[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] xen/x86: allow Dom0 PVH to call XENMEM_exchange


  • To: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • From: Jason Andryuk <jason.andryuk@xxxxxxx>
  • Date: Thu, 1 May 2025 09:44:19 -0400
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BvxN1QaZ8FeuqiatsTUso/7s43/8NUTjJy/bZlCuti0=; b=mYfPBoSdAeSHePQ3GNKemK8oy0R0fPZY2tKnFr7RAIoT8QpW7jDSU8tfe35KLs/0xM+WsoGNeo3wN4YWnFjf7TKi8YCHXwXE9FHmEgEhPclNEJ08gS8Zlre3tcaJosRJwiipLOYj6OQpYiReCns6GEj/waffZLcY0gZTxUC94SrM/TEwj+fD0KIZxGmzwNKqv51KE9C017FDCrs0W/30ykob6qsh5TWeBStWt65UL/QdHnmy/x2GOmrfuQuyBeWjPIEAPCcJ3W2r2IE8pQVAQ4UXX7MhPAuZ8K5SaLseE7EfZtKqRWYo4XxvCTjBp1W6ZPROZi5PfgkRFST91LCHaw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=h0AAttwvV6nPvEk44QKpb5uaLp/jRehAcHzVtsqEEzp3aZjDaH1Ctpz8tEtoMIpuR0ifbM/Fh4nyLxVrNCEW4a7YqcknEqRhPHwKqZ/Ns2rMfBZzFGESSPH27tzx8cctwkYZ3Zja3Q5LWugpDSUl2vax6mfz0Jb9i1uI8KXw4uuauPvtNbi7R0K+Dz9FhiJInznmWb5ySFA4DmlD3l397/yL2OlPCjuIpioqnW9zHGQzsNZr0KXnGbO+trDKtJR+/O2V4m3Veeq5XbGl4ob7SJFqLu8WWDP406EF/yT46qQ/Aj1Yi+/cWjQ0KNPxCZiDc/24VairvcSZTxKgYgOp1A==
  • Cc: Jan Beulich <jbeulich@xxxxxxxx>, "Ragiadakou, Xenia" <Xenia.Ragiadakou@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, <agarciav@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Thu, 01 May 2025 13:44:41 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 2025-04-30 20:19, Stefano Stabellini wrote:
On Wed, 30 Apr 2025, Roger Pau Monné wrote:
On Wed, Apr 30, 2025 at 08:27:55AM +0200, Jan Beulich wrote:
On 29.04.2025 23:52, Stefano Stabellini wrote:
On Tue, 29 Apr 2025, Jan Beulich wrote:
On 28.04.2025 22:00, Stefano Stabellini wrote:
On Mon, 28 Apr 2025, Jan Beulich wrote:
On 25.04.2025 22:19, Stefano Stabellini wrote:

--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -794,7 +794,7 @@ static long 
memory_exchange(XEN_GUEST_HANDLE_PARAM(xen_memory_exchange_t) arg)
              rc = guest_physmap_add_page(d, _gfn(gpfn), mfn,
                                          exch.out.extent_order) ?: rc;
- if ( !paging_mode_translate(d) &&
+            if ( (!paging_mode_translate(d) || is_hardware_domain(d)) &&
                   __copy_mfn_to_guest_offset(exch.out.extent_start,
                                              (i << out_chunk_order) + j,
                                              mfn) )

Wait, no: A PVH domain (Dom0 or not) can't very well make use of MFNs, can
it?

One way or another Dom0 PVH needs to know the MFN to pass it to the
co-processor.

I see. That's pretty odd, though. I'm then further concerned of the order of
the chunks. At present we're rather lax, in permitting PVH and PV Dom0 the
same upper bound. With both CPU and I/O side translation there is, in
principle, no reason to permit any kind of contiguity. Of course there's a
performance aspect, but that hardly matters in the specific case here. Yet at
the same time, once we expose MFNs, contiguity will start mattering as soon
as any piece of memory needs to be larger than PAGE_SIZE. Which means it will
make tightening of the presently lax handling prone to regressions in this
new behavior you're introducing. What chunk size does the PSP driver require?

I don't know. The memory returned by XENMEM_exchange is contiguous,
right? Are you worried that Xen cannot allocate the requested amount of
memory contiguously?

In the case I looked at, it is 8 pages. The driver defines a ring of 32 * 1k entries. I'm not sure if there are other paths or device versions where it might differ.

That would be Dom0's problem then. But really for a translated guest the
exchanged chunks being contiguous shouldn't matter, correctness-wise. That is,
within Xen, rather than failing a request, we could choose to retry using
discontiguous chunks (contiguous only in GFN space). Such an (afaict)
otherwise correct change would break your use case, as it would invalidate the
MFN information passed back. (This fallback approach would similarly apply to
other related mem-ops. It's just that during domain creation the tool stack
has its own fallback, so it may not be of much use right now.)

I think the description in the public header needs to be expanded to
specify what the XENMEM_exchange does for translated guests, and
clearly write down that the underlying MFNs for the exchanged region
will be contiguous.  Possibly a new XENMEMF_ flag needs to be added to
request contiguous physical memory for the new range.

Sadly this also has the side effect of quite likely shattering
superpages for dom0 EPT/NPT, which will result in decreased dom0
performance.

Yes, this appears to happen as memory_exchange seems to always replace the pages. I tested returning the existing MFNs if they are already contiguous since that was sufficient for this driver. It worked, but it was messy. A big loop to copy in the GFN array and check contiguity which duplicated much of the real loop.

We have so far avoided exposing MFNs to HVM/PVH, but I don't see much
way to avoid this if there's no option to use IOMMU or NPT page-tables
with the PSP and we don't want to intercept PSP accesses in Xen and
translate requests on the fly.
Yeah, I think the same way too.

Regards,
Jason



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.