From patchwork Thu Jun 30 13:57:23 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 12901841 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 11941C433EF for ; Thu, 30 Jun 2022 13:59:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=Lf/Sqri0WopLrLEWcYLDykvh/IrKB/PA+SPLNxHI/wU=; b=xC/SiBaXx8p/AM FD/LGPxDko4I8df98XE8XJKPjXlAIPTmSh6wFTV8D4r+NOgcsHTla/PQJb+oJpC2VIdBCuTnWin1k 7wszMDk6pOsGntfMn7AhqxArPO2WPztHrmj4q9D/BwLZG9LG8cWWK0TXQVjYmr79SBZ0CARWexqBb Of0bYysvaddxflZvx9rIBsOtYRCZmyxJQMqsj886V/bAP6l8iwzqoXAB9S1vbIj1ZmT6a7eNDYJoz UEn6wy1NVer5Fm1bHTIL2UX1uvj+aVBkoVHpb9lfEfiHQlffOOW7CLQ/uW/zyRhLY126V6DQ3oBwl bX1KasUSEKs8oXLzy7Qw==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1o6ugF-00HSZ2-Aj; Thu, 30 Jun 2022 13:58:03 +0000 Received: from dfw.source.kernel.org ([2604:1380:4641:c500::1]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1o6ugB-00HSY3-90 for linux-arm-kernel@lists.infradead.org; Thu, 30 Jun 2022 13:58:01 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 13F48620E4; Thu, 30 Jun 2022 13:57:58 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 27CD8C34115; Thu, 30 Jun 2022 13:57:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1656597477; bh=EmIexi1QObKgcY5NSLTUwRxnbbq8QcNM35kJH7r6kog=; h=From:To:Cc:Subject:Date:From; b=gwD/VFOti3HVCG3sv26GAdib8zxowDim9r5Hsgi8VjGDkqQjM223ZVFiUvIdAm+U8 emwIv/DXD4n50fKJpc5H7vc9vkDHLIq4gvXoaqLuzt5Bjn563zMkXltiR1z6GuGJNP O/InJj9812Or+GtAWsCDoYW5zVna91Mok7MVBSGErs1K5laZvGwm43SsbhGiS/lByy RUdbuAmeujfMGm5W1R1fW7GGCyU7in3irEafqxhl7+vRZuX7PlmV9pm9+4qZBBMKkE mTxw7IMEyjGKNAwmzNBfFIK27scazKdFkF5V2OhZZYCHNtOLpL6iZqlHDx7+C1IsBg Kqxty3W6ToRUA== From: Will Deacon To: kvmarm@lists.cs.columbia.edu Cc: Will Deacon , Ard Biesheuvel , Sean Christopherson , Alexandru Elisei , Andy Lutomirski , Catalin Marinas , James Morse , Chao Peng , Quentin Perret , Suzuki K Poulose , Michael Roth , Mark Rutland , Fuad Tabba , Oliver Upton , Marc Zyngier , kernel-team@android.com, kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: [PATCH v2 00/24] KVM: arm64: Introduce pKVM shadow state at EL2 Date: Thu, 30 Jun 2022 14:57:23 +0100 Message-Id: <20220630135747.26983-1-will@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220630_065759_433962_E6385A7B X-CRM114-Status: GOOD ( 18.22 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi everyone, This series has been extracted from the pKVM base support series (aka "pKVM mega-patch") previously posted here: https://lore.kernel.org/kvmarm/20220519134204.5379-1-will@kernel.org/ Unlike that more comprehensive series, this one is fairly fundamental and does not introduce any new ABI commitments, leaving questions involving the management of guest private memory and the creation of protected VMs for future work. Instead, this series extends the pKVM EL2 code so that it can dynamically instantiate and manage VM shadow structures without the host being able to access them directly. These shadow structures consist of a shadow VM, a set of shadow vCPUs and the stage-2 page-table and the pages used to hold them are returned to the host when the VM is destroyed. The last patch is marked as RFC because, although it plumbs in the shadow state, it is woefully inefficient and copies to/from the host state on every vCPU run. Without the last patch, the new structures are unused but we move considerably closer to isolating guests from the host. The series is based on Marc's rework of the flags (kvm-arm64/burn-the-flags). Feedback welcome. Cheers, Will, Quentin, Fuad and Marc Cc: Ard Biesheuvel Cc: Sean Christopherson Cc: Will Deacon Cc: Alexandru Elisei Cc: Andy Lutomirski Cc: Catalin Marinas Cc: James Morse Cc: Chao Peng Cc: Quentin Perret Cc: Suzuki K Poulose Cc: Michael Roth Cc: Mark Rutland Cc: Fuad Tabba Cc: Oliver Upton Cc: Marc Zyngier Cc: kernel-team@android.com Cc: kvm@vger.kernel.org Cc: kvmarm@lists.cs.columbia.edu Cc: linux-arm-kernel@lists.infradead.org --->8 Fuad Tabba (3): KVM: arm64: Add hyp_spinlock_t static initializer KVM: arm64: Introduce shadow VM state at EL2 KVM: arm64: Instantiate VM shadow data from EL1 Quentin Perret (15): KVM: arm64: Move hyp refcount manipulation helpers KVM: arm64: Allow non-coalescable pages in a hyp_pool KVM: arm64: Add flags to struct hyp_page KVM: arm64: Back hyp_vmemmap for all of memory KVM: arm64: Make hyp stage-1 refcnt correct on the whole range KVM: arm64: Implement do_donate() helper for donating memory KVM: arm64: Prevent the donation of no-map pages KVM: arm64: Add helpers to pin memory shared with hyp KVM: arm64: Add pcpu fixmap infrastructure at EL2 KVM: arm64: Add generic hyp_memcache helpers KVM: arm64: Instantiate guest stage-2 page-tables at EL2 KVM: arm64: Return guest memory from EL2 via dedicated teardown memcache KVM: arm64: Unmap kvm_arm_hyp_percpu_base from the host KVM: arm64: Explicitly map kvm_vgic_global_state at EL2 KVM: arm64: Don't map host sections in pkvm Will Deacon (6): KVM: arm64: Unify identifiers used to distinguish host and hypervisor KVM: arm64: Include asm/kvm_mmu.h in nvhe/mem_protect.h KVM: arm64: Initialise hyp symbols regardless of pKVM KVM: arm64: Provide I-cache invalidation by VA at EL2 KVM: arm64: Maintain a copy of 'kvm_arm_vmid_bits' at EL2 KVM: arm64: Use the shadow vCPU structure in handle___kvm_vcpu_run() arch/arm64/include/asm/kvm_asm.h | 6 +- arch/arm64/include/asm/kvm_host.h | 65 +++ arch/arm64/include/asm/kvm_hyp.h | 3 + arch/arm64/include/asm/kvm_pgtable.h | 8 + arch/arm64/include/asm/kvm_pkvm.h | 38 ++ arch/arm64/kernel/image-vars.h | 15 - arch/arm64/kvm/arm.c | 40 +- arch/arm64/kvm/hyp/hyp-constants.c | 3 + arch/arm64/kvm/hyp/include/nvhe/gfp.h | 6 +- arch/arm64/kvm/hyp/include/nvhe/mem_protect.h | 19 +- arch/arm64/kvm/hyp/include/nvhe/memory.h | 26 +- arch/arm64/kvm/hyp/include/nvhe/mm.h | 18 +- arch/arm64/kvm/hyp/include/nvhe/pkvm.h | 70 +++ arch/arm64/kvm/hyp/include/nvhe/spinlock.h | 10 +- arch/arm64/kvm/hyp/nvhe/cache.S | 11 + arch/arm64/kvm/hyp/nvhe/hyp-main.c | 105 +++- arch/arm64/kvm/hyp/nvhe/hyp-smp.c | 2 + arch/arm64/kvm/hyp/nvhe/mem_protect.c | 456 +++++++++++++++++- arch/arm64/kvm/hyp/nvhe/mm.c | 136 +++++- arch/arm64/kvm/hyp/nvhe/page_alloc.c | 42 +- arch/arm64/kvm/hyp/nvhe/pkvm.c | 438 +++++++++++++++++ arch/arm64/kvm/hyp/nvhe/setup.c | 96 ++-- arch/arm64/kvm/hyp/pgtable.c | 9 + arch/arm64/kvm/mmu.c | 26 + arch/arm64/kvm/pkvm.c | 121 ++++- 25 files changed, 1625 insertions(+), 144 deletions(-) create mode 100644 arch/arm64/kvm/hyp/include/nvhe/pkvm.h Reviewed-by: Vincent Donnefort Tested-by: Vincent Donnefort