[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: Understanding osdep_xenforeignmemory_map mmap behaviour
Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx> writes: > On 24/08/2022 10:19, Viresh Kumar wrote: >> On 24-03-22, 06:12, Juergen Gross wrote: >>> For a rather long time we were using "normal" user pages for this purpose, >>> which were just locked into memory for doing the hypercall. >>> >>> Unfortunately there have been very rare problems with that approach, as >>> the Linux kernel can set a user page related PTE to invalid for short >>> periods of time, which led to EFAULT in the hypervisor when trying to >>> access the hypercall data. >>> >>> In Linux this can avoided only by using kernel memory, which is the >>> reason why the hypercall buffers are allocated and mmap()-ed through the >>> privcmd driver. >> Hi Juergen, >> >> I understand why we moved from user pages to kernel pages, but I don't >> fully understand why we need to make two separate calls to map the >> guest memory, i.e. mmap() followed by ioctl(IOCTL_PRIVCMD_MMAPBATCH). >> >> Why aren't we doing all of it from mmap() itself ? I hacked it up to >> check on it and it works fine if we do it all from mmap() itself. As I understand it the MMAPBATCH ioctl is being treated like every other hypercall proxy through the ioctl interface. Which makes sense from the point of view of having a consistent interface to the hypervisor but not from point of view of providing a consistent userspace interface for mapping memory which doesn't care about the hypervisor details. The privcmd_mmapbatch_v2 interface is slightly richer than what you could expose via mmap() because it allows the handling of partial mappings with what I presume is a per-page *err array. If you issued the hypercall directly from the mmap() and one of the pages wasn't mapped by the hypervisor you would have to unwind everything before returning EFAULT to the user. >> Aren't we abusing the Linux userspace ABI here ? As standard userspace >> code would expect just mmap() to be enough to map the memory. Yes, the >> current user, Xen itself, is adapted to make two calls, but it breaks >> as soon as we want to use something that relies on Linux userspace >> ABI. >> >> For instance, in our case, where we are looking to create >> hypervisor-agnostic virtio backends, the rust-vmm library [1] issues >> mmap() only and expects it to work. It doesn't know it is running on a >> Xen system, and it shouldn't know that as well. > > Use /dev/xen/hypercall which has a sane ABI for getting "safe" memory. > privcmd is very much not sane. > > In practice you'll need to use both. /dev/xen/hypercall for getting > "safe" memory, and /dev/xen/privcmd for issuing hypercalls for now. I'm unsure what is meant by safe memory here. privcmd_buf_mmap() looks like it just allocates a bunch of GFP_KERNEL pages rather than interacting with the hypervisor directly. Are these the same pages that get used when you eventually call privcmd_ioctl_mmap_batch()? The fact that /dev/xen/hypercall is specified by xen_privcmdbuf_dev is a little confusing TBH. Anyway the goal here is to provide a non-xen aware userspace with standard userspace API to access the guests memory. Perhaps messing around with the semantics of the /dev/xen/[hypercall|privcmd] devices nodes is too confusing. Maybe we could instead: 1. Have the Xen aware VMM ask to make the guests memory visible to the host kernels address space. 2. When this is done explicitly create a device node to represent it (/dev/xen/dom-%d-mem?) 3. Pass this new device to the non-Xen aware userspace which uses the standard mmap() call to make the kernel pages visible to userspace Does that make sense? -- Alex Bennée
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |