Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp4598768pxv; Tue, 27 Jul 2021 11:12:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzOLLiS3Mgbj37bMclUcx9heWLtYUCSsAcX6CBNDsmuRTNdeNLEQczITBYaBNS6Ow3iCjJn X-Received: by 2002:a02:85a5:: with SMTP id d34mr22357845jai.132.1627409566542; Tue, 27 Jul 2021 11:12:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627409566; cv=none; d=google.com; s=arc-20160816; b=HSH2ACP8Q31rqHjt6id3FuD3ja7msndQVvTt9SIZcuH7swgxQnNIm3K+vHj0z4yPiz kMaJR2z7Belylgl+h263RmmW+vnkYz0hpY3AUvGvAbDiER1gu1GsGhryEv5VuzReygyE JnU5goRuU3VTICf7LclBkKNB2GOmm7Z7oQM33CrQAFq0fNnK30VcD3+UPLFNfHXVzPhg d9wPmg9l9j/45gz1jlA7lcU1FdaEvqMRmswYIXIuYjtu6IyOFB0Hnb4qDWAcyQ+V/6gD n8PgnF9XdIsEV3FMtBO05racpiF9oGhhn6+gfSjvQX3hvlD5gNdtqCnrI7yqgr962sOn LnTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=k9er6scVUHZzGjHB2MdL4OH5EV1yxOU3KlwM4PZ6TBM=; b=qGumIAH7DEvGwMrapFwRV92oD8D6t4kmN0DN6kEzSLzGqnAJDffxzaXBaJxcJBV7uE 4wP4Twkm8L/4IvJp53I4jYDPYlWW9+n2LBEkunZl5P+wYDJDYwV5iaVwj/KOHzrhj8Af u6mCT76OVLZupysAb6eZKal1QXpZbOYBSsrDG2K7Lc1w9+kH7n9o+gMUtb6FHEOf8FJy WYfem8FDbXCoL6ahIhYve/nue4AKCMX1hIi2zI+5ErwE0s7nWQpmAxkshQncjYQIGo51 k/+6DyXA6Vy+RXwCaefgiM5T8NtVCjWRN9evEa3PfeEbKz9A+Fc6IgXXNxRcq+VTlvRe kT9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=aEo+ZjkF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w25si3811706jaq.39.2021.07.27.11.12.35; Tue, 27 Jul 2021 11:12:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=aEo+ZjkF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231844AbhG0SL1 (ORCPT + 99 others); Tue, 27 Jul 2021 14:11:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:54426 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229453AbhG0SL0 (ORCPT ); Tue, 27 Jul 2021 14:11:26 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 01DAC60238; Tue, 27 Jul 2021 18:11:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627409486; bh=0Jhkgmh6Ersm+31Lg4gnjVYrCD7edJaSvbSGVWBYdT4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=aEo+ZjkFl3s1oc/YPiigC8mZLpoTBobYxMg7UMrG5iZwmmZ5CUVeiYXiDwiderPT8 3JZVL7uOJSbxd9ws0mVcCkV3pQprki0dluggC5mgJtgLBl2Gknzl/vOF60otnzx+yk 1lqJ8f3bStaeaueb2NFv8oYwwqUmHS0fm+0w5lnCPRSM4fUQh9nDqR25XOzOFgb4YO gP975XKAkYFibjNx5fQUL5qG8dTFZEDN0cB+rGT/5Nesv2P2d8R3f0GYSI2PHU7oOw mAIBJWyrbth71xGb9Gg3BtEkv8kCrqDr8M8OE2KkazLDrB0RLy6OTfQvCBOVcYZg1R kUi+UtM2Y9SNQ== Date: Tue, 27 Jul 2021 19:11:21 +0100 From: Will Deacon To: Marc Zyngier Cc: linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, qperret@google.com, dbrazdil@google.com, Srivatsa Vaddagiri , Shanker R Donthineni , James Morse , Suzuki K Poulose , Alexandru Elisei , kernel-team@android.com Subject: Re: [PATCH 05/16] KVM: arm64: Plumb MMIO checking into the fault handling Message-ID: <20210727181120.GD19173@willie-the-truck> References: <20210715163159.1480168-1-maz@kernel.org> <20210715163159.1480168-6-maz@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210715163159.1480168-6-maz@kernel.org> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 15, 2021 at 05:31:48PM +0100, Marc Zyngier wrote: > Plumb the MMIO checking code into the MMIO fault handling code. > Nothing allows a region to be registered yet, so there should be > no funtional change either. Typo: functional > Signed-off-by: Marc Zyngier > --- > arch/arm64/kvm/mmio.c | 10 ++++++++++ > 1 file changed, 10 insertions(+) > > diff --git a/arch/arm64/kvm/mmio.c b/arch/arm64/kvm/mmio.c > index 3dd38a151d2a..fd5747279d27 100644 > --- a/arch/arm64/kvm/mmio.c > +++ b/arch/arm64/kvm/mmio.c > @@ -6,6 +6,7 @@ > > #include > #include > +#include > #include > > #include "trace.h" > @@ -130,6 +131,10 @@ int io_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa) > int len; > u8 data_buf[8]; > > + /* Check failed? Return to the guest for debriefing... */ > + if (!kvm_check_ioguard_page(vcpu, fault_ipa)) > + return 1; > + > /* > * No valid syndrome? Ask userspace for help if it has > * volunteered to do so, and bail out otherwise. > @@ -156,6 +161,11 @@ int io_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa) > len = kvm_vcpu_dabt_get_as(vcpu); > rt = kvm_vcpu_dabt_get_rd(vcpu); > > + /* If we cross a page boundary, check that too... */ > + if (((fault_ipa + len - 1) & PAGE_MASK) != (fault_ipa & PAGE_MASK) && > + !kvm_check_ioguard_page(vcpu, fault_ipa + len - 1)) > + return 1; > + I find this a little odd as the checks straddle the invalid syndrome check, meaning that the relative priorities of KVM_ARCH_FLAG_MMIO_GUARD and KVM_ARCH_FLAG_RETURN_NISV_IO_ABORT_TO_USER are unclear. Will