Commit 019b383d authored by Dexuan Cui's avatar Dexuan Cui Committed by Dave Hansen

x86/tdx: Retry partially-completed page conversion hypercalls

TDX guest memory is private by default and the VMM may not access it.
However, in cases where the guest needs to share data with the VMM,
the guest and the VMM can coordinate to make memory shared between
them.

The guest side of this protocol includes the "MapGPA" hypercall.  This
call takes a guest physical address range.  The hypercall spec (aka.
the GHCI) says that the MapGPA call is allowed to return partial
progress in mapping this range and indicate that fact with a special
error code.  A guest that sees such partial progress is expected to
retry the operation for the portion of the address range that was not
completed.

Hyper-V does this partial completion dance when set_memory_decrypted()
is called to "decrypt" swiotlb bounce buffers that can be up to 1GB
in size.  It is evidently the only VMM that does this, which is why
nobody noticed this until now.

[ dhansen: rewrite changelog ]
Signed-off-by: default avatarDexuan Cui <decui@microsoft.com>
Signed-off-by: default avatarDave Hansen <dave.hansen@linux.intel.com>
Reviewed-by: default avatarMichael Kelley <mikelley@microsoft.com>
Reviewed-by: default avatarKuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@linux.intel.com>
Acked-by: default avatarKirill A. Shutemov <kirill.shutemov@linux.intel.com>
Link: https://lore.kernel.org/all/20230811021246.821-2-decui%40microsoft.com
parent 0bb80ecc
...@@ -703,14 +703,15 @@ static bool tdx_cache_flush_required(void) ...@@ -703,14 +703,15 @@ static bool tdx_cache_flush_required(void)
} }
/* /*
* Inform the VMM of the guest's intent for this physical page: shared with * Notify the VMM about page mapping conversion. More info about ABI
* the VMM or private to the guest. The VMM is expected to change its mapping * can be found in TDX Guest-Host-Communication Interface (GHCI),
* of the page in response. * section "TDG.VP.VMCALL<MapGPA>".
*/ */
static bool tdx_enc_status_changed(unsigned long vaddr, int numpages, bool enc) static bool tdx_map_gpa(phys_addr_t start, phys_addr_t end, bool enc)
{ {
phys_addr_t start = __pa(vaddr); /* Retrying the hypercall a second time should succeed; use 3 just in case */
phys_addr_t end = __pa(vaddr + numpages * PAGE_SIZE); const int max_retries_per_page = 3;
int retry_count = 0;
if (!enc) { if (!enc) {
/* Set the shared (decrypted) bits: */ /* Set the shared (decrypted) bits: */
...@@ -718,12 +719,51 @@ static bool tdx_enc_status_changed(unsigned long vaddr, int numpages, bool enc) ...@@ -718,12 +719,51 @@ static bool tdx_enc_status_changed(unsigned long vaddr, int numpages, bool enc)
end |= cc_mkdec(0); end |= cc_mkdec(0);
} }
/* while (retry_count < max_retries_per_page) {
* Notify the VMM about page mapping conversion. More info about ABI struct tdx_hypercall_args args = {
* can be found in TDX Guest-Host-Communication Interface (GHCI), .r10 = TDX_HYPERCALL_STANDARD,
* section "TDG.VP.VMCALL<MapGPA>" .r11 = TDVMCALL_MAP_GPA,
*/ .r12 = start,
if (_tdx_hypercall(TDVMCALL_MAP_GPA, start, end - start, 0, 0)) .r13 = end - start };
u64 map_fail_paddr;
u64 ret = __tdx_hypercall_ret(&args);
if (ret != TDVMCALL_STATUS_RETRY)
return !ret;
/*
* The guest must retry the operation for the pages in the
* region starting at the GPA specified in R11. R11 comes
* from the untrusted VMM. Sanity check it.
*/
map_fail_paddr = args.r11;
if (map_fail_paddr < start || map_fail_paddr >= end)
return false;
/* "Consume" a retry without forward progress */
if (map_fail_paddr == start) {
retry_count++;
continue;
}
start = map_fail_paddr;
retry_count = 0;
}
return false;
}
/*
* Inform the VMM of the guest's intent for this physical page: shared with
* the VMM or private to the guest. The VMM is expected to change its mapping
* of the page in response.
*/
static bool tdx_enc_status_changed(unsigned long vaddr, int numpages, bool enc)
{
phys_addr_t start = __pa(vaddr);
phys_addr_t end = __pa(vaddr + numpages * PAGE_SIZE);
if (!tdx_map_gpa(start, end, enc))
return false; return false;
/* shared->private conversion requires memory to be accepted before use */ /* shared->private conversion requires memory to be accepted before use */
......
...@@ -24,6 +24,8 @@ ...@@ -24,6 +24,8 @@
#define TDVMCALL_MAP_GPA 0x10001 #define TDVMCALL_MAP_GPA 0x10001
#define TDVMCALL_REPORT_FATAL_ERROR 0x10003 #define TDVMCALL_REPORT_FATAL_ERROR 0x10003
#define TDVMCALL_STATUS_RETRY 1
#ifndef __ASSEMBLY__ #ifndef __ASSEMBLY__
/* /*
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment