On Tue, 07 Feb 2023 17:50:59 +0000, James Morse <james.morse@xxxxxxx> wrote: > > Hi Oliver, > > On 03/02/2023 21:08, Oliver Upton wrote: > > On Fri, Feb 03, 2023 at 01:50:40PM +0000, James Morse wrote: > >> From: Jean-Philippe Brucker <jean-philippe@xxxxxxxxxx> > >> > >> When capability KVM_CAP_ARM_HVC_TO_USER is available, userspace can > >> request to handle all hypercalls that aren't handled by KVM. > > > I would very much prefer we not go down this route. This capability > > effectively constructs an ABI out of what KVM presently does not > > implement. What would happen if KVM decides to implement a new set > > of hypercalls later down the road that were previously forwarded to > > userspace? > > The user-space support would never get called. If we have a > wild-west allocation of IDs in this area we have bigger > problems. I'd hope in this example it would be a VMM or an in-kernel > implementation of the same feature. > > When I floated something like this before for supporting SDEI in > guests, Christoffer didn't like tie-ing KVM to SMC-CC - hence the > all or nothing. > > Since then we've had things like Spectre, which I don't think the > VMM should ever be allowed to handle, which makes the whole thing > much murkier. That ship has sailed a long time ago. We also have grown a bunch of in-kernel SMCCC services that are KVM specific (the silly PTP stuff, for example, not to mention all the pKVM hypercalls...). It is also likely that these ranges will grow over time (it has been a long time since the last drop of Spectre-like crap, and something must be brewing somewhere), so a level of discrimination is important. M. -- Without deviation from the norm, progress is not possible.