From: Andrii Anisov <andrii.anisov@gmail.com> To: Julien Grall <julien.grall@arm.com> Cc: Juergen Gross <jgross@suse.com>, xen-devel <xen-devel@lists.xenproject.org>, Boris Ostrovsky <boris.ostrovsky@oracle.com>, Stefano Stabellini <sstabellini@kernel.org> Subject: Re: [PATCH v2 0/2] Introduce runstate area registration with phys address Date: Wed, 8 May 2019 16:54:25 +0300 [thread overview] Message-ID: <0bd113db-7851-df02-90d1-2a79bd4bedaf@gmail.com> (raw) In-Reply-To: <3d5ccdcb-d777-e75b-f4bd-38d2d470a754@arm.com> Hello Julien, On 08.05.19 16:39, Julien Grall wrote: > That's a translation fault level 0 on a stage-1 page-table walk. To confirm you have kpti disabled, right? Yes, KPTI is disabled. That's why I'm curious what's wrong with that. > Does it always fail, or only time to time? It happens on boot. And those prints are permanent and makes boot time enormous. I once waited till user prompt (half an hour or so), they calmed on visible idle, but printed from time to time (maybe on userspace activities). > Could you dump the guest register when this happen? Could you please remember how to do that? > Even with kpti disabled, you are still potentially facing issue using virtual address (although they may be more difficult to trigger). Indeed, you are relying on the guest OS to unmap the regions or touch the page-tables entries used for the walk. > Unfortunately we can't prevent a guest playing with its page-table. So at best we can only workaround it. And that's why we turned to guest phys address used for runstate area. -- Sincerely, Andrii Anisov. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel
WARNING: multiple messages have this Message-ID (diff)
From: Andrii Anisov <andrii.anisov@gmail.com> To: Julien Grall <julien.grall@arm.com> Cc: Juergen Gross <jgross@suse.com>, xen-devel <xen-devel@lists.xenproject.org>, Boris Ostrovsky <boris.ostrovsky@oracle.com>, Stefano Stabellini <sstabellini@kernel.org> Subject: Re: [Xen-devel] [PATCH v2 0/2] Introduce runstate area registration with phys address Date: Wed, 8 May 2019 16:54:25 +0300 [thread overview] Message-ID: <0bd113db-7851-df02-90d1-2a79bd4bedaf@gmail.com> (raw) Message-ID: <20190508135425.gm_XzehFn2LQL74utH_SRPrAx1ArRpQSlGhseFn4CoI@z> (raw) In-Reply-To: <3d5ccdcb-d777-e75b-f4bd-38d2d470a754@arm.com> Hello Julien, On 08.05.19 16:39, Julien Grall wrote: > That's a translation fault level 0 on a stage-1 page-table walk. To confirm you have kpti disabled, right? Yes, KPTI is disabled. That's why I'm curious what's wrong with that. > Does it always fail, or only time to time? It happens on boot. And those prints are permanent and makes boot time enormous. I once waited till user prompt (half an hour or so), they calmed on visible idle, but printed from time to time (maybe on userspace activities). > Could you dump the guest register when this happen? Could you please remember how to do that? > Even with kpti disabled, you are still potentially facing issue using virtual address (although they may be more difficult to trigger). Indeed, you are relying on the guest OS to unmap the regions or touch the page-tables entries used for the walk. > Unfortunately we can't prevent a guest playing with its page-table. So at best we can only workaround it. And that's why we turned to guest phys address used for runstate area. -- Sincerely, Andrii Anisov. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2019-05-08 13:54 UTC|newest] Thread overview: 83+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-04-23 8:10 [PATCH v2 0/2] Introduce runstate area registration with phys address Andrii Anisov 2019-04-23 8:10 ` [PATCH v2 1/2] xen: introduce VCPUOP_register_runstate_phys_memory_area hypercall Andrii Anisov 2019-04-23 8:10 ` [Xen-devel] " Andrii Anisov 2019-05-08 10:10 ` George Dunlap 2019-05-08 10:10 ` [Xen-devel] " George Dunlap 2019-04-23 8:10 ` [PATCH v2 2/2] xen: implement VCPUOP_register_runstate_phys_memory_area Andrii Anisov 2019-04-23 8:10 ` [Xen-devel] " Andrii Anisov 2019-05-08 15:40 ` Julien Grall 2019-05-08 15:40 ` [Xen-devel] " Julien Grall 2019-05-09 9:27 ` Jan Beulich 2019-05-09 9:27 ` [Xen-devel] " Jan Beulich 2019-05-14 9:35 ` Julien Grall 2019-05-14 9:35 ` [Xen-devel] " Julien Grall 2019-05-14 9:48 ` Jan Beulich 2019-05-14 9:48 ` [Xen-devel] " Jan Beulich 2019-05-14 11:23 ` Julien Grall 2019-05-14 11:23 ` [Xen-devel] " Julien Grall 2019-05-14 11:29 ` Jan Beulich 2019-05-14 11:29 ` [Xen-devel] " Jan Beulich 2019-05-13 12:30 ` Andrii Anisov 2019-05-13 12:30 ` [Xen-devel] " Andrii Anisov 2019-05-14 9:58 ` Julien Grall 2019-05-14 9:58 ` [Xen-devel] " Julien Grall 2019-05-14 10:08 ` Andrii Anisov 2019-05-14 10:08 ` [Xen-devel] " Andrii Anisov 2019-05-14 11:24 ` Julien Grall 2019-05-14 11:24 ` [Xen-devel] " Julien Grall 2019-05-14 11:45 ` Andrii Anisov 2019-05-14 11:45 ` [Xen-devel] " Andrii Anisov 2019-05-14 12:02 ` Jan Beulich 2019-05-14 12:02 ` [Xen-devel] " Jan Beulich 2019-05-14 13:05 ` Andrii Anisov 2019-05-14 13:05 ` [Xen-devel] " Andrii Anisov 2019-05-14 13:49 ` Julien Grall 2019-05-14 13:49 ` [Xen-devel] " Julien Grall 2019-05-15 9:04 ` Andrii Anisov 2019-05-15 9:04 ` [Xen-devel] " Andrii Anisov 2019-05-15 10:31 ` Julien Grall 2019-05-15 10:31 ` [Xen-devel] " Julien Grall 2019-05-14 13:49 ` Jan Beulich 2019-05-14 13:49 ` [Xen-devel] " Jan Beulich 2019-05-15 8:44 ` Andrii Anisov 2019-05-15 8:44 ` [Xen-devel] " Andrii Anisov 2019-05-15 11:59 ` Jan Beulich 2019-05-15 11:59 ` [Xen-devel] " Jan Beulich 2019-05-16 12:09 ` Jan Beulich 2019-05-16 12:09 ` [Xen-devel] " Jan Beulich 2019-05-16 13:30 ` Andrii Anisov 2019-05-16 13:30 ` [Xen-devel] " Andrii Anisov 2019-05-16 13:30 ` Andrii Anisov 2019-05-16 13:30 ` [Xen-devel] " Andrii Anisov 2019-05-16 13:48 ` Julien Grall 2019-05-16 13:48 ` [Xen-devel] " Julien Grall 2019-05-16 14:25 ` Andrii Anisov 2019-05-16 14:25 ` [Xen-devel] " Andrii Anisov 2019-05-16 14:28 ` Julien Grall 2019-05-16 14:28 ` [Xen-devel] " Julien Grall 2019-05-16 14:29 ` Andrii Anisov 2019-05-16 14:29 ` [Xen-devel] " Andrii Anisov [not found] ` <fa126315-31af-854e-817a-8640b431c82b@arm.com> [not found] ` <CAC1WxdiMzAq5hRC-mhRQuFDs7z_Hj5w7VAy52ec87SJQOGmp3w@mail.gmail.com> [not found] ` <a28f95a1-d9da-2caf-f4b4-013100176b02@arm.com> [not found] ` <090ce8cc-f329-fe54-4894-b7f12e3cd5a6@gmail.com> 2019-05-08 13:39 ` [PATCH v2 0/2] Introduce runstate area registration with phys address Julien Grall 2019-05-08 13:39 ` [Xen-devel] " Julien Grall 2019-05-08 13:54 ` Andrii Anisov [this message] 2019-05-08 13:54 ` Andrii Anisov 2019-05-08 14:31 ` Julien Grall 2019-05-08 14:31 ` [Xen-devel] " Julien Grall 2019-05-08 16:01 ` Andrii Anisov 2019-05-08 16:01 ` [Xen-devel] " Andrii Anisov 2019-05-13 10:50 ` Julien Grall 2019-05-13 10:50 ` [Xen-devel] " Julien Grall 2019-05-13 14:34 ` Andrii Anisov 2019-05-13 14:34 ` [Xen-devel] " Andrii Anisov 2019-05-08 13:59 ` Julien Grall 2019-05-13 10:15 ` Andrii Anisov 2019-05-13 11:16 ` Julien Grall 2019-05-13 14:14 ` Andrii Anisov 2019-05-13 14:34 ` Julien Grall 2019-05-13 15:29 ` Andrii Anisov 2019-05-13 15:31 ` Julien Grall 2019-05-13 15:38 ` Andrii Anisov 2019-05-13 15:40 ` Julien Grall 2019-05-13 15:42 ` Andrii Anisov 2019-05-13 15:45 ` Julien Grall 2019-05-13 16:05 ` Andrii Anisov
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=0bd113db-7851-df02-90d1-2a79bd4bedaf@gmail.com \ --to=andrii.anisov@gmail.com \ --cc=boris.ostrovsky@oracle.com \ --cc=jgross@suse.com \ --cc=julien.grall@arm.com \ --cc=sstabellini@kernel.org \ --cc=xen-devel@lists.xenproject.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).