Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1679754ybz; Thu, 30 Apr 2020 03:41:37 -0700 (PDT) X-Google-Smtp-Source: APiQypIGIPPHnlXEYdFaPCsnyZXNOMF+ApbcHtuJWyKjZveKE92T1xRDcnp6Lt9cY8VuTNieChn7 X-Received: by 2002:a17:906:359b:: with SMTP id o27mr2120343ejb.282.1588243296778; Thu, 30 Apr 2020 03:41:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588243296; cv=none; d=google.com; s=arc-20160816; b=wVBHYVnDRzaHFcGT+pDaQtXF8UYjuf0jjtoLCUqsoQrP+HlAm+/dGcv4IpngMGBHwG wDX4sVmRzGGtshPnif/LNkhbhqSa5YZOVOCEDonNzxSPbX4RKcItV2terVIqIq0iF+OU fg4/+s5g0iJYY3Uiwn5/pnrIS5yQp9TV7jLqSBtxEgpgvpvyUttpXD3IUSe9dHFOh0cK lLi2yg4KO60QjYayZAgM1tAN6c6B9fWQII8K0mbAmzn19xVoaKTo9wDqgwkAw0awJzEE pSspFgxvNPa6sicLQF5lNhvVBqxahnUV7jgICIVMvwCmUhoNoFmCq3eKzx4DZ9eDmoNl H0Uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=Wwy3ajm1CGXSZNrawN8oHgQa2MPr+4JtQoG4S8cf+fE=; b=ENWV+YCpa+5ejDX27YGfZ7WGua6xA9wGILe41SfnRd1thcU3eycPEMmDUCFtOKWBvB 5VM24p74jkwYYKj+fxhVxWx523eYKVkesWBCV/1hfI2dd6bQfUubzrxG4HUw2WgSkCV9 /82Zlhkzcm7WDujNdUO/Ndq9WrzYpiijY6TV7J9QhRI6VRYXJm0jJO9+6xzRVlg2sp8V L0OB2uZrpj07qqjb6JTGJT0/82pi5WEZH02ieYEh/wjI0j6SN7VbhB5Xv6ZRK0LridFg rRq0O9FGJWFiOwd02AghMeKPeePSNY5WYl1AdK8ewhidItYjXevyrQBBUpTbPzJIy/sz eqCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=j4ZaDYWl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rh26si5560083ejb.81.2020.04.30.03.41.12; Thu, 30 Apr 2020 03:41:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=j4ZaDYWl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726783AbgD3KjZ (ORCPT + 99 others); Thu, 30 Apr 2020 06:39:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:55854 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726427AbgD3KjZ (ORCPT ); Thu, 30 Apr 2020 06:39:25 -0400 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A3CF920838; Thu, 30 Apr 2020 10:39:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588243164; bh=6+7qBBamWTT9w7zClGZROm5AeCOL7MN9qOqe5yevm90=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=j4ZaDYWlFfnjJ0Kk6dtybxWMdijfCyiwyxZsPRioDIEIjW2Pq/Kffjmqjr3+J0Ejl JR4YgwOGru7gDKzTHRc+/mOOsVLTS5ejWCp0tS62mKzaXXuC93LMhd13Rxno4+GTvA qmCLkIDor0yLvS+hxfn7Nw42bPZSZSdBu25gx7Rk= Date: Thu, 30 Apr 2020 11:39:19 +0100 From: Will Deacon To: Srivatsa Vaddagiri Cc: konrad.wilk@oracle.com, mst@redhat.com, jasowang@redhat.com, jan.kiszka@siemens.com, stefano.stabellini@xilinx.com, iommu@lists.linux-foundation.org, virtualization@lists.linux-foundation.org, virtio-dev@lists.oasis-open.org, tsoni@codeaurora.org, pratikp@codeaurora.org, christoffer.dall@arm.com, alex.bennee@linaro.org, linux-kernel@vger.kernel.org Subject: Re: [RFC/PATCH 0/1] virtio_mmio: hypervisor specific interfaces for MMIO Message-ID: <20200430103919.GF19932@willie-the-truck> References: <1588240976-10213-1-git-send-email-vatsa@codeaurora.org> <20200430100821.GC19932@willie-the-truck> <20200430102939.GG5097@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200430102939.GG5097@quicinc.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Vatsa, On Thu, Apr 30, 2020 at 03:59:39PM +0530, Srivatsa Vaddagiri wrote: > * Will Deacon [2020-04-30 11:08:22]: > > > > This patch is meant to seek comments. If its considered to be in right > > > direction, will work on making it more complete and send the next version! > > > > What's stopping you from implementing the trapping support in the > > hypervisor? Unlike the other patches you sent out, where the guest memory > > is not accessible to the host, there doesn't seem to be any advantage to > > not having trapping support, or am I missing something here? > > I have had this discussion with hypervisor folks. They seem to be > concerned about complexity of having a VM's fault be handled in another > untrusted VM. They are not keen to add MMIO support. Right, but I'm concerned about forking the implementation from the spec and I'm not keen to add these hooks ;) What does your hook actually do? I'm assuming an HVC? If so, then where the fault is handled seems to be unrelated and whether the guest exit is due to an HVC or a stage-2 fault should be immaterial. In other words, I don't follow why the trapping mechanism necessitates the way in which the fault is handled. Will