[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: privcmd.c not calling set_phys_to_machine


  • To: Juergen Gross <jgross@xxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "boris.ostrovsky@xxxxxxxxxx" <boris.ostrovsky@xxxxxxxxxx>
  • From: "NK, JESHWANTHKUMAR (JESHWANTH KUMAR)" <JESHWANTHKUMAR.NK@xxxxxxx>
  • Date: Mon, 17 Oct 2022 14:09:01 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1HPPNHf2pilwiFiyaraxvdFEuOe9FSEUTnUIubE2b8o=; b=K7UTMuOjByyugTOcmeMnOK9HMNiu9ZmRLIJgX+SoeKdHHfs/MNUql2wlP/+GyBQAOqzR+VwGiEwkDI23gN9+UHo3nAnBIJs75CGF/GbLazLq8t3ugG4JYSNk1ac3h0tH7wJHbzk6CGiAXobAuY/4jLtFC2PrOyc2mYcn2NTA6056H4Icy5a4l6+XC/Ulv9rfMeOYPfpPgEiqBBO12LGPOjzncVXkVnBav1yPOv9yqEW1MCPjMruUfdkvj6nM6Ucbm2xG7mxjtu6R2qYdHDWS4GQSYA1kw5rx4XUo9qO/ut1ADtnI/XRUWkxhyEaz+TWqn0W1skKFUUM5xaMki69pHA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=oBYx0odbknFAAH3fgsHA96NmUaVcQFn2dTTVXrv05ON/A+Z7XMoXnXUDw/m/XZIm5nsQEDPB6GRJ5BqBrV16kCKM32gz8tGCPGYjAwQkTCdqSRV2yjqG8Zf90r7yTve2HNquSNSKAX9b04maxRE1S0yNkMVMpc1f3bOkrN1cZXHMCojAuF10i4g76xKDmsweAW0tKMllxi7ixEZuPN7WlOOpDcUwAgkvaeQeoI6hIfjjY0jrkla2yf5jYAWKfu25QsJ5rGbNZ6qxl8nGR9KN+36rRCFK4qcnm8F1osg+OwxPuHfYQW4cSNPYuvHIrnmdd2M+c7KPJBQCYw3EunckOw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com;
  • Cc: "jbeulich@xxxxxxxx" <jbeulich@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "Thomas, Rijo-john" <Rijo-john.Thomas@xxxxxxx>, "Rangasamy, Devaraj" <Devaraj.Rangasamy@xxxxxxx>, "SK, SivaSangeetha (Siva Sangeetha)" <SivaSangeetha.SK@xxxxxxx>
  • Delivery-date: Mon, 17 Oct 2022 14:09:12 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Msip_label_4342314e-0df4-4b58-84bf-38bed6170a0f_actionid: adaf20a8-6c47-4db1-a700-9eb96fb013d5
  • Msip_label_4342314e-0df4-4b58-84bf-38bed6170a0f_contentbits: 0
  • Msip_label_4342314e-0df4-4b58-84bf-38bed6170a0f_enabled: true
  • Msip_label_4342314e-0df4-4b58-84bf-38bed6170a0f_method: Standard
  • Msip_label_4342314e-0df4-4b58-84bf-38bed6170a0f_name: General
  • Msip_label_4342314e-0df4-4b58-84bf-38bed6170a0f_setdate: 2022-10-17T14:08:56Z
  • Msip_label_4342314e-0df4-4b58-84bf-38bed6170a0f_siteid: 3dd8961f-e488-4e60-8e11-a82d994e183d
  • Msip_labels: MSIP_Label_4342314e-0df4-4b58-84bf-38bed6170a0f_Enabled=true; MSIP_Label_4342314e-0df4-4b58-84bf-38bed6170a0f_SetDate=2022-10-17T13:29:52Z; MSIP_Label_4342314e-0df4-4b58-84bf-38bed6170a0f_Method=Standard; MSIP_Label_4342314e-0df4-4b58-84bf-38bed6170a0f_Name=General; MSIP_Label_4342314e-0df4-4b58-84bf-38bed6170a0f_SiteId=3dd8961f-e488-4e60-8e11-a82d994e183d; MSIP_Label_4342314e-0df4-4b58-84bf-38bed6170a0f_ActionId=0c274a3c-e8a0-48b9-9b7c-17bd7c41fc03; MSIP_Label_4342314e-0df4-4b58-84bf-38bed6170a0f_ContentBits=1
  • Thread-index: AQHY4BCJ7DwxaYBeYEW9c+uqhEENDa4SLiEAgABq0VA=
  • Thread-topic: privcmd.c not calling set_phys_to_machine

[AMD Official Use Only - General]

Hi Juergen,

>> I'm rather sure "AMD TEE driver get the list of pages corresponding to the 
>> virtual address" is the problem. The PTEs should have the "special" flag 
>> set, meaning that there is no struct page associated with this virtual area.

