Re: KVM guest sometimes failed to boot because of kernel stack overflow if KPTI is enabled on a hisilicon ARM64 platform.
From: Will Deacon
Date: Wed Jun 27 2018 - 09:27:54 EST
On Wed, Jun 27, 2018 at 02:22:03PM +0100, Wei Xu wrote:
> On 2018/6/26 18:47, Will Deacon wrote:
> > If you look at the __idmap_kpti_put_pgtable_ent_ng asm macro, can you try
> > replacing:
> >
> > dc civac, cur_\()\type\()p
> >
> > with:
> >
> > dc ivac, cur_\()\type\()p
> >
> > please? Only do this for the guest kernel, not the host. KVM will upgrade
> > the clean to a clean+invalidate, so it's interesting to see if this has
> > an effect on the behaviour.
>
> Only changed the guest kernel, the guest still failed to boot and the log
> is same with the last mail.
>
> But if I changed to cvac as below for the guest, it is kind of stable.
> dc cvac, cur_\()\type\()p
>
> I have synced with our SoC guys about this and hope we can find the reason.
> Do you have any more suggestion?
Unfortunately, not. It looks like somehow clean+invalidate is behaving
just as an invalidate, and we're corrupting the page table as a result.
Hopefully the SoC guys will figure it out.
Will