All of lore.kernel.org
 help / color / mirror / Atom feed
From: Marc Zyngier <marc.zyngier@arm.com>
To: Christoffer Dall <christoffer.dall@linaro.org>
Cc: "kvmarm\@lists.cs.columbia.edu" <kvmarm@lists.cs.columbia.edu>,
	"linux-arm-kernel\@lists.infradead.org"
	<linux-arm-kernel@lists.infradead.org>,
	"kvm\@vger.kernel.org" <kvm@vger.kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	"michael.casadevall\@linaro.org" <michael.casadevall@linaro.org>,
	"alex.bennee\@linaro.org" <alex.bennee@linaro.org>
Subject: Re: [PATCH] arm/arm64: KVM: Support KVM_CAP_READONLY_MEM
Date: Fri, 15 Aug 2014 15:16:01 +0100	[thread overview]
Message-ID: <87bnrlrg7y.fsf@approximate.cambridge.arm.com> (raw)
In-Reply-To: <20140815091550.GS10550@cbox> (Christoffer Dall's message of "Fri, 15 Aug 2014 10:15:50 +0100")

On Fri, Aug 15 2014 at 10:15:50 am BST, Christoffer Dall <christoffer.dall@linaro.org> wrote:
> On Thu, Aug 14, 2014 at 04:46:20PM +0100, Marc Zyngier wrote:
>> On Thu, Jul 10 2014 at 3:42:31 pm BST, Christoffer Dall
>> <christoffer.dall@linaro.org> wrote:
>> > When userspace loads code and data in a read-only memory regions, KVM
>> > needs to be able to handle this on arm and arm64.  Specifically this is
>> > used when running code directly from a read-only flash device; the
>> > common scenario is a UEFI blob loaded with the -bios option in QEMU.
>> >
>> > To avoid looking through the memslots twice and to reuse the hva error
>> > checking of gfn_to_hva_prot(), add a new gfn_to_hva_memslot_prot()
>> > function and refactor gfn_to_hva_prot() to use this function.
>> >
>> > Signed-off-by: Christoffer Dall <christoffer.dall@linaro.org>
>> 
>> This looks good to me, but you may want to split the patch in two
>> (generic stuff, and the ARM code).
>
> sure, I can split it up.
>
>> 
>> One question though...
>> 
>
> [...]
>
>> >  
>> > @@ -882,7 +882,10 @@ int kvm_handle_guest_abort(struct kvm_vcpu
>> > *vcpu, struct kvm_run *run)
>> >  	idx = srcu_read_lock(&vcpu->kvm->srcu);
>> >  
>> >  	gfn = fault_ipa >> PAGE_SHIFT;
>> > -	if (!kvm_is_visible_gfn(vcpu->kvm, gfn)) {
>> > +	memslot = gfn_to_memslot(vcpu->kvm, gfn);
>> > +	hva = gfn_to_hva_memslot_prot(memslot, gfn, &writable);
>> > +	write_fault = kvm_is_write_fault(kvm_vcpu_get_hsr(vcpu));
>> > +	if (kvm_is_error_hva(hva) || (write_fault && !writable)) {
>> 
>> So the consequence of a write to a ROM region would be to do an IO
>> emulation? That seems a bit weird. Shouldn't we have a separate error
>> path for this (possibly ignoring the write entierely)?
>> 
>
> It's part of the ABI, see Documentation/virtual/kvm/api.txt section
> 4.35:
>
> "The latter [KVM_KVM_READONLY] can be set, if KVM_CAP_READONLY_MEM
> capability allows it, to make a new slot read-only.  In this case,
> writes to this memory will be posted to userspace as KVM_EXIT_MMIO
> exits."

Fair enough. In which case, and assuming you split the patches:

Acked-by: Marc Zyngier <marc.zyngier@arm.com>

	M.
-- 
Jazz is not dead. It just smells funny.

WARNING: multiple messages have this Message-ID (diff)
From: marc.zyngier@arm.com (Marc Zyngier)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH] arm/arm64: KVM: Support KVM_CAP_READONLY_MEM
Date: Fri, 15 Aug 2014 15:16:01 +0100	[thread overview]
Message-ID: <87bnrlrg7y.fsf@approximate.cambridge.arm.com> (raw)
In-Reply-To: <20140815091550.GS10550@cbox> (Christoffer Dall's message of "Fri, 15 Aug 2014 10:15:50 +0100")

On Fri, Aug 15 2014 at 10:15:50 am BST, Christoffer Dall <christoffer.dall@linaro.org> wrote:
> On Thu, Aug 14, 2014 at 04:46:20PM +0100, Marc Zyngier wrote:
>> On Thu, Jul 10 2014 at 3:42:31 pm BST, Christoffer Dall
>> <christoffer.dall@linaro.org> wrote:
>> > When userspace loads code and data in a read-only memory regions, KVM
>> > needs to be able to handle this on arm and arm64.  Specifically this is
>> > used when running code directly from a read-only flash device; the
>> > common scenario is a UEFI blob loaded with the -bios option in QEMU.
>> >
>> > To avoid looking through the memslots twice and to reuse the hva error
>> > checking of gfn_to_hva_prot(), add a new gfn_to_hva_memslot_prot()
>> > function and refactor gfn_to_hva_prot() to use this function.
>> >
>> > Signed-off-by: Christoffer Dall <christoffer.dall@linaro.org>
>> 
>> This looks good to me, but you may want to split the patch in two
>> (generic stuff, and the ARM code).
>
> sure, I can split it up.
>
>> 
>> One question though...
>> 
>
> [...]
>
>> >  
>> > @@ -882,7 +882,10 @@ int kvm_handle_guest_abort(struct kvm_vcpu
>> > *vcpu, struct kvm_run *run)
>> >  	idx = srcu_read_lock(&vcpu->kvm->srcu);
>> >  
>> >  	gfn = fault_ipa >> PAGE_SHIFT;
>> > -	if (!kvm_is_visible_gfn(vcpu->kvm, gfn)) {
>> > +	memslot = gfn_to_memslot(vcpu->kvm, gfn);
>> > +	hva = gfn_to_hva_memslot_prot(memslot, gfn, &writable);
>> > +	write_fault = kvm_is_write_fault(kvm_vcpu_get_hsr(vcpu));
>> > +	if (kvm_is_error_hva(hva) || (write_fault && !writable)) {
>> 
>> So the consequence of a write to a ROM region would be to do an IO
>> emulation? That seems a bit weird. Shouldn't we have a separate error
>> path for this (possibly ignoring the write entierely)?
>> 
>
> It's part of the ABI, see Documentation/virtual/kvm/api.txt section
> 4.35:
>
> "The latter [KVM_KVM_READONLY] can be set, if KVM_CAP_READONLY_MEM
> capability allows it, to make a new slot read-only.  In this case,
> writes to this memory will be posted to userspace as KVM_EXIT_MMIO
> exits."

Fair enough. In which case, and assuming you split the patches:

Acked-by: Marc Zyngier <marc.zyngier@arm.com>

	M.
-- 
Jazz is not dead. It just smells funny.

  parent reply	other threads:[~2014-08-15 14:16 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-07-10 14:42 [PATCH] arm/arm64: KVM: Support KVM_CAP_READONLY_MEM Christoffer Dall
2014-07-10 14:42 ` Christoffer Dall
2014-08-04 10:36 ` Christoffer Dall
2014-08-04 10:36   ` Christoffer Dall
2014-08-14 15:46 ` Marc Zyngier
2014-08-14 15:46   ` Marc Zyngier
2014-08-15  9:15   ` Christoffer Dall
2014-08-15  9:15     ` Christoffer Dall
2014-08-15 12:21     ` Peter Maydell
2014-08-15 12:21       ` Peter Maydell
2014-08-15 14:16     ` Marc Zyngier [this message]
2014-08-15 14:16       ` Marc Zyngier

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87bnrlrg7y.fsf@approximate.cambridge.arm.com \
    --to=marc.zyngier@arm.com \
    --cc=alex.bennee@linaro.org \
    --cc=christoffer.dall@linaro.org \
    --cc=kvm@vger.kernel.org \
    --cc=kvmarm@lists.cs.columbia.edu \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=michael.casadevall@linaro.org \
    --cc=peter.maydell@linaro.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.