Yes, you are right, Today I have observed that pages returning from 
"pin_user_pages_fast() - 
https://elixir.bootlin.com/linux/v5.16/source/drivers/tee/tee_shm.c#L196"; is 
zero.  (shm->pages[0] is zero, when shm->num_pages is 1).


Regards,
Jeshwanth

-----Original Message-----
From: Juergen Gross <jgross@xxxxxxxx>
Sent: Monday, October 17, 2022 12:38 PM
To: Stefano Stabellini <sstabellini@xxxxxxxxxx>; boris.ostrovsky@xxxxxxxxxx
Cc: jbeulich@xxxxxxxx; xen-devel@xxxxxxxxxxxxxxxxxxxx; NK, JESHWANTHKUMAR 
(JESHWANTH KUMAR) <JESHWANTHKUMAR.NK@xxxxxxx>
Subject: Re: privcmd.c not calling set_phys_to_machine

On 14.10.22 23:04, Stefano Stabellini wrote:
> Hi Juergen and all,
> 
> I am writing again to ask a question about privcmd.c in PV dom0 x86.
> This is related to the previous pin_user_pages_fast issue:
> 
> https://marc.info/?l=xen-devel&m=166268914727630
> https://marc.info/?l=xen-devel&m=166322385912052
> 
> 
> In summary this is the situation:
> 
> 1. domU (HVM) kernel space:
>      a. pages allocation with get_free_pages()
>      b. get dma_handle by calling dma_map_page() on the pages allocated in 
> (1.a)
>      c. send dma_handle to dom0 (PV) using virtio queue
> 
> 2. dom0 userspace (QEMU):
>          a. read dma_handle from virtio queue
>          b. map dma_handle using QEMU dma_memory_map(), which calls
>             xenforeignmemory_map2, which is IOCTL_PRIVCMD_MMAPBATCH_V2,
>             which ends up calling 
> drivers/xen/privcmd.c:privcmd_ioctl_mmap_batch
>             [this is verified to work correctly, the mapping works]
>          c. open /dev/tee node and make an ioctl call to register the
>             virtual address (from step 2.b) with TEE.
> 
> 3. dom0 kernel space:
>          a. AMD TEE driver get the virtual address passed by userspace
>          b. AMD TEE driver get the list of pages corresponding to the
>             virtual address (3.a) and calls dma_map_page() on them

I'm rather sure "AMD TEE driver get the list of pages corresponding to the 
virtual address" is the problem. The PTEs should have the "special" flag set, 
meaning that there is no struct page associated with this virtual area.

> The last step (3.b) misbehaves as dev_addr at the beginning of 
> xen_swiotlb_map_page (which implements dma_map_page() in dom)) is 0.
> 
>    dma_addr_t dev_addr = xen_phys_to_dma(dev, phys);
>    /* dev_addr here is zero */
> 
> 
> Could it be that the original mapping of the foreign pages in Dom0, 
> done by step 2.b, is not complete? Looking into 
> privcmd_ioctl_mmap_batch, for PV guests, it is calling mmap_batch_fn:
> 
>       BUG_ON(traverse_pages_block(m.num, sizeof(xen_pfn_t),
>                                   &pagelist, mmap_batch_fn, &state));
> 
> mmap_batch_fn calls xen_remap_domain_gfn_array, which calls 
> xen_remap_pfn.
> 
> xen_remap_pfn only changes the VA->PA mapping and does nothing else.
> Specifically, nobody seems to call set_phys_to_machine in this code 
> path. Isn't set_phys_to_machine required?

Not for special memory pages.

> Don't we need a call to set_phys_to_machine so that the next time a 
> driver tries to call:
> 
>    /* address is the virtual address passed by QEMU userspace */
>    dma_map_page(virt_to_page(address))
> 
> it will behave correctly? Or am I missing something?
> 
> 
> How is xen_phys_to_dma expected to work correctly for:
> 
>    /* address is the virtual address passed by QEMU userspace and mapped
>     * in 2.b */
>    phys_addr = virt_to_phys(address);
>    xen_phys_to_dma(dev, phys_addr);
> 
> 
> My guess would be that we need to add:
> 
>    set_phys_to_machine(pfn, FOREIGN_FRAME(mfn));
> 
> in mmap_batch_fn or xen_remap_pfn?

I think this might be a little bit more complicated.

This could work, if there is really a struct page available for the PFN.
OTOH this might be not the case quite often, as we are using zone device memory 
for foreign mappings per default for some time now.

Solving this might require something like dma_map_pfn() instead of 
dma_map_page(), which sounds a little bit like dma_direct_mmap().


Juergen

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.