Message ID | 20230419221716.3603068-9-atishp@rivosinc.com (mailing list archive) |
---|---|
State | New |
Headers | show
Return-Path: <owner-linux-mm@kvack.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2C3B7C77B75 for <linux-mm@archiver.kernel.org>; Wed, 19 Apr 2023 22:17:57 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D15E6900007; Wed, 19 Apr 2023 18:17:50 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id CC4CB900003; Wed, 19 Apr 2023 18:17:50 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id AF0FD900007; Wed, 19 Apr 2023 18:17:50 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id A1383900003 for <linux-mm@kvack.org>; Wed, 19 Apr 2023 18:17:50 -0400 (EDT) Received: from smtpin20.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 682EDAC4FC for <linux-mm@kvack.org>; Wed, 19 Apr 2023 22:17:50 +0000 (UTC) X-FDA: 80699553900.20.11F697F Received: from mail-pl1-f174.google.com (mail-pl1-f174.google.com [209.85.214.174]) by imf20.hostedemail.com (Postfix) with ESMTP id 7DE791C0015 for <linux-mm@kvack.org>; Wed, 19 Apr 2023 22:17:48 +0000 (UTC) Authentication-Results: imf20.hostedemail.com; dkim=pass header.d=rivosinc-com.20221208.gappssmtp.com header.s=20221208 header.b=fB9b4YMt; spf=pass (imf20.hostedemail.com: domain of atishp@rivosinc.com designates 209.85.214.174 as permitted sender) smtp.mailfrom=atishp@rivosinc.com; dmarc=none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1681942668; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=xru1T6bsi1+3ZKp8XjmLeeEUO6sc9QurHQCwhhM84HA=; b=ZEABtLbKj7e8svO4hX09mRpBXa6B9fnfKQMBuAvet9ZgeAO6Q23aBGgdQa/p1HuU3aaR49 13qx5eyU0dF3ibG3NoEVVCnh6IMkF5DzJ8q/73yGlfZpnj8+OTnREid/qkEqOhdDHdrimQ WuTGeFA34NYQQa2dk/gLsTSzG+XYe/M= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1681942668; a=rsa-sha256; cv=none; b=ggwKR3zn1SyP5AhWItTo20zs47Q7SslA629BgOgUbzy1M4Q/+g/KqYuK0bEgsAH9pAnZIT CixC+PCtzjVX98nAGja0peZa2y8JKl3zPWTNmmUNepKT0CDv1pnZ+U/FJoIdSfJHJsn83F kiEU0s4uQD9bX3O6g5tfGVL+X9ylShQ= ARC-Authentication-Results: i=1; imf20.hostedemail.com; dkim=pass header.d=rivosinc-com.20221208.gappssmtp.com header.s=20221208 header.b=fB9b4YMt; spf=pass (imf20.hostedemail.com: domain of atishp@rivosinc.com designates 209.85.214.174 as permitted sender) smtp.mailfrom=atishp@rivosinc.com; dmarc=none Received: by mail-pl1-f174.google.com with SMTP id d9443c01a7336-1a8097c1ccfso5298905ad.1 for <linux-mm@kvack.org>; Wed, 19 Apr 2023 15:17:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rivosinc-com.20221208.gappssmtp.com; s=20221208; t=1681942667; x=1684534667; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=xru1T6bsi1+3ZKp8XjmLeeEUO6sc9QurHQCwhhM84HA=; b=fB9b4YMtcQOYrcKj9/GWzeONjcxKP2oeywQTvv9jgtHPhKMG6piGSirEiNQPiRUSw/ TNDD98EsCQRHJb8o4KR/40iwkDz2iCL9O1Q5D4OApUqfzyyueF2pWWXu9oUBTr1sBd7r qN8+st+530NNWaQglZ+vx32ZFpdd6jtoI22iSuSF0a+tcpVy60XJq7vb5hms8XM51miU EUekIXnr0Cbflr87WbR+EkVxvu0imyYB9o1bwvrkRw5vQJ9T+Gvh04UNMDx3e/rdtmef Rhm+A3oBDjRklFUpsePBjaVMWeVQWCFlRT5JvPLYOIPW/X1HEUctXf38yhKlTJ/Aw1FH TvXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1681942667; x=1684534667; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=xru1T6bsi1+3ZKp8XjmLeeEUO6sc9QurHQCwhhM84HA=; b=itL1bWkS6cGBfMvkRBsuu6CIGSE+MXeSqmXKDrX+WsRBAjQr//CMQJ7S9bkKHfZx3s G44jimiqchiTBIktwSwwpX9wgYZGfbE27wDzXTsoWzL4tBfRKtbmM7/0V7Z6b0v3H1eD itnDFJ//eYX/ngzHpZcTvoK4LdYgirrBR13zBSsUqI4QiIYGbPnOzIXLmS47oCMU8gia 60dObDr/BEeLY5C1SQJktfutmJIQy8mNsRn6nVA6Z66Z+dY2b5KBqsxm0m874ok8uEhj 5Nhy1hVFqpKb7Gjo0EAJv0V4LZndMtfsHX1F8609FhBZq93BBUb6vYsoNdztc9DH5/W+ 4G0Q== X-Gm-Message-State: AAQBX9d/0DErO1gI6uKGrNUJUfd9gv+3H2+Vu8jd+UKX7RnWytHw8IMl zGuCcBGI39AToJKl/tnzTRAMjQ== X-Google-Smtp-Source: AKy350Ze6w+VITNJKc37wiOWND61z06Oiijk/jlDr4gywczSxyZvsezIoz1E2Y/uHqG7LrTSWYdlBg== X-Received: by 2002:a17:902:f682:b0:1a1:f5dd:2dce with SMTP id l2-20020a170902f68200b001a1f5dd2dcemr8068605plg.6.1681942667389; Wed, 19 Apr 2023 15:17:47 -0700 (PDT) Received: from atishp.ba.rivosinc.com ([66.220.2.162]) by smtp.gmail.com with ESMTPSA id jn11-20020a170903050b00b00196807b5189sm11619190plb.292.2023.04.19.15.17.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 19 Apr 2023 15:17:47 -0700 (PDT) From: Atish Patra <atishp@rivosinc.com> To: linux-kernel@vger.kernel.org Cc: Atish Patra <atishp@rivosinc.com>, Alexandre Ghiti <alex@ghiti.fr>, Andrew Jones <ajones@ventanamicro.com>, Andrew Morton <akpm@linux-foundation.org>, Anup Patel <anup@brainfault.org>, Atish Patra <atishp@atishpatra.org>, =?utf-8?b?QmrDtnJuIFTDtnBlbA==?= <bjorn@rivosinc.com>, Suzuki K Poulose <suzuki.poulose@arm.com>, Will Deacon <will@kernel.org>, Marc Zyngier <maz@kernel.org>, Sean Christopherson <seanjc@google.com>, linux-coco@lists.linux.dev, Dylan Reid <dylan@rivosinc.com>, abrestic@rivosinc.com, Samuel Ortiz <sameo@rivosinc.com>, Christoph Hellwig <hch@infradead.org>, Conor Dooley <conor.dooley@microchip.com>, Greg Kroah-Hartman <gregkh@linuxfoundation.org>, Guo Ren <guoren@kernel.org>, Heiko Stuebner <heiko@sntech.de>, Jiri Slaby <jirislaby@kernel.org>, kvm-riscv@lists.infradead.org, kvm@vger.kernel.org, linux-mm@kvack.org, linux-riscv@lists.infradead.org, Mayuresh Chitale <mchitale@ventanamicro.com>, Palmer Dabbelt <palmer@dabbelt.com>, Paolo Bonzini <pbonzini@redhat.com>, Paul Walmsley <paul.walmsley@sifive.com>, Rajnesh Kanwal <rkanwal@rivosinc.com>, Uladzislau Rezki <urezki@gmail.com> Subject: [RFC 08/48] RISC-V: KVM: Add UABI to support static memory region attestation Date: Wed, 19 Apr 2023 15:16:36 -0700 Message-Id: <20230419221716.3603068-9-atishp@rivosinc.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230419221716.3603068-1-atishp@rivosinc.com> References: <20230419221716.3603068-1-atishp@rivosinc.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Rspam-User: X-Rspamd-Queue-Id: 7DE791C0015 X-Rspamd-Server: rspam09 X-Stat-Signature: swooh4anunbpfm1iza9kn9x1a7m99taw X-HE-Tag: 1681942668-429571 X-HE-Meta: U2FsdGVkX1/CLDAUGI3RS7NCICUsIDZ3TTc7ZYAygwKtjSCGZBWDaUwWNbC4jQ30xB9cmMEA4UVGgLinwGblOjYXHFrau0OdXwNxy3ZtZyFt8Q4MwUxkmmuZ9h/k6mkJSQH9i8m6upKp/cx4T1NgzbRP5uhFOMrJ66JqRze97NWV2bS3nkx9aGNO6Q9Egy20TgtJfCgRBUm0AORXLhSftoygB0/r2o2CZqeaxGrVqQ27Tx/xGKD9OzPqEDeuKAxwHqsdYUoYmIsi/SN2j5f1knXtLtnOA6dg2/YUBR3c+XvWKec8hhBroj7jKHX+ASTNYJ3b/hWSbs/agB40dSaYET7oTVTNKcBIi32dU6RwPUc3KmhRZG/GSl2lBSXalc9kYnLldPEgrmD0XYOD0XWzwcfQj4pG2t6GcjTdR+J4x9Nku+UjupEZc9TxN5zJlVLRoNbe988896L1MzDa4sE4+nlZVpF6ESdiwTqFkg1unXz2rH4pNhcmDQrUi8Tj+Zxk2frsRGEdLDoP0FS08bRURtgsPwQUaqZmGn38maQZ4CaRi/A+oSOjjGds/qYmxIAZbVr9g21+5PrWAGa9TaBuuukj5h9llGB6/Ef3A9MzdXUqSx7vUKVXNjl0b9EmoUWlbAODy9YWFIhLch/0QYGsF4R1gOH39/bOXZazqSHgigeqb+OQxb1+VhkTjEwVOu5zbgFVCZxpFtfoFEL+2aywDuq1gtznMKu7khCgUsZkWjhbzoPsHEK3IkXvTzS5nDsM21C/5nWK2osdnjBCfRFGEVTTZB9AYvTj7tBtCU5nV2Ltia2f5aRD39c2eFSfnnzkR3FjpVrw0gbX69VkiLC9mCxmClJTf4+QQ/alYDPz41DP8Z14QxEXGCcvtS/pnrmPd8amFSpANfDzALF9BGK1wfPZprTQVCiNnSpxOpbFRng5mOUKmS1KCiJWEWHbpBT7KLPmtMQZ9t0KvXAwHPK ptJcpsuA Kj8J64Z8XTajxsaHDYthfXQD7Ilu5bSZbikk+z1Vbn09DRN0z1DQW+NuPztW9d7wsM9ehwZtybj3n7birdjOobf6mzukxMWBiTVHG0cf6E/wkDaif4ZvEwKuiYnVzh7iWkIOZ2oo0B71UeeeN4jxIjudkRkiehTxLqBBCnfbF8QWtReFdLWEUcRobBzLg/Kmji5hcgL0RPqewW9CUnCpIbi+PQDNuXuf4YD2aX6mRJm8sRD2pqtz2EGEQscnMVFvGNz43eciRBN5GhSTpG5XRoZOXWpaHI1T0kWvPrRI6yx50aR1giWqPYo0+oiIOxaXs6rbqQDGoU+V0altP8wlkU8yQW17e886IMqvVt9sWxm6JDMwxGZ41PwQNWMYjJSiQABbtEqszdcLPLhea1WT2HARSQkS7j8PDBvoXROsjw3uXfKCj2I1irQ0v/iW3BEu9pzu6Bb97VX3Ow6Cs+FAMhR7xGQ== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: <linux-mm.kvack.org> |
Series |
RISC-V CoVE support
|
expand
|
diff --git a/arch/riscv/include/uapi/asm/kvm.h b/arch/riscv/include/uapi/asm/kvm.h index 11440df..ac3def0 100644 --- a/arch/riscv/include/uapi/asm/kvm.h +++ b/arch/riscv/include/uapi/asm/kvm.h @@ -98,6 +98,18 @@ struct kvm_riscv_timer { __u64 state; }; +/* Memory region details of a CoVE guest that is measured at boot time */ +struct kvm_riscv_cove_measure_region { + /* Address of the user space where the VM code/data resides */ + unsigned long userspace_addr; + + /* The guest physical address where VM code/data should be mapped */ + unsigned long gpa; + + /* Size of the region */ + unsigned long size; +}; + /* * ISA extension IDs specific to KVM. This is not the same as the host ISA * extension IDs as that is internal to the host and should not be exposed diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index a55a6a5..84a73b5 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -1552,6 +1552,8 @@ struct kvm_s390_ucas_mapping { #define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3) #define KVM_ARM_MTE_COPY_TAGS _IOR(KVMIO, 0xb4, struct kvm_arm_copy_mte_tags) +#define KVM_RISCV_COVE_MEASURE_REGION _IOR(KVMIO, 0xb5, struct kvm_riscv_cove_measure_region) + /* ioctl for vm fd */ #define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
To initialize a TVM, a TSM must ensure that all the static memory regions that contain the device tree, the kernel image or initrd for the TVM attested. Some of these information is not usually present with the host and only VMM is aware of these. Introduce an new ioctl which is part of the uABI to support this. Signed-off-by: Atish Patra <atishp@rivosinc.com> --- arch/riscv/include/uapi/asm/kvm.h | 12 ++++++++++++ include/uapi/linux/kvm.h | 2 ++ 2 files changed, 14 insertions(+)