Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp311828pxf; Thu, 11 Mar 2021 04:38:25 -0800 (PST) X-Google-Smtp-Source: ABdhPJz7FoRNLa9uyYKCVjkTODiK5basV8AFHy9eO/lnpJIJiv+v94esNNc5E68WO5vvBQ5j1YNG X-Received: by 2002:a17:906:a2d3:: with SMTP id by19mr2853074ejb.98.1615466305207; Thu, 11 Mar 2021 04:38:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615466305; cv=none; d=google.com; s=arc-20160816; b=oim9UeQ3ZVWXp2JdMuS2AY2JcSAtSGIL28NTlnl8kV96FbE8XwH3RiYv25gwOmjcYx ECMhf8TEQrWr43wl0rp6ZCRk+8WcSIxkfEN/CwpbF88RcivEDnTUvZe996DVL93BXPCN pnVd6jlButfj32buL+c1GzWUbmU/fmxLLPrdEAq409odhvSM5Q40pRJ8wds2cOIva3yR 6XiIhoIPqNMjyumU5CxzRfvE1wlpy119g1JeXjcsbKMuoXoh5PR2gkcTEgTk5HJBhd6V JqAHn5XH6E3eQP16iYexjhU5X8QcJyMLystoqEWGpyiuxzZRQIrNTFRadK4ozKc39mjP v14Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=LsU6oCCDYpBAYgO1FIeBt8mHVeIZ9J/RPFrQjHtzlp8=; b=RphrD5Fyv1/b/F7jX75KF/rrAmWiAC5G9l/efNvCp6sqbPKbRDIjbGn0e+6CXZAw68 ITabriBjGLkFGLoIdpiJ+zeTeicV4JP86QvGfQ/vwCs6ZryoTxnGeiVODcnxiQcwOL5U hOMfqqQj/0ElUy5vbbHb4FVM539BwbMyzZbaVcU5GhMtGdViVrLpGE55+cSQoZieagQr x3+N8PU84dt+iLr8Yu9vzq6FBAT50vSS66xrbu4yCb+3gvKRogjKFNALX6Dm5TpSh2pC 42QYQ1adNmUJOompx3ouTp20ZC71LzljLWoDHbgu0JoStZuceT/YCqCelFaSewgN3rMA /ckQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kw15si1622589ejc.217.2021.03.11.04.38.02; Thu, 11 Mar 2021 04:38:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232828AbhCKMeu (ORCPT + 99 others); Thu, 11 Mar 2021 07:34:50 -0500 Received: from foss.arm.com ([217.140.110.172]:34874 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233082AbhCKMeg (ORCPT ); Thu, 11 Mar 2021 07:34:36 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9572AED1; Thu, 11 Mar 2021 04:34:35 -0800 (PST) Received: from [192.168.1.179] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 074673F793; Thu, 11 Mar 2021 04:34:32 -0800 (PST) Subject: Re: [PATCH v9 6/6] KVM: arm64: Document MTE capability and ioctl To: Peter Maydell Cc: Catalin Marinas , Marc Zyngier , Will Deacon , James Morse , Julien Thierry , Suzuki K Poulose , kvmarm , arm-mail-list , lkml - Kernel Mailing List , Dave Martin , Mark Rutland , Thomas Gleixner , QEMU Developers , Juan Quintela , "Dr. David Alan Gilbert" , Richard Henderson , Haibo Xu , Andrew Jones References: <20210301142315.30920-1-steven.price@arm.com> <20210301142315.30920-7-steven.price@arm.com> From: Steven Price Message-ID: <1ea52603-2e99-1e81-92b3-0e14cf1e2d1e@arm.com> Date: Thu, 11 Mar 2021 12:35:22 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/03/2021 11:01, Peter Maydell wrote: > On Mon, 1 Mar 2021 at 14:23, Steven Price wrote: >> >> A new capability (KVM_CAP_ARM_MTE) identifies that the kernel supports >> granting a guest access to the tags, and provides a mechanism for the >> VMM to enable it. >> >> A new ioctl (KVM_ARM_MTE_COPY_TAGS) provides a simple way for a VMM to >> access the tags of a guest without having to maintain a PROT_MTE mapping >> in userspace. The above capability gates access to the ioctl. >> >> Signed-off-by: Steven Price >> --- >> Documentation/virt/kvm/api.rst | 37 ++++++++++++++++++++++++++++++++++ >> 1 file changed, 37 insertions(+) >> >> diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst >> index aed52b0fc16e..1406ea138127 100644 >> --- a/Documentation/virt/kvm/api.rst >> +++ b/Documentation/virt/kvm/api.rst >> @@ -4939,6 +4939,23 @@ KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO >> Allows Xen vCPU attributes to be read. For the structure and types, >> see KVM_XEN_VCPU_SET_ATTR above. >> >> +4.131 KVM_ARM_MTE_COPY_TAGS >> +--------------------------- >> + >> +:Capability: KVM_CAP_ARM_MTE >> +:Architectures: arm64 >> +:Type: vm ioctl >> +:Parameters: struct kvm_arm_copy_mte_tags >> +:Returns: 0 on success, < 0 on error >> + >> +Copies Memory Tagging Extension (MTE) tags to/from guest tag memory. > > Mostly virt/kvm/api.rst seems to include documentation of the > associated structs, something like: > > :: > > struct kvm_arm_copy_mte_tags { > __u64 guest_ipa; > __u64 length; > union { > void __user *addr; > __u64 padding; > }; > __u64 flags; > }; > > > which saves the reader having to cross-reference against the header file. Good point - I'll add that. > It also means you can more naturally use the actual field names in the doc, > eg: > >> +The >> +starting address and length of guest memory must be ``PAGE_SIZE`` aligned. > > you could say "The guest_ipa and length fields" here. > > Also "The addr field must point to a buffer which the tags will > be copied to or from." I assume. Indeed - I'll add the clarification. >> +The size of the buffer to store the tags is ``(length / MTE_GRANULE_SIZE)`` >> +bytes (i.e. 1/16th of the corresponding size). > >> + Each byte contains a single tag >> +value. This matches the format of ``PTRACE_PEEKMTETAGS`` and >> +``PTRACE_POKEMTETAGS``. > > What are the valid values for 'flags' ? It looks like they specify which > direction the copy is, which we definitely need to document here. Yes either KVM_ARM_TAGS_TO_GUEST or KVM_ARM_TAGS_FROM_GUEST - again I'll clarify that. > What happens if the caller requests a tag copy for an area of guest > address space which doesn't have tags (eg it has nothing mapped), > or for an area of guest addres space which has tags in some parts > but not in others ? Guest memory either exists (and has tags) or doesn't exist (assuming MTE is enabled for the guest). So the cases this can fail are: * The region isn't completely covered with memslots * The region isn't completely writable (and KVM_ARM_TAGS_TO_GUEST is specified). * User space doesn't have access to the memory (i.e. the memory would SIGSEGV or similar if the VMM accessed it). Currently all the above produce the error -ENOENT, which now I come to enumerate the cases doesn't seem like a great error code (it's really only appropriate for the first)! Perhaps -EFAULT would be better. >> + >> 5. The kvm_run structure >> ======================== >> >> @@ -6227,6 +6244,25 @@ KVM_RUN_BUS_LOCK flag is used to distinguish between them. >> This capability can be used to check / enable 2nd DAWR feature provided >> by POWER10 processor. >> >> +7.23 KVM_CAP_ARM_MTE >> +-------------------- >> + >> +:Architectures: arm64 >> +:Parameters: none >> + >> +This capability indicates that KVM (and the hardware) supports exposing the >> +Memory Tagging Extensions (MTE) to the guest. It must also be enabled by the >> +VMM before the guest will be granted access. >> + >> +When enabled the guest is able to access tags associated with any memory given >> +to the guest. KVM will ensure that the pages are flagged ``PG_mte_tagged`` so >> +that the tags are maintained during swap or hibernation of the host, however > > s/,/;/ Yep >> +the VMM needs to manually save/restore the tags as appropriate if the VM is >> +migrated. >> + >> +When enabled the VMM may make use of the ``KVM_ARM_MTE_COPY_TAGS`` ioctl to >> +perform a bulk copy of tags to/from the guest > > "guest." Good spot. >> + >> 8. Other capabilities. >> ====================== >> >> @@ -6716,3 +6752,4 @@ KVM_XEN_HVM_SET_ATTR, KVM_XEN_HVM_GET_ATTR, KVM_XEN_VCPU_SET_ATTR and >> KVM_XEN_VCPU_GET_ATTR ioctls, as well as the delivery of exception vectors >> for event channel upcalls when the evtchn_upcall_pending field of a vcpu's >> vcpu_info is set. >> + >> -- >> 2.20.1 > > > Stray whitespace change ? Not sure how that got there - but will remove. Thanks, Steve