Re: [PATCH v5 25/65] i386/tdx: Add property sept-ve-disable for tdx-guest object

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Jun 14, 2024 at 09:04:33AM +0800, Xiaoyao Li wrote:
> On 6/13/2024 4:35 PM, Duan, Zhenzhong wrote:
> > 
> > 
> > > -----Original Message-----
> > > From: Li, Xiaoyao <xiaoyao.li@xxxxxxxxx>
> > > Subject: Re: [PATCH v5 25/65] i386/tdx: Add property sept-ve-disable for
> > > tdx-guest object
> > > 
> > > On 6/6/2024 6:45 PM, Daniel P. Berrangé wrote:
> > > > Copying  Zhenzhong Duan as my point relates to the proposed libvirt
> > > > TDX patches.
> > > > 
> > > > On Thu, Feb 29, 2024 at 01:36:46AM -0500, Xiaoyao Li wrote:
> > > > > Bit 28 of TD attribute, named SEPT_VE_DISABLE. When set to 1, it
> > > disables
> > > > > EPT violation conversion to #VE on guest TD access of PENDING pages.
> > > > > 
> > > > > Some guest OS (e.g., Linux TD guest) may require this bit as 1.
> > > > > Otherwise refuse to boot.
> > > > > 
> > > > > Add sept-ve-disable property for tdx-guest object, for user to configure
> > > > > this bit.
> > > > > 
> > > > > Signed-off-by: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
> > > > > Acked-by: Gerd Hoffmann <kraxel@xxxxxxxxxx>
> > > > > Acked-by: Markus Armbruster <armbru@xxxxxxxxxx>
> > > > > ---
> > > > > Changes in v4:
> > > > > - collect Acked-by from Markus
> > > > > 
> > > > > Changes in v3:
> > > > > - update the comment of property @sept-ve-disable to make it more
> > > > >     descriptive and use new format. (Daniel and Markus)
> > > > > ---
> > > > >    qapi/qom.json         |  7 ++++++-
> > > > >    target/i386/kvm/tdx.c | 24 ++++++++++++++++++++++++
> > > > >    2 files changed, 30 insertions(+), 1 deletion(-)
> > > > > 
> > > > > diff --git a/qapi/qom.json b/qapi/qom.json
> > > > > index 220cc6c98d4b..89ed89b9b46e 100644
> > > > > --- a/qapi/qom.json
> > > > > +++ b/qapi/qom.json
> > > > > @@ -900,10 +900,15 @@
> > > > >    #
> > > > >    # Properties for tdx-guest objects.
> > > > >    #
> > > > > +# @sept-ve-disable: toggle bit 28 of TD attributes to control disabling
> > > > > +#     of EPT violation conversion to #VE on guest TD access of PENDING
> > > > > +#     pages.  Some guest OS (e.g., Linux TD guest) may require this to
> > > > > +#     be set, otherwise they refuse to boot.
> > > > > +#
> > > > >    # Since: 9.0
> > > > >    ##
> > > > >    { 'struct': 'TdxGuestProperties',
> > > > > -  'data': { }}
> > > > > +  'data': { '*sept-ve-disable': 'bool' } }
> > > > 
> > > > So this exposes a single boolean property that gets mapped into one
> > > > specific bit in the TD attributes:
> > > > 
> > > > > +
> > > > > +static void tdx_guest_set_sept_ve_disable(Object *obj, bool value, Error
> > > **errp)
> > > > > +{
> > > > > +    TdxGuest *tdx = TDX_GUEST(obj);
> > > > > +
> > > > > +    if (value) {
> > > > > +        tdx->attributes |= TDX_TD_ATTRIBUTES_SEPT_VE_DISABLE;
> > > > > +    } else {
> > > > > +        tdx->attributes &= ~TDX_TD_ATTRIBUTES_SEPT_VE_DISABLE;
> > > > > +    }
> > > > > +}
> > > > 
> > > > If I look at the documentation for TD attributes
> > > > 
> > > >     https://download.01.org/intel-sgx/latest/dcap-
> > > latest/linux/docs/Intel_TDX_DCAP_Quoting_Library_API.pdf
> > > > 
> > > > Section "A.3.4. TD Attributes"
> > > > 
> > > > I see "TD attributes" is a 64-bit int, with 5 bits currently
> > > > defined "DEBUG", "SEPT_VE_DISABLE", "PKS", "PL", "PERFMON",
> > > > and the rest currently reserved for future use. This makes me
> > > > wonder about our modelling approach into the future ?
> > > > 
> > > > For the AMD SEV equivalent we've just directly exposed the whole
> > > > field as an int:
> > > > 
> > > >        'policy' : 'uint32',
> > > > 
> > > > For the proposed SEV-SNP patches, the same has been done again
> > > > 
> > > > https://lists.nongnu.org/archive/html/qemu-devel/2024-
> > > 06/msg00536.html
> > > > 
> > > >        '*policy': 'uint64',
> > > > 
> > > > 
> > > > The advantage of exposing individual booleans is that it is
> > > > self-documenting at the QAPI level, but the disadvantage is
> > > > that every time we want to expose ability to control a new
> > > > bit in the policy we have to modify QEMU, libvirt, the mgmt
> > > > app above libvirt, and whatever tools the end user has to
> > > > talk to the mgmt app.
> > > > 
> > > > If we expose a policy int, then newly defined bits only require
> > > > a change in QEMU, and everything above QEMU will already be
> > > > capable of setting it.
> > > > 
> > > > In fact if I look at the proposed libvirt patches, they have
> > > > proposed just exposing a policy "int" field in the XML, which
> > > > then has to be unpacked to set the individual QAPI booleans
> > > > 
> > > > 
> > > https://lists.libvirt.org/archives/list/devel@xxxxxxxxxxxxxxxxx/message/WXWX
> > > EESYUA77DP7YIBP55T2OPSVKV5QW/
> > > > 
> > > > On balance, I think it would be better if QEMU just exposed
> > > > the raw TD attributes policy as an uint64 at QAPI, instead
> > > > of trying to unpack it to discrete bool fields. This gives
> > > > consistency with SEV and SEV-SNP, and with what's proposed
> > > > at the libvirt level, and minimizes future changes when
> > > > more policy bits are defined.
> > > 
> > > The reasons why introducing individual bit of sept-ve-disable instead of
> > > a raw TD attribute as a whole are that
> > > 
> > > 1. other bits like perfmon, PKS, KL are associated with cpu properties,
> > > e.g.,
> > > 
> > > 	perfmon -> pmu,
> > > 	pks -> pks,
> > > 	kl -> keylokcer feature that QEMU currently doesn't support
> > > 
> > > If allowing configuring attribute directly, we need to deal with the
> > > inconsistence between attribute vs cpu property.
> > 
> > What about defining those bits associated with cpu properties reserved
> > But other bits work as Daniel suggested way.
> 
> I don't understand. Do you mean we provide the interface to configure raw 64
> bit attributes while some bits of it are reserved?

Just have a mask of what bits are permitted to be set, and report an
error if the user sets non-permitted bits.


With regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|





[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux