From: Tim Deegan <tim@xen.org>
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: chegger@amazon.de, JBeulich@suse.com,
suravee.suthikulpanit@amd.com, xen-devel@lists.xen.org
Subject: Re: [PATCH 1/1] x86/AMD: Fix nested svm crash due to assertion in __virt_to_maddr
Date: Thu, 4 Jul 2013 22:48:38 +0100 [thread overview]
Message-ID: <20130704214838.GA46646@ocelot.phlegethon.org> (raw)
In-Reply-To: <51D5D040.4070501@citrix.com>
At 20:42 +0100 on 04 Jul (1372970576), Andrew Cooper wrote:
> On 04/07/13 20:36, suravee.suthikulpanit@amd.com wrote:
> > From: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
> >
> > Fix assertion in __virt_to_maddr when starting nested SVM guest
> > in debug mode. Investigation has shown that svm_vmsave/svm_vmload
> > make use of __pa() with invalid address.
> >
> > Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
> > ---
> > xen/arch/x86/hvm/svm/svm.c | 4 ++--
> > xen/include/asm-x86/hvm/svm/svm.h | 14 ++++++++++++++
> > 2 files changed, 16 insertions(+), 2 deletions(-)
> >
> > diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
> > index acd2d49..944569a 100644
> > --- a/xen/arch/x86/hvm/svm/svm.c
> > +++ b/xen/arch/x86/hvm/svm/svm.c
> > @@ -1809,7 +1809,7 @@ svm_vmexit_do_vmload(struct vmcb_struct *vmcb,
> > goto inject;
> > }
> >
> > - svm_vmload(nv->nv_vvmcx);
> > + nestedsvm_vmload(nv->nv_vvmcxaddr);
> > /* State in L1 VMCB is stale now */
> > v->arch.hvm_svm.vmcb_in_sync = 0;
> >
> > @@ -1845,7 +1845,7 @@ svm_vmexit_do_vmsave(struct vmcb_struct *vmcb,
> > goto inject;
> > }
> >
> > - svm_vmsave(nv->nv_vvmcx);
> > + nestedsvm_vmsave(nv->nv_vvmcxaddr);
> >
> > __update_guest_eip(regs, inst_len);
> > return;
> > diff --git a/xen/include/asm-x86/hvm/svm/svm.h b/xen/include/asm-x86/hvm/svm/svm.h
> > index 64e7e25..909e8a1 100644
> > --- a/xen/include/asm-x86/hvm/svm/svm.h
> > +++ b/xen/include/asm-x86/hvm/svm/svm.h
> > @@ -55,6 +55,20 @@ static inline void svm_vmsave(void *vmcb)
> > : : "a" (__pa(vmcb)) : "memory" );
> > }
> >
> > +static inline void nestedsvm_vmload(uint64_t vmcb)
>
> unsigned long if this is actually an address.
IIUC this is a physical address, so paddr_t is the correct type. Also,
it might be nicer to call these svm_vm{save,load}_by_paddr() or similar
to make it clear what they do.
> But more importantly, if virt_to_maddr() fails an assertion because the
> virtual address is not a persistent mapping, what is going to happen
> when the virtual mapping (potentially) changes while the vvmcx is in use?
I think the virtual mapping is ok from that point of view -- it's mapped
with map_domain_page_global(). I worry that we might run out of mapping
slots if we keep a lot of these permanent mappings around, though.
Cheers,
Tim
next prev parent reply other threads:[~2013-07-04 21:48 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-07-04 19:36 [PATCH 1/1] x86/AMD: Fix nested svm crash due to assertion in __virt_to_maddr suravee.suthikulpanit
2013-07-04 19:42 ` Andrew Cooper
2013-07-04 21:48 ` Tim Deegan [this message]
2013-07-05 7:47 ` Egger, Christoph
2013-07-05 7:54 ` Jan Beulich
2013-07-05 7:53 ` Jan Beulich
2013-07-05 21:38 ` Suravee Suthikulanit
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20130704214838.GA46646@ocelot.phlegethon.org \
--to=tim@xen.org \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=chegger@amazon.de \
--cc=suravee.suthikulpanit@amd.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).