[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [VMI] Possible race-condition in altp2m APIs
Le lundi, mai 6, 2019 7:07 PM, Andrew Cooper <andrew.cooper3@xxxxxxxxxx> a écrit :
I wanted to gather enough data before making a bug report on such a complicated issue.
I can reliably reproduce the Double Fault after ~10 tests on Windows 10 with KPTI. And the stacktrace always show the beginning of KiSystemCall64ShadowCommon, which is executed after the CR3 switch to the kernel page tables.
I checked RSP, and it's mapped in the kernel page tables: # print kernel and userland page directory physical address kd> dt _EPROCESS ffffdf8815e15340 ImageFileName Pcb.Directorytablebase Pcb.Userdirectorytablebase ntdll!_EPROCESS +0x000 Pcb : +0x028 DirectoryTableBase : 0xcbf10002 +0x278 UserDirectoryTableBase : 0xcbe00001 +0x450 ImageFileName : [15] "ctfmon.exe" # print RSP kd> r rsp rsp=fffff800b006cd08 # translate RSP to physical address kd> !vtop cbf10000 fffff800b006cd08 Amd64VtoP: Virt fffff800b006cd08, pagedir 00000000cbf10000 Amd64VtoP: PML4E 00000000cbf10f80 Amd64VtoP: PDPE 0000000003708010 Amd64VtoP: PDE 0000000003709c00 Amd64VtoP: PTE 000000000371d360 Amd64VtoP: Mapped phys 000000000546cd08 Virtual address fffff800b006cd08 translates to physical address 546cd08.
I can give this a try, and see if it resolves the problem ! Thanks Andrew _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |