[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH V3 00/19] Remove the directmap



You seem to have forgotten to add the maintainers on Cc for the
patches.  Adding them here for reference.

Regards, Roger.

On Mon, May 13, 2024 at 11:10:58AM +0000, Elias El Yandouzi wrote:
> Hi all,
> 
> A few years ago, Wei Liu implemented a PoC to remove the directmap
> from Xen. The last version was sent by Hongyan Xia [1].
> 
> I will start with thanking both Wei and Hongyan for the initial work
> to upstream the feature. A lot of patches already went in and this is
> the last few patches missing to effectively enable the feature.
> 
> === What is the directmap? ===
> 
> At the moment, on both arm64 and x86, most of the RAM is mapped
> in Xen address space. This means that domain memory is easily
> accessible in Xen.
> 
> === Why do we want to remove the directmap? ===
> 
> (Summarizing my understanding of the previous discussion)
> 
> Speculation attacks (like Spectre SP1) rely on loading piece of memory
> in the cache. If the region is not mapped then it can't be loaded.
> 
> So removing reducing the amount of memory mapped in Xen will also
> reduce the surface attack.
> 
> === What's the performance impact? ===
> 
> As the guest memory is not always mapped, then the cost of mapping
> will increase. I haven't done the numbers with this new version, but
> some measurement were provided in the previous version for x86.
> 
> === Improvement possible ===
> 
> The known area to improve on x86 are:
>    * Mapcache: There was a patch sent by Hongyan:
>      
> https://lore.kernel.org/xen-devel/4058e92ce21627731c49b588a95809dc0affd83a.1581015491.git.hongyxia@xxxxxxxxxx/
>    * EPT: At the moment an guest page-tabel walk requires about 20 map/unmap.
>      This will have an very high impact on the performance. We need to decide
>      whether keep the EPT always mapped is a problem
> 
> The original series didn't have support for Arm64. But as there were
> some interest, I have provided a PoC.
> 
> There are more extra work for Arm64:
>    * The mapcache is quite simple. We would investigate the performance
>    * The mapcache should be made compliant to the Arm Arm (this is now
>      more critical).
>    * We will likely have the same problem as for the EPT.
>    * We have no support for merging table to a superpage, neither
>      free empty page-tables. (See more below)
> 
> === Implementation ===
> 
> The subject is probably a misnomer. The directmap is still present but
> the RAM is not mapped by default. Instead, the region will still be used
> to map pages allocate via alloc_xenheap_pages().
> 
> The advantage is the solution is simple (so IHMO good enough for been
> merged as a tech preview). The disadvantage is the page allocator is not
> trying to keep all the xenheap pages together. So we may end up to have
> an increase of page table usage.
> 
> In the longer term, we should consider to remove the direct map
> completely and switch to vmap(). The main problem with this approach
> is it is frequent to use mfn_to_virt() in the code. So we would need
> to cache the mapping (maybe in the struct page_info).
> 
> === Why arm32 is not covered? ===
> 
> On Arm32, the domheap and xenheap is always separated. So by design
> the guest memory is not mapped by default.
> 
> At this stage, it seems unnecessary to have to map/unmap xenheap pages
> every time they are allocated.
> 
> === Why not using a separate domheap and xenheap? ===
> 
> While a separate xenheap/domheap reduce the page-table usage (all
> xenheap pages are contiguous and could be always mapped), it is also
> currently less scalable because the split is fixed at boot time (XXX:
> Can this be dynamic?).
> 
> === Future of secret-free hypervisor ===
> 
> There are some information in an e-mail from Andrew a few years ago:
> 
> https://lore.kernel.org/xen-devel/e3219697-0759-39fc-2486-715cdec1ca9e@xxxxxxxxxx/
> 
> Cheers,
> 
> [1] 
> https://lore.kernel.org/xen-devel/cover.1588278317.git.hongyxia@xxxxxxxxxx/
> 
> *** BLURB HERE ***
> 
> Elias El Yandouzi (3):
>   xen/x86: Add build assertion for fixmap entries
>   Rename mfn_to_virt() calls
>   Rename maddr_to_virt() calls
> 
> Hongyan Xia (9):
>   x86: Create per-domain mapping of guest_root_pt
>   x86/pv: Rewrite how building PV dom0 handles domheap mappings
>   x86/mapcache: Initialise the mapcache for the idle domain
>   x86: Add a boot option to enable and disable the direct map
>   x86/domain_page: Remove the fast paths when mfn is not in the
>     directmap
>   xen/page_alloc: Add a path for xenheap when there is no direct map
>   x86/setup: Leave early boot slightly earlier
>   x86/setup: vmap heap nodes when they are outside the direct map
>   x86/setup: Do not create valid mappings when directmap=no
> 
> Julien Grall (5):
>   xen/x86: Add support for the PMAP
>   xen/arm32: mm: Rename 'first' to 'root' in init_secondary_pagetables()
>   xen/arm64: mm: Use per-pCPU page-tables
>   xen/arm64: Implement a mapcache for arm64
>   xen/arm64: Allow the admin to enable/disable the directmap
> 
> Wei Liu (2):
>   x86/pv: Domheap pages should be mapped while relocating initrd
>   x86: Lift mapcache variable to the arch level
> 
>  docs/misc/xen-command-line.pandoc             | 12 +++
>  xen/arch/arm/Kconfig                          |  2 +-
>  xen/arch/arm/arm64/mmu/mm.c                   | 45 ++++++++-
>  xen/arch/arm/domain_page.c                    | 50 +++++++++-
>  xen/arch/arm/include/asm/arm32/mm.h           |  8 --
>  xen/arch/arm/include/asm/arm64/mm.h           |  7 +-
>  xen/arch/arm/include/asm/domain_page.h        | 13 +++
>  xen/arch/arm/include/asm/mm.h                 |  9 ++
>  xen/arch/arm/include/asm/mmu/layout.h         | 13 ++-
>  xen/arch/arm/include/asm/mmu/mm.h             |  2 +
>  xen/arch/arm/mm.c                             |  1 +
>  xen/arch/arm/mmu/pt.c                         | 12 +--
>  xen/arch/arm/mmu/setup.c                      | 27 ++---
>  xen/arch/arm/mmu/smpboot.c                    | 30 ++----
>  xen/arch/arm/setup.c                          |  2 +
>  xen/arch/x86/Kconfig                          |  2 +
>  xen/arch/x86/dmi_scan.c                       |  4 +-
>  xen/arch/x86/domain.c                         | 12 ++-
>  xen/arch/x86/domain_page.c                    | 74 +++++++++-----
>  xen/arch/x86/hvm/dom0_build.c                 |  4 +-
>  xen/arch/x86/include/asm/config.h             | 10 +-
>  xen/arch/x86/include/asm/domain.h             | 13 +--
>  xen/arch/x86/include/asm/fixmap.h             |  9 ++
>  .../x86/include/asm/mach-default/bios_ebda.h  |  2 +-
>  xen/arch/x86/include/asm/mm.h                 |  6 ++
>  xen/arch/x86/include/asm/page.h               |  8 +-
>  xen/arch/x86/include/asm/pmap.h               | 25 +++++
>  xen/arch/x86/include/asm/x86_64/page.h        |  2 +-
>  xen/arch/x86/mm.c                             | 18 +++-
>  xen/arch/x86/mpparse.c                        |  2 +-
>  xen/arch/x86/pv/dom0_build.c                  | 70 +++++++++----
>  xen/arch/x86/pv/domain.c                      | 36 +++++++
>  xen/arch/x86/setup.c                          | 98 ++++++++++++++++---
>  xen/arch/x86/tboot.c                          |  2 +-
>  xen/arch/x86/x86_64/asm-offsets.c             |  1 +
>  xen/arch/x86/x86_64/entry.S                   |  8 ++
>  xen/arch/x86/x86_64/mm.c                      | 26 +++--
>  xen/common/Kconfig                            | 17 ++++
>  xen/common/efi/boot.c                         | 23 +++--
>  xen/common/page_alloc.c                       | 89 ++++++++++++++---
>  xen/common/trace.c                            |  8 +-
>  xen/include/xen/mm.h                          |  7 ++
>  42 files changed, 630 insertions(+), 179 deletions(-)
>  create mode 100644 xen/arch/arm/include/asm/domain_page.h
>  create mode 100644 xen/arch/x86/include/asm/pmap.h
> 
> -- 
> 2.40.1
> 
> 



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.