 
	
| [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [ARM] gvirt_to_maddr fails when DomU is created
 On 11/28/18 6:10 PM, Volodymyr Babchuk wrote: Hi Julien, Hi Volodymyr, On Tue, 27 Nov 2018 at 21:40, Julien Grall <julien.grall@xxxxxxx> wrote: nopti is x86 specific. So did you mean kpti=no? I can verify, that kernel does not print "CPU features: detected: Kernel page table isolation (KPTI)", but that's all. So you should see something similar to: CPU features: kernel page table isolation forced OFF by command line option Correct? Strangely, I'm starting to see this messages only after I create DomU. If this really would be triggered by KPTI, then I should see those errors right from the boot, right? Not necessarily, you need to have a context switch happening while you are at EL0 to trigger the issue. That's unlikely going to happen if you have less vCPUs running than available pCPUs. There are more chance to happen when starting you DomU. Anyway, it is quite interesting because I also managed to reproduce it with KPTI turned off (i.e kpti=no). The PAR_EL1 contains 0x809 which tells us this is a level 0 translation fault when walking stage-1. So the virtual address is definitely not mapped. I added some code to dump the guest vCPU registers on the fault. All the fault happen at EL0 so somehow the address is getting unmapped when running at EL0. I have the feeling that kpti=no does not fully disable the feature. I will have the chat tomorrow with my team to see how the option should be behave. In any case, passing a virtual address is just the wrong things to do as the guest is free to do whatever it wants in term of page-tables. The discussion in this thread is an example of what could go wrong :). So we still want to fix the hypercall no matter the outcome of the discussion regarding kpti=no. Finally, for the sake of clarification turning off kpti=no is not recommended unless you really trust your userspace applications. I was interested to know whether the problem was related to the feature or something different :). Cheers, -- Julien Grall _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel 
 
 | 
|  | Lists.xenproject.org is hosted with RackSpace, monitoring our |