Re: [Xen-devel] [PATCH v5 14/18] x86/mem_sharing: use default_access in add_to_physmap
Date: Thu, 23 Jan 2020 10:19:51 -0700	[thread overview]
Message-ID: <CABfawhmFoorg_AN5UL3yW-2ErDpaDd8zcCTAfZSOMns7KG=upg@mail.gmail.com> (raw)
In-Reply-To: <a78e04a8-b7b9-e78c-504b-0a08f4ffc9c4@citrix.com>

On Thu, Jan 23, 2020 at 9:44 AM George Dunlap <george.dunlap@citrix.com> wrote:
>
> On 1/22/20 5:08 PM, Tamas K Lengyel wrote:
> > On Wed, Jan 22, 2020 at 8:35 AM Jan Beulich <jbeulich@suse.com> wrote:
> >>
> >> On 21.01.2020 18:49, Tamas K Lengyel wrote:
> >>> When plugging a hole in the target physmap don't use the access permission
> >>> returned by __get_gfn_type_access as it can be non-sensical,
> >>
> >> "can be" is too vague for my taste - it suggests there may also be cases
> >> where a sensible value is returned, and hence it should be used. Could
> >> you clarify this please? (The code change itself of course is simple and
> >> mechanical enough to look okay.)
> >
> > Well, I can only speak of what I observed. The case seems to be that
> > most of the time the function actually returns p2m_access_rwx (which
> > is sensible), but occasionally something else. I didn't investigate
> > where that value actually comes from, but when populating a physmap
> > like this only the default_access is sane.
>
> It would be good to get to the bottom of this.  Is it possible that your
> dom0 agent (or whatever it's called) is calling add_to_physmap() on gfns
> that have already been populated?  Is that something you want to catch?
>

OK, I went back and deciphered why sometimes I saw different permissions here.

In the context I ran into this issue there is no dom0 agent calling
add_to_physmap. We wind up in this path with a VM fork where the MMU
faulted. The fault handler is trying to determine whether the page
needs to be forked from its parent: populated with a shared entry if
it's R/X access, or deduplicated if it's a W. This forking only
actually happens if the page type that is returned by ept_get_entry is
of a hole type. When it's a hole type, ept_get_entry always returns
p2m_access_n as the access permission. Copying that access permission
to the newly populated entry is bad - that's what this patch fixes.

But this path also gets hit when the MMU faults for other reasons. In
those cases will get permissions other then p2m_access_n since the
type is not a hole. But when it's not a hole, this function bails as
that's a clear signal that the page doesn't need forking. So I was
seeing p2m_access_rwx permission for page accesses that triggered the
MMU fault for reasons other then mem_access. For example, when a
previously shared entry needs unsharing.

So there is no mystery after all, I was just printing my debug lines
with the mem_access permissions irrespective of the page type before
the path bails due to the type check.

Tamas

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

  reply	other threads:[~2020-01-23 17:21 UTC|newest]

Thread overview: 44+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-01-21 17:49 [Xen-devel] [PATCH v5 00/18] VM forking Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 01/18] x86/hvm: introduce hvm_copy_context_and_params Tamas K Lengyel
2020-01-22 15:00   ` Jan Beulich
2020-01-22 16:42     ` Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 02/18] xen/x86: Make hap_get_allocation accessible Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 03/18] x86/p2m: Allow p2m_get_page_from_gfn to return shared entries Tamas K Lengyel
2020-01-22 15:23   ` Jan Beulich
2020-01-22 16:51     ` Tamas K Lengyel
2020-01-22 16:55       ` Jan Beulich
2020-01-23 15:32         ` George Dunlap
2020-01-23 15:48           ` Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 04/18] x86/mem_sharing: make get_two_gfns take locks conditionally Tamas K Lengyel
2020-01-23 15:50   ` George Dunlap
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 05/18] x86/mem_sharing: drop flags from mem_sharing_unshare_page Tamas K Lengyel
2020-01-23 15:53   ` George Dunlap
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 06/18] x86/mem_sharing: don't try to unshare twice during page fault Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 07/18] x86/mem_sharing: define mem_sharing_domain to hold some scattered variables Tamas K Lengyel
2020-01-23 15:59   ` George Dunlap
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 08/18] x86/mem_sharing: Use INVALID_MFN and p2m_is_shared in relinquish_shared_pages Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 09/18] x86/mem_sharing: Make add_to_physmap static and shorten name Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 10/18] x86/mem_sharing: Convert MEM_SHARING_DESTROY_GFN to a bool Tamas K Lengyel
2020-01-23 16:14   ` George Dunlap
2020-01-23 16:23     ` Tamas K Lengyel
2020-01-23 16:32       ` George Dunlap
2020-01-23 16:37         ` Jan Beulich
2020-01-23 16:42           ` George Dunlap
2020-01-23 16:55             ` Jan Beulich
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 11/18] x86/mem_sharing: Replace MEM_SHARING_DEBUG with gdprintk Tamas K Lengyel
2020-01-22 15:30   ` Jan Beulich
2020-01-22 16:55     ` Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 12/18] x86/mem_sharing: Enable mem_sharing on first memop Tamas K Lengyel
2020-01-22 15:32   ` Jan Beulich
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 13/18] x86/mem_sharing: Skip xen heap pages in memshr nominate Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 14/18] x86/mem_sharing: use default_access in add_to_physmap Tamas K Lengyel
2020-01-22 15:35   ` Jan Beulich
2020-01-22 17:08     ` Tamas K Lengyel
2020-01-23 16:44       ` George Dunlap
2020-01-23 17:19         ` Tamas K Lengyel [this message]
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 15/18] xen/mem_sharing: VM forking Tamas K Lengyel
2020-01-23 17:21   ` George Dunlap
2020-01-23 17:30     ` Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 16/18] xen/mem_access: Use __get_gfn_type_access in set_mem_access Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 17/18] x86/mem_sharing: reset a fork Tamas K Lengyel
2020-01-21 17:49 ` [Xen-devel] [PATCH v5 18/18] xen/tools: VM forking toolstack side Tamas K Lengyel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CABfawhmFoorg_AN5UL3yW-2ErDpaDd8zcCTAfZSOMns7KG=upg@mail.gmail.com' \
    --to=tamas@tklengyel.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=george.dunlap@citrix.com \
    --cc=george.dunlap@eu.citrix.com \
    --cc=roger.pau@citrix.com \
    --cc=tamas.lengyel@intel.com \
    --cc=wl@xen.org \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).