[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Runstate hypercall and Linux KPTI issues
Hi, Following my patch[1] to map the guest runstate in Xen during the hypercall directly instead of doing the conversion from virtual to physical when updating the runstate content during a context switch a global discussion started[2][3]. To resume the discussion the problem is the following: A guest registers a memory area for xen to put on and maintain the runstate information. This is done currently using a guest virtual address which is converted by Xen during context switches. When KPTI is used and a context switch occurs while linux is running in user space the area is not mapped and the information is not updated. This results in invalid runstate information but also in some annoying warning coming up in Xen console on arm. After the discussion by mail and the last community call it was proposed to change the way to go and instead of trying to fix the problem in the existing hypercall, to introduce a new hypercall taking as parameter a guest physical address for the runstate area instead of a virtual address in the current hypercall. This means: - add a new hypercall to Xen - add support for this new hypercall in Linux and use it if Xen supports it - keep existing hypercall with its limitation (for older guests) - keep support for both behaviour during the context switch Some open questions: - should we allow to register an area using both hypercalls or should it be exclusive ? - should we backport the support for this hypercall in older kernel releases ? - other ? Please tell me if you agree or not before I start to plan how this can be implemented :-) Regards Bertrand [1] https://lists.xenproject.org/archives/html/xen-devel/2020-07/msg01541.html [2] https://lists.xenproject.org/archives/html/xen-devel/2020-07/msg01461.html [3] https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00810.html IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |