Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp643774rdd; Tue, 9 Jan 2024 15:31:57 -0800 (PST) X-Google-Smtp-Source: AGHT+IFXDOqRgUljIB6UqONKZdKaPHKAMY28Uy/N9okGoaL6DtrVFRkztXF1XqPijjSrORiCoQ4n X-Received: by 2002:a05:622a:11c2:b0:429:8c29:9b9a with SMTP id n2-20020a05622a11c200b004298c299b9amr302173qtk.38.1704843116914; Tue, 09 Jan 2024 15:31:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704843116; cv=none; d=google.com; s=arc-20160816; b=Mx1me1Z4lhfILi9S7xJyHtLDKvCktl4YwJv2duVAX3lHsNEAdDnR4DpcIjWjTbqGfG WLXCUY/2r7vU0DIWgSpfAdOkKXsJKoVjjwR28LB/2ZMsv/ccxcPgB4g3PLJHUOLoNIEl WwG735LIpMF2Jw8z1BYjJiZDuHpjFEOay5OQAUzWCTYR8VMUXScLumHDviU2B46Tafi0 BCPp++LKOHCINf/hRTWwfndrsQervK//xLpjqK6jRs6u7YK1o9NhVr4NU6qFXQ/c/uZ1 55LxDdREavwKsmrSGc/G9J5M0zr2trp0qq3OeEvVCMwRrRyjbwNtYbHCHlgBMfx/rKiE zKcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature; bh=nigpUfVa2mUkzqljgO+KeSAqnJRyVTsXj/vLragc/Ak=; fh=NIEOtS//uZ0qxkS5EhCCY4v8cxW6yXfZp4m8YTqChb0=; b=S6bDetMkV89cKIq7WIJMm3I/uI3YXQMa0wfku3rbpwxX1S7EpsKj9352XJZWPrn4Pj K5b7n5EC6WTXC0orgwrEHwIqn/2tyvEVswdft5mT4U1Ehp73zyAnlOO0wQUUUQxcApou zNtmiFNa5INY2kkFRd5MURuKNeTGf4i2ubpbaG/RUMxhMre/75spO3491u86FGZNt86c XOE4tdty36h7cib8cazueiaLHDBQFZSKN0cGEBtN1wW8eIjhvzY3re1gejomtREMdTPh iOThc5dd9yd2GrfAqJ7FG+B8EaEy4MS4nB2yBJOEirLsiKPTbznHk0A82Kcuxj1Ta7pG NtoA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b="MFsa/ZBZ"; spf=pass (google.com: domain of linux-kernel+bounces-21535-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-21535-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id l20-20020a05622a175400b004299641759csi3178240qtk.173.2024.01.09.15.31.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Jan 2024 15:31:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-21535-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b="MFsa/ZBZ"; spf=pass (google.com: domain of linux-kernel+bounces-21535-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-21535-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 881F21C20D27 for ; Tue, 9 Jan 2024 23:31:56 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5F9093E48F; Tue, 9 Jan 2024 23:31:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b="MFsa/ZBZ" Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2196C3D553; Tue, 9 Jan 2024 23:31:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=infradead.org Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding: Content-Type:In-Reply-To:From:References:Cc:To:Subject:MIME-Version:Date: Message-ID:Sender:Reply-To:Content-ID:Content-Description; bh=nigpUfVa2mUkzqljgO+KeSAqnJRyVTsXj/vLragc/Ak=; b=MFsa/ZBZDhYIlYvLVLWkNk4zWD eHNFpkvAgh0CEyn9Hkm60/1OI5QJmyUAqyB8HyW+LjjfVNOOg/64b7Z2PWd5TIePcWppnt5cMiorN fkGbeNq8CIBDpBnpQ2EHQKWuFoRj2WaT4AtiFbeKG7Lvy8VLYsdfedivVPaIhzgvN0ltBP3lEcq8Y IzFWRuQiA8sdciifcbhWiTUG1Y5q6sEbuRwM2oTbRo7gymb5fb43rrzdXrAOrkLKNK8Yn/auTndh2 WimNXLeYSCFwUOs919tTl4Lb92XzQCX63LfcqXJWZiezYVxmO5esiLTmUbte3dkxZAyNyde3RXj1Y 12MUo2cA==; Received: from [50.53.46.231] (helo=[192.168.254.15]) by bombadil.infradead.org with esmtpsa (Exim 4.96 #2 (Red Hat Linux)) id 1rNLZK-009qvy-08; Tue, 09 Jan 2024 23:31:38 +0000 Message-ID: Date: Tue, 9 Jan 2024 15:31:36 -0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v16 01/34] docs: gunyah: Introduce Gunyah Hypervisor Content-Language: en-US To: Elliot Berman , Alex Elder , Srinivas Kandagatla , Murali Nalajal , Trilok Soni , Srivatsa Vaddagiri , Carl van Schaik , Philip Derrin , Prakruthi Deepak Heragu , Jonathan Corbet , Rob Herring , Krzysztof Kozlowski , Conor Dooley , Catalin Marinas , Will Deacon , Konrad Dybcio , Bjorn Andersson , Dmitry Baryshkov , Fuad Tabba , Sean Christopherson , Andrew Morton Cc: linux-arm-msm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org References: <20240109-gunyah-v16-0-634904bf4ce9@quicinc.com> <20240109-gunyah-v16-1-634904bf4ce9@quicinc.com> From: Randy Dunlap In-Reply-To: <20240109-gunyah-v16-1-634904bf4ce9@quicinc.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit On 1/9/24 11:37, Elliot Berman wrote: > Gunyah is an open-source Type-1 hypervisor developed by Qualcomm. It > does not depend on any lower-privileged OS/kernel code for its core > functionality. This increases its security and can support a smaller > trusted computing based when compared to Type-2 hypervisors. > > Add documentation describing the Gunyah hypervisor and the main > components of the Gunyah hypervisor which are of interest to Linux > virtualization development. > > Signed-off-by: Elliot Berman > --- > Documentation/virt/gunyah/index.rst | 134 ++++++++++++++++++++++++++++ > Documentation/virt/gunyah/message-queue.rst | 68 ++++++++++++++ > Documentation/virt/index.rst | 1 + > 3 files changed, 203 insertions(+) > > diff --git a/Documentation/virt/gunyah/index.rst b/Documentation/virt/gunyah/index.rst > new file mode 100644 > index 000000000000..da8e5e4b9cac > --- /dev/null > +++ b/Documentation/virt/gunyah/index.rst > @@ -0,0 +1,134 @@ > +.. SPDX-License-Identifier: GPL-2.0 > + > +================= > +Gunyah Hypervisor > +================= > + > +.. toctree:: > + :maxdepth: 1 > + > + message-queue > + > +Gunyah is a Type-1 hypervisor which is independent of any OS kernel, and runs in > +a higher CPU privilege level. It does not depend on any lower-privileged Is this the usual meaning of higher and lower? Seems backwards to me. > +operating system for its core functionality. This increases its security and can > +support a much smaller trusted computing base than a Type-2 hypervisor. > + > +Gunyah is an open source hypervisor. The source repo is available at s/repo/repository/ > +https://github.com/quic/gunyah-hypervisor. > + > +Gunyah provides these following features. > + > +- Scheduling: > + > + A scheduler for virtual CPUs (vCPUs) on physical CPUs enables time-sharing > + of the CPUs. Gunyah supports two models of scheduling which can co-exist on s/co-exist/coexist/ > + a running system: > + > + 1. Hypervisor vCPU scheduling in which Gunyah hypervisor schedules vCPUS on > + its own. The default is a real-time priority with round-robin scheduler. > + 2. "Proxy" scheduling in which an owner-VM can donate the remainder of its > + own vCPU's time slice to an owned-VM's vCPU via a hypercall. > + > +- Memory Management: > + > + APIs handling memory, abstracted as objects, limiting direct use of physical > + addresses. Memory ownership and usage tracking of all memory under its control. > + Memory partitioning between VMs is a fundamental security feature. > + > +- Interrupt Virtualization: > + > + Interrupt ownership is tracked and interrupt delivery is directly to the > + assigned VM. Gunyah makes use of hardware interrupt virtualization where > + possible. > + > +- Inter-VM Communication: > + > + There are several different mechanisms provided for communicating between VMs. > + > + 1. Message queues > + 2. Doorbells > + 3. Virtio MMIO transport > + 4. Shared memory > + > +- Virtual platform: > + > + Architectural devices such as interrupt controllers and CPU timers are > + directly provided by the hypervisor as well as core virtual platform devices > + and system APIs such as ARM PSCI. > + > +- Device Virtualization: > + > + Para-virtualization of devices is supported using inter-VM communication and > + virtio transport support. Select stage 2 faults by virtual machines that use > + proxy-scheduled vCPUs can be handled directly by Linux to provide Type-2 > + hypervisor style on-demand paging and/or device emulation. > + > +Architectures supported > +======================= > +AArch64 with a GICv3 or GICv4.1 > + > +Resources and Capabilities > +========================== > + > +Services/resources provided by the Gunyah hypervisor are accessible to a > +virtual machine through capabilities. A capability is an access control > +token granting the holder a set of permissions to operate on a specific > +hypervisor object (conceptually similar to a file-descriptor). > +For example, inter-VM communication using Gunyah doorbells and message queues > +is performed using hypercalls taking Capability ID arguments for the required > +IPC objects. These resources are described in Linux as a struct gunyah_resource. > + > +Unlike UNIX file descriptors, there is no path-based or similar lookup of > +an object to create a new Capability, meaning simpler security analysis. > +Creation of a new Capability requires the holding of a set of privileged > +Capabilities which are typically never given out by the Resource Manager (RM). > + > +Gunyah itself provides no APIs for Capability ID discovery. Enumeration of > +Capability IDs is provided by RM as a higher level service to VMs. > + > +Resource Manager > +================ > + > +The Gunyah Resource Manager (RM) is a privileged application VM supporting the > +Gunyah Hypervisor. It provides policy enforcement aspects of the virtualization > +system. The resource manager can be treated as an extension of the Hypervisor > +but is separated to its own partition to ensure that the hypervisor layer itself > +remains small and secure and to maintain a separation of policy and mechanism in > +the platform. The resource manager runs at arm64 NS-EL1, similar to other > +virtual machines. > + > +Communication with the resource manager from other virtual machines happens with happens as described in ... ? > +message-queue.rst. Details about the specific messages can be found in > +drivers/virt/gunyah/rsc_mgr.c > + > +:: > + > + +-------+ +--------+ +--------+ > + | RM | | VM_A | | VM_B | > + +-.-.-.-+ +---.----+ +---.----+ > + | | | | > + +-.-.-----------.------------.----+ > + | | \==========/ | | > + | \========================/ | > + | Gunyah | > + +---------------------------------+ > + > +The source for the resource manager is available at > +https://github.com/quic/gunyah-resource-manager. > + > +The resource manager provides the following features: > + > +- VM lifecycle management: allocating a VM, starting VMs, destruction of VMs > +- VM access control policy, including memory sharing and lending > +- Interrupt routing configuration > +- Forwarding of system-level events (e.g. VM shutdown) to owner VM > +- Resource (capability) discovery > + > +A VM requires boot configuration to establish communication with the resource > +manager. This is provided to VMs via a 'hypervisor' device tree node which is > +overlayed to the VMs DT by the RM. This node lets guests know they are running It seems that "overlaid" is preferred, both according to the internet and to git grep -i overlaid | wc 54 vs git grep -i overlayed | wc 12 > +as a Gunyah guest VM, how to communicate with resource manager, and basic > +description and capabilities of this VM. See > +Documentation/devicetree/bindings/firmware/gunyah-hypervisor.yaml for a > +description of this node. > diff --git a/Documentation/virt/gunyah/message-queue.rst b/Documentation/virt/gunyah/message-queue.rst > new file mode 100644 > index 000000000000..cd94710e381a > --- /dev/null > +++ b/Documentation/virt/gunyah/message-queue.rst > @@ -0,0 +1,68 @@ > +.. SPDX-License-Identifier: GPL-2.0 > + > +Message Queues > +============== > +Message queue is a simple low-capacity IPC channel between two virtual machines. > +It is intended for sending small control and configuration messages. Each > +message queue is unidirectional and buffered in the hypervisor. A full-duplex > +IPC channel requires a pair of queues. > + > +The size of the queue and the maximum size of the message that can be passed is > +fixed at creation of the message queue. Resource manager is presently the only > +use case for message queues, and creates messages queues between itself and VMs > +with a fixed maximum message size of 240 bytes. Longer messages require a > +further protocol on top of the message queue messages themselves. For instance, > +communication with the resource manager adds a header field for sending longer > +messages which are split into smaller fragments. > + > +The diagram below shows how message queue works. A typical configuration > +involves 2 message queues. Message queue 1 allows VM_A to send messages to VM_B. > +Message queue 2 allows VM_B to send messages to VM_A. > + > +1. VM_A sends a message of up to 240 bytes in length. It makes a hypercall > + with the message to request the hypervisor to add the message to > + message queue 1's queue. The hypervisor copies memory into the internal > + message queue buffer; the memory doesn't need to be shared between > + VM_A and VM_B. > + > +2. Gunyah raises the corresponding interrupt for VM_B (Rx vIRQ) when any of > + these happens: > + > + a. gunyah_msgq_send() has PUSH flag. This is a typical case when the message > + queue is being used to implement an RPC-like interface. > + b. Explicility with gunyah_msgq_push hypercall from VM_A. Explicitly > + c. Message queue has reached a threshold depth. Typically, this threshold > + depth is the size of the queue (in other words: when queue is full, Rx > + vIRQ is raised). > + > +3. VM_B calls gunyah_msgq_recv() and Gunyah copies message to requested buffer. > + > +4. Gunyah raises the corresponding interrupt for VM_A (Tx vIRQ) when the message > + queue falls below a watermark depth. Typically, this is when the queue is > + drained. Note the watermark depth and the threshold depth for the Rx vIRQ are > + independent values. Coincidentally, this signal is conceptually similar to > + Clear-to-Send. > + > +For VM_B to send a message to VM_A, the process is identical, except that > +hypercalls reference message queue 2's capability ID. The IRQ will be different > +for the second message queue. > + > +:: > + > + +-------------------+ +-----------------+ +-------------------+ > + | VM_A | |Gunyah hypervisor| | VM_B | > + | | | | | | > + | | | | | | > + | | Tx | | | | > + | |-------->| | Rx vIRQ | | > + |gunyah_msgq_send() | Tx vIRQ |Message queue 1 |-------->|gunyah_msgq_recv() | > + | |<------- | | | | > + | | | | | | > + | | | | | | > + | | | | Tx | | > + | | Rx vIRQ | |<--------| | > + |gunyah_msgq_recv() |<--------|Message queue 2 | Tx vIRQ |gunyah_msgq_send() | > + | | | |-------->| | > + | | | | | | > + | | | | | | > + +-------------------+ +-----------------+ +---------------+ > diff --git a/Documentation/virt/index.rst b/Documentation/virt/index.rst > index 7fb55ae08598..15869ee059b3 100644 > --- a/Documentation/virt/index.rst > +++ b/Documentation/virt/index.rst > @@ -16,6 +16,7 @@ Virtualization Support > coco/sev-guest > coco/tdx-guest > hyperv/index > + gunyah/index > > .. only:: html and subproject > > -- #Randy