[svsm-devel] [EXTERNAL] Re: EDK2 CAA Page Fragmented Allocation

Gerd Hoffmann kraxel at redhat.com
Thu May 22 10:37:44 CEST 2025


On Wed, May 21, 2025 at 09:16:07AM -0700, Adam Dunlap wrote:
> On Wed, May 21, 2025, 4:20 AM Gerd Hoffmann <kraxel at redhat.com> wrote:
> > There is no trace of any explicit PVALIDATE calls.  So I'm wondering
> > what conditions might cause the VMM do actions like that?
> >
> > One possibly relevant detail is that the linux kernel and the uefi
> > runtime use different mappings and different virtual addresses to
> > access the caa page.
> 
> If the guest accesses a GPA with the c-bit disabled, then KVM will
> rmpupdate that page to shared. If the guest then accesses the same GPA
> with the c-bit enabled, then KVM will rmpupdate it back to private,
> but it will be unaccepted and thus give the 0x404 error. I've seen
> this happen while investigating several different bugs.

And this is what happened here too.  The kernel mapping had the c-bit,
the uefi mapping not.  With that fixed the kernel continues booting,
then traps into the next problem.  So more debugging ...

thanks & take care,
  Gerd



More information about the Svsm-devel mailing list