-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Qualcomm feedback] 7.3.2. IDE Link - flow #87
Comments
@ravi Do you confirm that RDSM should intercept the CoVE-IO connection and binding SBI calls to program the IO-MTT? |
we should specifically describe the role of the RDSM w.r.t the IOMTT programming - this may need a seperate interface instead of saying that the RDSM intercepts? So, COVH is the interface between the host and the TSM and covers the interaction of binding a TDI which is under the purview of a RP/IOMMU to a TVM. In that sense, COVH assumes a 1:1 interaction between the hosting domain and the confidential domain TSM. The RDSM OTOH owns programming of the MTT to enforces sup. dom. isolation and that the IOMMUs memory-mapped programming regions are access-restricted to the sup. dom. the IOMMU has been assigned to. So the IOMMU un/assignment ABI should really be serviced by the RDSM. The second interface the RDSM must support is the programming of the SDCL - which maps an IO request to the SDID and IOMMU ID - so this ABI to program the IOMTT is also to be serviced by the RDSM. Through this second ABI function, the RDSM will enforce consistency of the Deviceid/IDE Stream ID --to--> SDID, IOMMU ID assignment when programming rules. |
That would be cleaner indeed. That would be an IOMTT SBI interface then?
Right. An implicit RDSM interception is not ideal in that sense, and also because it implies a semantic knowledge of the CoVE-IO ABI from the RDSM implementation.
That makes sense to me. So we should go ahead and start defining that ABI in the Smmtt spec? |
Maybe more apt to add this abi sub-extension in this spec (cove-io)? |
Yes, that's probably the best place to define those. I'll park this as a 0.3.0 item for the specification. |
Reference: https://lists.riscv.org/g/tech-ap-tee-io/topic/103498833#47
It is not stated that IOMMU-MTT must also be enforced for any given SDID/TSM (prerequisite).
How/when should RDSM update IOMMU-MTT PTEs for a given trusted device?
The text was updated successfully, but these errors were encountered: