Re: [PATCH v19 110/130] KVM: TDX: Handle TDX PV MMIO hypercall

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2024-06-26 at 15:29 +0800, Binbin Wu wrote:
> 
> 
> On 6/26/2024 10:09 AM, Binbin Wu wrote:
> > 
> > 
> > On 6/26/2024 5:09 AM, Edgecombe, Rick P wrote:
> > > On Tue, 2024-06-25 at 14:54 +0800, Binbin Wu wrote:
> > > > > +               gpa = vcpu->mmio_fragments[0].gpa;
> > > > > +               size = vcpu->mmio_fragments[0].len;
> > > > Since MMIO cross page boundary is not allowed according to the input
> > > > checks from TDVMCALL, these mmio_fragments[] is not needed.
> > > > Just use vcpu->run->mmio.phys_addr and vcpu->run->mmio.len?
> > > Can we add a comment or something to that check, on why KVM doesn't 
> > > handle it?
> > > Is it documented somewhere in the TDX ABI that it is not expected to be
> > > supported?
> > TDX GHCI doesn't have such restriction.
> > 
> > According to the reply from Isaku in the below link, I think current 
> > restriction is due to software implementation for simplicity.
> > https://lore.kernel.org/kvm/20240419173423.GD3596705@xxxxxxxxxxxxxxxxxxxxx/ ;
> > 
> > +       /* Disallow MMIO crossing page boundary for simplicity. */
> > +       if (((gpa + size - 1) ^ gpa) & PAGE_MASK)
> >                 goto error;
> > 
> > According to 
> > https://lore.kernel.org/all/165550567214.4207.3700499203810719676.tip-bot2@tip-bot2/
> > ,
> > for Linux as TDX guest, it rejects EPT violation #VEs that split pages 
> > based on the reason "MMIO accesses are supposed to be naturally 
> > aligned and therefore never cross page boundaries" to handle the 
> > load_unaligned_zeropad() case.
> > 
> > I am not sure "MMIO accesses are supposed to be naturally aligned" is 
> > true for all other OS as TDX guest, though.
> > 
> > Any suggestion?

It doesn't seem likely a guest will rely on such MMIO to cause an error, so
should be safe to wait until its needed. Let's leave a comment that it is not
expected to be needed by guests, so just return an error for simplicity.

> > 
> > 
> Had some discussion with Gao, Chao.
> 
> For TDX PV MMIO hypercall, it has got the GPA already.
> I.e, we don't need to worry about case of "contiguous in virtual memory, 
> but not be contiguous in physical memory".

Right, the guest should have to split it into two calls I guess. If the MMIO is
physically contiguous anyway though, a guest could try still to make a request
that spans two page. (assuming there is not some other HW restriction for that
kind of access)

> 
> Also, the size of the PV MMIO access is limited to 1, 2, 4, 8 bytes. No 
> need to be split.
> 
> So, for TDX, there is no need to use vcpu->mmio_fragments[] even if the 
> MMIO access crosses page boundary.
> The check for "Disallow MMIO crossing page boundary" can be removed and 
> no extra fragments handling needed.
> 
> 
Ok, thanks.




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux