Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp1493238pxb; Thu, 7 Oct 2021 08:50:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzds83xaEhEhteF5IxiyfBbHj18PcDjavwPm7Fhgrxho6XyETwYdrQd50sx9OA6IIjPxumB X-Received: by 2002:a05:6a00:1906:b0:44c:b35d:71a8 with SMTP id y6-20020a056a00190600b0044cb35d71a8mr5129553pfi.51.1633621804385; Thu, 07 Oct 2021 08:50:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633621804; cv=none; d=google.com; s=arc-20160816; b=rPfc49063C5oiCel0MMcP46Z1kM3gxcytg2IdBS8AQvc1Oy8j6HvJW27gd/X1akW0p HrHx5ms/uFi9Gv0mGMR47KdvMiaB3aVGmI59NuM8c4g0dQnmoP4/UK3MOek2sYKIB8rw zCzVjLw9seK2jBWo6G7hEVqiDVq2gHYrPPrk6Vfdf6OeQf9NcyB2RUgo4zJn2w0/P/rW AJkx0A7UFdOO9g+8Y5gOj3SoX9NwSerf5Hx2enTOMt8dEWyOHD+UNMINLMu78b4uQ1zD /TXiafqan8Pw5oSrLGu6IEFdt4v16vci7e2DcNqQssvoMBtAlMX+8r0BA3Wq9JGMiZTo M9kw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=xazcSRU4hXAvOQ5GWPa9VCWbDLefBI+rO4m0xJqTNOQ=; b=FoXTOLgDhnK9jkBhGwFHj/hNRgP01mfUO9PlZnc3Qg7yaYVVSHcx2SjdsfFWb/+Q9J TS9vUjn+5HJ9poItT87SPGANZNadQ/lz/guuBsrcXONS/FjnmGVvbTh390hcHlV+JnaU aJiyuZDpyrPZiwTVPDAmocxBErlxfweQcjPbBNwrDFm2D0K6xMJVuiT6FJMuwdUZrws1 s0Idk2D98Wi4eP66O7+3TsmK7hRB90MkNLsWLGAi+VFSsGVwAEEsMBwned1VLTCtc8ay epSd/TXhqKEw402IrzBiSFGP7uNtIAaHKhcr4WtBjO8yMPgxjhGG83DX6mZUASSVEwdR c/KQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hV1HPtjt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k18si6238852plk.277.2021.10.07.08.49.50; Thu, 07 Oct 2021 08:50:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hV1HPtjt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242176AbhJGOoS (ORCPT + 99 others); Thu, 7 Oct 2021 10:44:18 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:42452 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242154AbhJGOoR (ORCPT ); Thu, 7 Oct 2021 10:44:17 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1633617743; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=xazcSRU4hXAvOQ5GWPa9VCWbDLefBI+rO4m0xJqTNOQ=; b=hV1HPtjtkojabHHXhunC3eBMvDVxTmiMdurx0TUGJLAaeA0NWzfceAUFpBzVw4l+apDB59 NaaBZnxiUo3nWQS/Sp0OSbRFlta2byRPLXwJiq7p68Kmc+qO7gARy0KWXa1T0WRh01Woxy 90+RvphJoo67EbRBbRn2gdadqHX+yR0= Received: from mail-wr1-f72.google.com (mail-wr1-f72.google.com [209.85.221.72]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-453-AVHtqDYwOWe9OyFe3lJ86Q-1; Thu, 07 Oct 2021 10:42:22 -0400 X-MC-Unique: AVHtqDYwOWe9OyFe3lJ86Q-1 Received: by mail-wr1-f72.google.com with SMTP id a10-20020a5d508a000000b00160723ce588so4876466wrt.23 for ; Thu, 07 Oct 2021 07:42:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=xazcSRU4hXAvOQ5GWPa9VCWbDLefBI+rO4m0xJqTNOQ=; b=fZjMDTV/RmafK3tBVSWiDAzYJmaY6UeHYdk0K5nRjr4f4AnNQIPBfa/umfws9sk1se jwW2ztSD9PR6pWhcW4aXdyKpjj+/3WdYjysZ5m81Fdi/4OzgjnPXTo2Q1QH0pGwAWjFP uW8KmClHzvhp+3APumcdSV9sdQKiRIRVbPoqxuIDNWT1TkatbkxdYarsRFzsTdOkWG+M ybsP2H/HWfWY3OmgShng5Ejs75ug5s7bQqja1vLzHsVUK3rBOPm1JQx3OAiFaS7OP19H rcPta22amiTkRwj2uJmGh7/aVng7mCaWT9uCmwlYZYo80b24iX9C8PlG05xPqKtzx8iN MNgw== X-Gm-Message-State: AOAM532MclyVJfNwaytzQDI6aZuhVlRWv0v0RExdMm+XJy+6eBvJamsA dZS5mQLXeseLEDZYHuC/AvdJ/Ha29P/ujowannqiNvYCvGRUMfi0MQgjhxMp4C9DFdMP6eLZt86 VgRjllCgsgMl04GTick92hzqn X-Received: by 2002:a1c:a914:: with SMTP id s20mr5090567wme.6.1633617741254; Thu, 07 Oct 2021 07:42:21 -0700 (PDT) X-Received: by 2002:a1c:a914:: with SMTP id s20mr5090538wme.6.1633617741066; Thu, 07 Oct 2021 07:42:21 -0700 (PDT) Received: from gator (nat-pool-brq-u.redhat.com. [213.175.37.12]) by smtp.gmail.com with ESMTPSA id c132sm9169302wma.22.2021.10.07.07.42.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Oct 2021 07:42:18 -0700 (PDT) Date: Thu, 7 Oct 2021 16:42:14 +0200 From: Andrew Jones To: Marc Zyngier Cc: linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, will@kernel.org, qperret@google.com, dbrazdil@google.com, Steven Price , Fuad Tabba , Srivatsa Vaddagiri , Shanker R Donthineni , James Morse , Suzuki K Poulose , Alexandru Elisei , kernel-team@android.com Subject: Re: [PATCH v2 10/16] KVM: arm64: Add some documentation for the MMIO guard feature Message-ID: <20211007144214.pti5b2wjio6wneye@gator> References: <20211004174849.2831548-1-maz@kernel.org> <20211004174849.2831548-11-maz@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20211004174849.2831548-11-maz@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 04, 2021 at 06:48:43PM +0100, Marc Zyngier wrote: > Document the hypercalls user for the MMIO guard infrastructure. > > Signed-off-by: Marc Zyngier > --- > Documentation/virt/kvm/arm/index.rst | 1 + > Documentation/virt/kvm/arm/mmio-guard.rst | 74 +++++++++++++++++++++++ > 2 files changed, 75 insertions(+) > create mode 100644 Documentation/virt/kvm/arm/mmio-guard.rst > > diff --git a/Documentation/virt/kvm/arm/index.rst b/Documentation/virt/kvm/arm/index.rst > index 78a9b670aafe..e77a0ee2e2d4 100644 > --- a/Documentation/virt/kvm/arm/index.rst > +++ b/Documentation/virt/kvm/arm/index.rst > @@ -11,3 +11,4 @@ ARM > psci > pvtime > ptp_kvm > + mmio-guard > diff --git a/Documentation/virt/kvm/arm/mmio-guard.rst b/Documentation/virt/kvm/arm/mmio-guard.rst > new file mode 100644 > index 000000000000..8b3c852c5d92 > --- /dev/null > +++ b/Documentation/virt/kvm/arm/mmio-guard.rst > @@ -0,0 +1,74 @@ > +.. SPDX-License-Identifier: GPL-2.0 > + > +============== > +KVM MMIO guard > +============== > + > +KVM implements device emulation by handling translation faults to any > +IPA range that is not contained in a memory slot. Such a translation > +fault is in most cases passed on to userspace (or in rare cases to the > +host kernel) with the address, size and possibly data of the access > +for emulation. > + > +Should the guest exit with an address that is not one that corresponds > +to an emulatable device, userspace may take measures that are not the > +most graceful as far as the guest is concerned (such as terminating it > +or delivering a fatal exception). > + > +There is also an element of trust: by forwarding the request to > +userspace, the kernel assumes that the guest trusts userspace to do > +the right thing. > + > +The KVM MMIO guard offers a way to mitigate this last point: a guest > +can request that only certain regions of the IPA space are valid as > +MMIO. Only these regions will be handled as an MMIO, and any other > +will result in an exception being delivered to the guest. > + > +This relies on a set of hypercalls defined in the KVM-specific range, > +using the HVC64 calling convention. > + > +* ARM_SMCCC_KVM_FUNC_MMIO_GUARD_INFO > + > + ============== ======== ================================ > + Function ID: (uint32) 0xC6000002 > + Arguments: none > + Return Values: (int64) NOT_SUPPORTED(-1) on error, or > + (uint64) Protection Granule (PG) size in > + bytes (r0) > + ============== ======== ================================ > + > +* ARM_SMCCC_KVM_FUNC_MMIO_GUARD_ENROLL > + > + ============== ======== ============================== > + Function ID: (uint32) 0xC6000003 > + Arguments: none > + Return Values: (int64) NOT_SUPPORTED(-1) on error, or > + RET_SUCCESS(0) (r0) > + ============== ======== ============================== > + > +* ARM_SMCCC_KVM_FUNC_MMIO_GUARD_MAP > + > + ============== ======== ==================================== > + Function ID: (uint32) 0xC6000004 > + Arguments: (uint64) The base of the PG-sized IPA range > + that is allowed to be accessed as > + MMIO. Must be aligned to the PG size > + (r1) > + (uint64) Index in the MAIR_EL1 register > + providing the memory attribute that > + is used by the guest (r2) Already gave my r-b for this document, but after double checking I see that this r2 argument doesn't appeared used by the implementation yet. Is this left over from an older design or reserved for later use? Thanks, drew > + Return Values: (int64) NOT_SUPPORTED(-1) on error, or > + RET_SUCCESS(0) (r0) > + ============== ======== ==================================== > + > +* ARM_SMCCC_KVM_FUNC_MMIO_GUARD_UNMAP > + > + ============== ======== ====================================== > + Function ID: (uint32) 0xC6000005 > + Arguments: (uint64) PG-sized IPA range aligned to the PG > + size which has been previously mapped. > + Must be aligned to the PG size and > + have been previously mapped (r1) > + Return Values: (int64) NOT_SUPPORTED(-1) on error, or > + RET_SUCCESS(0) (r0) > + ============== ======== ====================================== > -- > 2.30.2 >