Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5123792pxv; Wed, 28 Jul 2021 03:49:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzuCc20C+nmOgnBdMmptwzYcEP7mdrQ6wyl66FVuw+LI6co/afy6QB+n5dYlHleVb+PMDwR X-Received: by 2002:a6b:fe06:: with SMTP id x6mr23254472ioh.38.1627469375904; Wed, 28 Jul 2021 03:49:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627469375; cv=none; d=google.com; s=arc-20160816; b=ibFJS1tNnTGBviBDprxQsX/1zVEZWJ5xm4lmDTnVRz+BJqKzYW17CVH18OSx7pFSUL rTN/aQ3G7zdFCyPwb9H3UZ2N0zmEOuG9PGPv4KM2Dr3FrNnrb+Q7vbKxdeZ8rkw0ov83 MmihcqUmeXTpxJjj79poLkqYWxVRVFTvwzg9yBVFqjx+ig6qGAUcwHtQWGrhpV4dHdTj Gq00fCMJg/5xDEV13TBGM0R5fnTYVPV485PqcMLJwq8wINdqrLmzKW5JvtvoE4lNXU77 i7PK8zVUVB4r9tMbGNmOLc9gU4P/j+McOy+VN9OuuGoJNnjlMndhL1IQQWD9+l90XcjM rstA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date; bh=Au4StvuXE5kpN3AmcT2mHDrztT+qKR/UlWQip75ZKfg=; b=ns49ACdaJmX2B+xbjbsskNLUE7fdVsWKHU85Yp+w+QPnR1NRuGJgSAUvFHhMjSiFFD 9GY8MpoCwzFJ7PFOaaZtwjOhK556F7kXAVfoConc0hzNWdCyPgu0kNEa1UOYf0sSbb1R qN1OI38LKS6PiR/LlUW4MiN1eiRd2+Un6HxJgKMvyaRi2lLAns/AeD0PCRL8dTvOvM8K A+y4DFdzBg7QFwGJy+9xkDkL2AlBvIkcesjb0f2SXHJaljkEeX9CaRWXaI7n+TcP2icg p5E4HYZef0y8eZiGU330kYwtvRxVInDmxAvBslzXSua6BmySoWFkNA+onuel40DFDPu4 NJzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t18si6288425ilf.96.2021.07.28.03.49.23; Wed, 28 Jul 2021 03:49:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235942AbhG1KrY (ORCPT + 99 others); Wed, 28 Jul 2021 06:47:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:52066 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231340AbhG1KrY (ORCPT ); Wed, 28 Jul 2021 06:47:24 -0400 Received: from disco-boy.misterjones.org (disco-boy.misterjones.org [51.254.78.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C6B0760F9B; Wed, 28 Jul 2021 10:47:22 +0000 (UTC) Received: from sofa.misterjones.org ([185.219.108.64] helo=why.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1m8h5t-001Vli-5g; Wed, 28 Jul 2021 11:47:21 +0100 Date: Wed, 28 Jul 2021 11:47:20 +0100 Message-ID: <87v94ud8av.wl-maz@kernel.org> From: Marc Zyngier To: Will Deacon Cc: linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, qperret@google.com, dbrazdil@google.com, Srivatsa Vaddagiri , Shanker R Donthineni , James Morse , Suzuki K Poulose , Alexandru Elisei , kernel-team@android.com Subject: Re: [PATCH 07/16] KVM: arm64: Wire MMIO guard hypercalls In-Reply-To: <20210727181145.GF19173@willie-the-truck> References: <20210715163159.1480168-1-maz@kernel.org> <20210715163159.1480168-8-maz@kernel.org> <20210727181145.GF19173@willie-the-truck> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: will@kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, qperret@google.com, dbrazdil@google.com, vatsa@codeaurora.org, sdonthineni@nvidia.com, james.morse@arm.com, suzuki.poulose@arm.com, alexandru.elisei@arm.com, kernel-team@android.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 27 Jul 2021 19:11:46 +0100, Will Deacon wrote: > > On Thu, Jul 15, 2021 at 05:31:50PM +0100, Marc Zyngier wrote: > > Plumb in the hypercall interface to allow a guest to discover, > > enroll, map and unmap MMIO regions. > > > > Signed-off-by: Marc Zyngier > > --- > > arch/arm64/kvm/hypercalls.c | 20 ++++++++++++++++++++ > > include/linux/arm-smccc.h | 28 ++++++++++++++++++++++++++++ > > 2 files changed, 48 insertions(+) > > > > diff --git a/arch/arm64/kvm/hypercalls.c b/arch/arm64/kvm/hypercalls.c > > index 30da78f72b3b..a3deeb907fdd 100644 > > --- a/arch/arm64/kvm/hypercalls.c > > +++ b/arch/arm64/kvm/hypercalls.c > > @@ -5,6 +5,7 @@ > > #include > > > > #include > > +#include > > > > #include > > #include > > @@ -129,10 +130,29 @@ int kvm_hvc_call_handler(struct kvm_vcpu *vcpu) > > case ARM_SMCCC_VENDOR_HYP_KVM_FEATURES_FUNC_ID: > > val[0] = BIT(ARM_SMCCC_KVM_FUNC_FEATURES); > > val[0] |= BIT(ARM_SMCCC_KVM_FUNC_PTP); > > + val[0] |= BIT(ARM_SMCCC_KVM_FUNC_MMIO_GUARD_INFO); > > + val[0] |= BIT(ARM_SMCCC_KVM_FUNC_MMIO_GUARD_ENROLL); > > + val[0] |= BIT(ARM_SMCCC_KVM_FUNC_MMIO_GUARD_MAP); > > + val[0] |= BIT(ARM_SMCCC_KVM_FUNC_MMIO_GUARD_UNMAP); > > break; > > case ARM_SMCCC_VENDOR_HYP_KVM_PTP_FUNC_ID: > > kvm_ptp_get_time(vcpu, val); > > break; > > + case ARM_SMCCC_VENDOR_HYP_KVM_MMIO_GUARD_INFO_FUNC_ID: > > + val[0] = PAGE_SIZE; > > + break; > > I get the nagging feeling that querying the stage-2 page-size outside of > MMIO guard is going to be useful once we start looking at memory sharing, > so perhaps rename this to something more generic? At this stage, why not follow the architecture and simply expose it as ID_AA64MMFR0_EL1.TGran{4,64,16}_2? That's exactly what it is for, and we already check for this in KVM itself. > > > + case ARM_SMCCC_VENDOR_HYP_KVM_MMIO_GUARD_ENROLL_FUNC_ID: > > + set_bit(KVM_ARCH_FLAG_MMIO_GUARD, &vcpu->kvm->arch.flags); > > + val[0] = SMCCC_RET_SUCCESS; > > + break; > > + case ARM_SMCCC_VENDOR_HYP_KVM_MMIO_GUARD_MAP_FUNC_ID: > > + if (kvm_install_ioguard_page(vcpu, vcpu_get_reg(vcpu, 1))) > > + val[0] = SMCCC_RET_SUCCESS; > > + break; > > + case ARM_SMCCC_VENDOR_HYP_KVM_MMIO_GUARD_UNMAP_FUNC_ID: > > + if (kvm_remove_ioguard_page(vcpu, vcpu_get_reg(vcpu, 1))) > > + val[0] = SMCCC_RET_SUCCESS; > > + break; > > I think there's a slight discrepancy between MAP and UNMAP here in that > calling UNMAP on something that hasn't been mapped will fail, whereas > calling MAP on something that's already been mapped will succeed. I think > that might mean you can't reason about the final state of the page if two > vCPUs race to call these functions in some cases (and both succeed). I'm not sure that's the expected behaviour for ioremap(), for example (you can ioremap two portions of the same page successfully). I guess MAP could return something indicating that the page is already mapped, but I wouldn't want to return a hard failure in this case. M. -- Without deviation from the norm, progress is not possible.