Re: KVM x86: Infinite loop on updating accessed bit in r/o page table

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Il 24/02/2014 19:29, Jan Kiszka ha scritto:
> Hi,
> 
> I noticed that KVM (with VMX at least) enters an inifite loop of
> vmentries and ept-violations when it has to set the accessed bit in a
> guest page table that is in read-only memory (namely: the F-segment of
> the BIOS). I don't think this is the proper reaction...
> 
> Jan

Thanks, I'll try to reproduce this.  Does it work with shadow page tables?
I'm asking because this commit wanted to fix something similar for the shadow
page table case:

    commit ba6a3541545542721ce821d1e7e5ce35752e6fdf
    Author: Paolo Bonzini <pbonzini@xxxxxxxxxx>
    Date:   Mon Sep 9 13:52:33 2013 +0200

    KVM: mmu: allow page tables to be in read-only slots
    
    Page tables in a read-only memory slot will currently cause a triple
    fault because the page walker uses gfn_to_hva and it fails on such a slot.
    
    OVMF uses such a page table; however, real hardware seems to be fine with
    that as long as the accessed/dirty bits are set.  Save whether the slot
    is readonly, and later check it when updating the accessed and dirty bits.
    
    Reviewed-by: Xiao Guangrong <xiaoguangrong@xxxxxxxxxxxxxxxxxx>
    Reviewed-by: Gleb Natapov <gleb@xxxxxxxxxx>
    Signed-off-by: Paolo Bonzini <pbonzini@xxxxxxxxxx>

even though OVMF sets the accessed/dirty bits so it's not exactly the same
scenario.

Note that NPT simply does not support this.  Page tables must be writable
in the NPT page tables, according to the AMD manual.

Paolo
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux