[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] xen/x86: allow Dom0 PVH to call XENMEM_exchange
On Thu, May 08, 2025 at 11:12:34AM +0200, Roger Pau Monné wrote: > On Wed, May 07, 2025 at 04:02:11PM -0700, Stefano Stabellini wrote: > > On Tue, 6 May 2025, Roger Pau Monné wrote: > > > On Mon, May 05, 2025 at 11:11:10AM -0700, Stefano Stabellini wrote: > > > > On Mon, 5 May 2025, Roger Pau Monné wrote: > > > > > On Mon, May 05, 2025 at 12:40:18PM +0200, Marek Marczykowski-Górecki > > > > > wrote: > > > > > > On Mon, Apr 28, 2025 at 01:00:01PM -0700, Stefano Stabellini wrote: > > > > > > > On Mon, 28 Apr 2025, Jan Beulich wrote: > > > > > > > > On 25.04.2025 22:19, Stefano Stabellini wrote: > > > > > > > > > From: Xenia Ragiadakou <Xenia.Ragiadakou@xxxxxxx> > > > > > > > > > > > > > > > > > > Dom0 PVH might need XENMEM_exchange when passing contiguous > > > > > > > > > memory > > > > > > > > > addresses to firmware or co-processors not behind an IOMMU. > > > > > > > > > > > > > > > > I definitely don't understand the firmware part: It's subject > > > > > > > > to the > > > > > > > > same transparent P2M translations as the rest of the VM; it's > > > > > > > > just > > > > > > > > another piece of software running there. > > > > > > > > > > > > > > > > "Co-processors not behind an IOMMU" is also interesting; a more > > > > > > > > concrete scenario might be nice, yet I realize you may be > > > > > > > > limited in > > > > > > > > what you're allowed to say. > > > > > > > > > > > > > > Sure. On AMD x86 platforms there is a co-processor called PSP > > > > > > > running > > > > > > > TEE firmware. The PSP is not behind an IOMMU. Dom0 needs > > > > > > > occasionally to > > > > > > > pass addresses to it. See drivers/tee/amdtee/ and > > > > > > > include/linux/psp-tee.h in Linux. > > > > > > > > > > > > We had (have?) similar issue with amdgpu (for integrated graphics) > > > > > > - it > > > > > > uses PSP for loading its firmware. With PV dom0 there is a > > > > > > workaround as > > > > > > dom0 kinda knows MFN. I haven't tried PVH dom0 on such system yet, > > > > > > but I > > > > > > expect troubles (BTW, hw1 aka zen2 gitlab runner has amdgpu, and > > > > > > it's > > > > > > the one I used for debugging this issue). > > > > > > > > > > That's ugly, and problematic when used in conjunction with AMD-SEV. > > > > > > > > > > I wonder if Xen could emulate/mediate some parts of the PSP for dom0 > > > > > to use, while allowing Xen to be the sole owner of the device. Having > > > > > both Xen and dom0 use it (for different purposes) seems like asking > > > > > for trouble. But I also have no idea how complex the PSP interface > > > > > is, neither whether it would be feasible to emulate the > > > > > interfaces/registers needed for firmware loading. > > > > > > > > Let me take a step back from the PSP for a moment. I am not opposed to a > > > > PSP mediator in Xen, but I want to emphasize that the issue is more > > > > general and extends well beyond the PSP. > > > > > > > > In my years working in embedded systems, I have consistently seen cases > > > > where Dom0 needs to communicate with something that does not go through > > > > the IOMMU. This could be due to special firmware on a co-processor, a > > > > hardware erratum that prevents proper IOMMU usage, or a high-bandwidth > > > > device that technically supports the IOMMU but performs poorly unless > > > > the IOMMU is disabled. All of these are real-world examples that I have > > > > seen personally. > > > > > > I wouldn't be surprised, classic PV dom0 avoided those issues because > > > it was dealing directly with host addresses (mfns), but that's not the > > > case with PVH dom0. > > > > Yeah > > > > > > > > In my opinion, we definitely need a solution like this patch for Dom0 > > > > PVH to function correctly in all scenarios. > > > > > > I'm not opposed to having such interface available for PVH hardware > > > domains. I find it ugly, but I don't see much other way to deal with > > > those kind of "devices". Xen mediating accesses for each one of them > > > is unlikely to be doable. > > > > > > How do you hook this exchange interface into Linux to differentiate > > > which drivers need to use mfns when interacting with the hardware? > > > > In the specific case we have at hands the driver is in Linux userspace > > and is specially-written for our use case. It is not generic, so we > > don't have this problem. But your question is valid. > > Oh, so you then have some kind of ioctl interface that does the memory > exchange and bouncing inside of the kernel on behalf of the user-space > side I would think? > > > In Linux, the issue is hidden behind drivers/xen/swiotlb-xen.c and > > xen_arch_need_swiotlb. There are a few options: > > - force swiotlb bounce for everything on the problematic SoC > > - edit xen_arch_need_swiotlb to return true for the problematic device > > - introduce a kernel command line option to specify which device > > xen_arch_need_swiotlb should return true for > > Isn't it a bit misleading to use the swiotlb for this purpose? Won't > this usage of the swiotlb (to bounce from gfns to mfns) create issues > if there's any devices that have a DMA physical address limitation and > also needs to use the swiotlb while being behind the IOMMU? > > > - introduce an ACPI table with the relevant info > > Hm, best option might be an ACPI table so that Xen can signal to the > hardware domain whether communication with the device must be done > using mfns, or if accesses are mediated and hence can be done using > gfns? How does it work on native when some devices are not behind IOMMU? Is it signaled via an ACPI table? It feels like it's a similar (although not the same) situation here. > It's a bit cumbersome however to have to resort to an ACPI table just > for this. Not sure whether we could expand one of the existing tables > already under Xen control (STAO?) to contain this information. It all > looks a bit ad-hoc. > > I think we need some kind of list of devices that are not behind the > IOMMU, but I have no idea what URI to use to identify those. I assume > the PSP doesn't have a PCI SBDF (as it's not on the PCI bus?). Maybe > by ACPI path? It is actually on the PCI bus: 05:00.2 Encryption controller [1080]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 10h-1fh) Platform Security Processor [1022:15df] > Or maybe it's fine to always communicate with those non-translated > devices using MFNs, and even if we later add some kind of PSP > mediation (so that both Xen and dom0 can use it), accesses by dom0 > will still be assumed to be using MFNs, and thus need no translation. -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab Attachment:
signature.asc
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |