Re: [PATCH V14 10/10] arm/arm64: KVM: add guest SEA support

2017-03-28 Thread Christoffer Dall
On Tue, Mar 28, 2017 at 03:33:17PM -0600, Baicar, Tyler wrote:
> Hello Christoffer,
> 
> 
> On 3/28/2017 2:26 PM, Christoffer Dall wrote:
> >On Tue, Mar 28, 2017 at 01:30:40PM -0600, Tyler Baicar wrote:
> >>Currently external aborts are unsupported by the guest abort
> >>handling. Add handling for SEAs so that the host kernel reports
> >>SEAs which occur in the guest kernel.
> >>
> >>When an SEA occurs in the guest kernel, the guest exits and is
> >>routed to kvm_handle_guest_abort(). Prior to this patch, a print
> >>message of an unsupported FSC would be printed and nothing else
> >>would happen. With this patch, the code gets routed to the APEI
> >>handling of SEAs in the host kernel to report the SEA information.
> >>
> >>Signed-off-by: Tyler Baicar 
> >>Acked-by: Catalin Marinas 
> >>Acked-by: Marc Zyngier 
> >>---
> >>  arch/arm/include/asm/kvm_arm.h   | 10 ++
> >>  arch/arm/include/asm/system_misc.h   |  5 +
> >>  arch/arm/kvm/mmu.c   | 34 
> >> +++---
> >>  arch/arm64/include/asm/kvm_arm.h | 10 ++
> >>  arch/arm64/include/asm/system_misc.h |  2 ++
> >>  arch/arm64/mm/fault.c| 23 +--
> >>  drivers/acpi/apei/ghes.c | 13 +++--
> >>  include/acpi/ghes.h  |  2 +-
> >>  8 files changed, 87 insertions(+), 12 deletions(-)
> >>
> >>diff --git a/arch/arm/include/asm/kvm_arm.h b/arch/arm/include/asm/kvm_arm.h
> >>index a3f0b3d..ebf020b 100644
> >>--- a/arch/arm/include/asm/kvm_arm.h
> >>+++ b/arch/arm/include/asm/kvm_arm.h
> >>@@ -187,6 +187,16 @@
> >>  #define FSC_FAULT (0x04)
> >>  #define FSC_ACCESS(0x08)
> >>  #define FSC_PERM  (0x0c)
> >>+#define FSC_SEA(0x10)
> >>+#define FSC_SEA_TTW0   (0x14)
> >>+#define FSC_SEA_TTW1   (0x15)
> >>+#define FSC_SEA_TTW2   (0x16)
> >>+#define FSC_SEA_TTW3   (0x17)
> >>+#define FSC_SECC   (0x18)
> >>+#define FSC_SECC_TTW0  (0x1c)
> >>+#define FSC_SECC_TTW1  (0x1d)
> >>+#define FSC_SECC_TTW2  (0x1e)
> >>+#define FSC_SECC_TTW3  (0x1f)
> >>  /* Hyp Prefetch Fault Address Register (HPFAR/HDFAR) */
> >>  #define HPFAR_MASK(~0xf)
> >>diff --git a/arch/arm/include/asm/system_misc.h 
> >>b/arch/arm/include/asm/system_misc.h
> >>index a3d61ad..8c4a89f 100644
> >>--- a/arch/arm/include/asm/system_misc.h
> >>+++ b/arch/arm/include/asm/system_misc.h
> >>@@ -22,6 +22,11 @@
> >>  extern unsigned int user_debug;
> >>+static inline int handle_guest_sea(phys_addr_t addr, unsigned int esr)
> >>+{
> >>+   return -1;
> >>+}
> >>+
> >>  #endif /* !__ASSEMBLY__ */
> >>  #endif /* __ASM_ARM_SYSTEM_MISC_H */
> >>diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
> >>index 962616f..9a977c8 100644
> >>--- a/arch/arm/kvm/mmu.c
> >>+++ b/arch/arm/kvm/mmu.c
> >>@@ -29,6 +29,7 @@
> >>  #include 
> >>  #include 
> >>  #include 
> >>+#include 
> >>  #include "trace.h"
> >>@@ -1406,6 +1407,24 @@ static void handle_access_fault(struct kvm_vcpu 
> >>*vcpu, phys_addr_t fault_ipa)
> >>kvm_set_pfn_accessed(pfn);
> >>  }
> >>+static bool is_abort_sea(unsigned long fault_status) {
> >>+   switch (fault_status) {
> >>+   case FSC_SEA:
> >>+   case FSC_SEA_TTW0:
> >>+   case FSC_SEA_TTW1:
> >>+   case FSC_SEA_TTW2:
> >>+   case FSC_SEA_TTW3:
> >>+   case FSC_SECC:
> >>+   case FSC_SECC_TTW0:
> >>+   case FSC_SECC_TTW1:
> >>+   case FSC_SECC_TTW2:
> >>+   case FSC_SECC_TTW3:
> >>+   return true;
> >>+   default:
> >>+   return false;
> >>+   }
> >>+}
> >>+
> >>  /**
> >>   * kvm_handle_guest_abort - handles all 2nd stage aborts
> >>   * @vcpu: the VCPU pointer
> >>@@ -1428,19 +1447,28 @@ int kvm_handle_guest_abort(struct kvm_vcpu *vcpu, 
> >>struct kvm_run *run)
> >>gfn_t gfn;
> >>int ret, idx;
> >>+   fault_status = kvm_vcpu_trap_get_fault_type(vcpu);
> >>+
> >>+   fault_ipa = kvm_vcpu_get_fault_ipa(vcpu);
> >>+
> >>+   /*
> >>+* The host kernel will handle the synchronous external abort. There
> >>+* is no need to pass the error into the guest.
> >>+*/
> >>+   if (is_abort_sea(fault_status))
> >>+   if (!handle_guest_sea(fault_ipa, kvm_vcpu_get_hsr(vcpu)))
> >>+   return 1;
> >>+
> >So what's the logic in presenting this as a vabt to the guest when the
> >host couldn't handle it?  What do you do in other parts of the kernel if
> >you see an abort that the host cannot handle?
> The only cases that handle_guest_sea() will not return zero are
> there is no error to process
> (firmware support isn't there) or the error populated is invalid. If
> there is no error to process,
> we want to continue here with the handling that exists. If the error
> is invalid then GHES will
> report that and since the error wasn't handled properly we should
> continue with existing
> handling.
> 
> If there is an abort that GHES fails to handle in the host then GHES
> just reports that and we

Re: [PATCH V14 10/10] arm/arm64: KVM: add guest SEA support

2017-03-28 Thread Baicar, Tyler

Hello Christoffer,


On 3/28/2017 2:26 PM, Christoffer Dall wrote:

On Tue, Mar 28, 2017 at 01:30:40PM -0600, Tyler Baicar wrote:

Currently external aborts are unsupported by the guest abort
handling. Add handling for SEAs so that the host kernel reports
SEAs which occur in the guest kernel.

When an SEA occurs in the guest kernel, the guest exits and is
routed to kvm_handle_guest_abort(). Prior to this patch, a print
message of an unsupported FSC would be printed and nothing else
would happen. With this patch, the code gets routed to the APEI
handling of SEAs in the host kernel to report the SEA information.

Signed-off-by: Tyler Baicar 
Acked-by: Catalin Marinas 
Acked-by: Marc Zyngier 
---
  arch/arm/include/asm/kvm_arm.h   | 10 ++
  arch/arm/include/asm/system_misc.h   |  5 +
  arch/arm/kvm/mmu.c   | 34 +++---
  arch/arm64/include/asm/kvm_arm.h | 10 ++
  arch/arm64/include/asm/system_misc.h |  2 ++
  arch/arm64/mm/fault.c| 23 +--
  drivers/acpi/apei/ghes.c | 13 +++--
  include/acpi/ghes.h  |  2 +-
  8 files changed, 87 insertions(+), 12 deletions(-)

diff --git a/arch/arm/include/asm/kvm_arm.h b/arch/arm/include/asm/kvm_arm.h
index a3f0b3d..ebf020b 100644
--- a/arch/arm/include/asm/kvm_arm.h
+++ b/arch/arm/include/asm/kvm_arm.h
@@ -187,6 +187,16 @@
  #define FSC_FAULT (0x04)
  #define FSC_ACCESS(0x08)
  #define FSC_PERM  (0x0c)
+#define FSC_SEA(0x10)
+#define FSC_SEA_TTW0   (0x14)
+#define FSC_SEA_TTW1   (0x15)
+#define FSC_SEA_TTW2   (0x16)
+#define FSC_SEA_TTW3   (0x17)
+#define FSC_SECC   (0x18)
+#define FSC_SECC_TTW0  (0x1c)
+#define FSC_SECC_TTW1  (0x1d)
+#define FSC_SECC_TTW2  (0x1e)
+#define FSC_SECC_TTW3  (0x1f)
  
  /* Hyp Prefetch Fault Address Register (HPFAR/HDFAR) */

  #define HPFAR_MASK(~0xf)
diff --git a/arch/arm/include/asm/system_misc.h 
b/arch/arm/include/asm/system_misc.h
index a3d61ad..8c4a89f 100644
--- a/arch/arm/include/asm/system_misc.h
+++ b/arch/arm/include/asm/system_misc.h
@@ -22,6 +22,11 @@
  
  extern unsigned int user_debug;
  
+static inline int handle_guest_sea(phys_addr_t addr, unsigned int esr)

+{
+   return -1;
+}
+
  #endif /* !__ASSEMBLY__ */
  
  #endif /* __ASM_ARM_SYSTEM_MISC_H */

diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
index 962616f..9a977c8 100644
--- a/arch/arm/kvm/mmu.c
+++ b/arch/arm/kvm/mmu.c
@@ -29,6 +29,7 @@
  #include 
  #include 
  #include 
+#include 
  
  #include "trace.h"
  
@@ -1406,6 +1407,24 @@ static void handle_access_fault(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa)

kvm_set_pfn_accessed(pfn);
  }
  
+static bool is_abort_sea(unsigned long fault_status) {

+   switch (fault_status) {
+   case FSC_SEA:
+   case FSC_SEA_TTW0:
+   case FSC_SEA_TTW1:
+   case FSC_SEA_TTW2:
+   case FSC_SEA_TTW3:
+   case FSC_SECC:
+   case FSC_SECC_TTW0:
+   case FSC_SECC_TTW1:
+   case FSC_SECC_TTW2:
+   case FSC_SECC_TTW3:
+   return true;
+   default:
+   return false;
+   }
+}
+
  /**
   * kvm_handle_guest_abort - handles all 2nd stage aborts
   * @vcpu: the VCPU pointer
@@ -1428,19 +1447,28 @@ int kvm_handle_guest_abort(struct kvm_vcpu *vcpu, 
struct kvm_run *run)
gfn_t gfn;
int ret, idx;
  
+	fault_status = kvm_vcpu_trap_get_fault_type(vcpu);

+
+   fault_ipa = kvm_vcpu_get_fault_ipa(vcpu);
+
+   /*
+* The host kernel will handle the synchronous external abort. There
+* is no need to pass the error into the guest.
+*/
+   if (is_abort_sea(fault_status))
+   if (!handle_guest_sea(fault_ipa, kvm_vcpu_get_hsr(vcpu)))
+   return 1;
+

So what's the logic in presenting this as a vabt to the guest when the
host couldn't handle it?  What do you do in other parts of the kernel if
you see an abort that the host cannot handle?
The only cases that handle_guest_sea() will not return zero are there is 
no error to process
(firmware support isn't there) or the error populated is invalid. If 
there is no error to process,
we want to continue here with the handling that exists. If the error is 
invalid then GHES will
report that and since the error wasn't handled properly we should 
continue with existing

handling.

If there is an abort that GHES fails to handle in the host then GHES 
just reports that and we

also continue with the abort handling.


nit: I'd prefer to see braces around the the multi-line block above.

I will add braces.




is_iabt = kvm_vcpu_trap_is_iabt(vcpu);
if (unlikely(!is_iabt && kvm_vcpu_dabt_isextabt(vcpu))) {
kvm_inject_vabt(vcpu);
return 1;
}
  
-	fault_ipa = kvm_vcpu_get_fault_ipa(vcpu);

-
trace_kvm_guest_fault(*vcpu_pc(vcpu), 

Re: [PATCH V14 10/10] arm/arm64: KVM: add guest SEA support

2017-03-28 Thread Christoffer Dall
On Tue, Mar 28, 2017 at 01:30:40PM -0600, Tyler Baicar wrote:
> Currently external aborts are unsupported by the guest abort
> handling. Add handling for SEAs so that the host kernel reports
> SEAs which occur in the guest kernel.
> 
> When an SEA occurs in the guest kernel, the guest exits and is
> routed to kvm_handle_guest_abort(). Prior to this patch, a print
> message of an unsupported FSC would be printed and nothing else
> would happen. With this patch, the code gets routed to the APEI
> handling of SEAs in the host kernel to report the SEA information.
> 
> Signed-off-by: Tyler Baicar 
> Acked-by: Catalin Marinas 
> Acked-by: Marc Zyngier 
> ---
>  arch/arm/include/asm/kvm_arm.h   | 10 ++
>  arch/arm/include/asm/system_misc.h   |  5 +
>  arch/arm/kvm/mmu.c   | 34 +++---
>  arch/arm64/include/asm/kvm_arm.h | 10 ++
>  arch/arm64/include/asm/system_misc.h |  2 ++
>  arch/arm64/mm/fault.c| 23 +--
>  drivers/acpi/apei/ghes.c | 13 +++--
>  include/acpi/ghes.h  |  2 +-
>  8 files changed, 87 insertions(+), 12 deletions(-)
> 
> diff --git a/arch/arm/include/asm/kvm_arm.h b/arch/arm/include/asm/kvm_arm.h
> index a3f0b3d..ebf020b 100644
> --- a/arch/arm/include/asm/kvm_arm.h
> +++ b/arch/arm/include/asm/kvm_arm.h
> @@ -187,6 +187,16 @@
>  #define FSC_FAULT(0x04)
>  #define FSC_ACCESS   (0x08)
>  #define FSC_PERM (0x0c)
> +#define FSC_SEA  (0x10)
> +#define FSC_SEA_TTW0 (0x14)
> +#define FSC_SEA_TTW1 (0x15)
> +#define FSC_SEA_TTW2 (0x16)
> +#define FSC_SEA_TTW3 (0x17)
> +#define FSC_SECC (0x18)
> +#define FSC_SECC_TTW0(0x1c)
> +#define FSC_SECC_TTW1(0x1d)
> +#define FSC_SECC_TTW2(0x1e)
> +#define FSC_SECC_TTW3(0x1f)
>  
>  /* Hyp Prefetch Fault Address Register (HPFAR/HDFAR) */
>  #define HPFAR_MASK   (~0xf)
> diff --git a/arch/arm/include/asm/system_misc.h 
> b/arch/arm/include/asm/system_misc.h
> index a3d61ad..8c4a89f 100644
> --- a/arch/arm/include/asm/system_misc.h
> +++ b/arch/arm/include/asm/system_misc.h
> @@ -22,6 +22,11 @@
>  
>  extern unsigned int user_debug;
>  
> +static inline int handle_guest_sea(phys_addr_t addr, unsigned int esr)
> +{
> + return -1;
> +}
> +
>  #endif /* !__ASSEMBLY__ */
>  
>  #endif /* __ASM_ARM_SYSTEM_MISC_H */
> diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
> index 962616f..9a977c8 100644
> --- a/arch/arm/kvm/mmu.c
> +++ b/arch/arm/kvm/mmu.c
> @@ -29,6 +29,7 @@
>  #include 
>  #include 
>  #include 
> +#include 
>  
>  #include "trace.h"
>  
> @@ -1406,6 +1407,24 @@ static void handle_access_fault(struct kvm_vcpu *vcpu, 
> phys_addr_t fault_ipa)
>   kvm_set_pfn_accessed(pfn);
>  }
>  
> +static bool is_abort_sea(unsigned long fault_status) {
> + switch (fault_status) {
> + case FSC_SEA:
> + case FSC_SEA_TTW0:
> + case FSC_SEA_TTW1:
> + case FSC_SEA_TTW2:
> + case FSC_SEA_TTW3:
> + case FSC_SECC:
> + case FSC_SECC_TTW0:
> + case FSC_SECC_TTW1:
> + case FSC_SECC_TTW2:
> + case FSC_SECC_TTW3:
> + return true;
> + default:
> + return false;
> + }
> +}
> +
>  /**
>   * kvm_handle_guest_abort - handles all 2nd stage aborts
>   * @vcpu:the VCPU pointer
> @@ -1428,19 +1447,28 @@ int kvm_handle_guest_abort(struct kvm_vcpu *vcpu, 
> struct kvm_run *run)
>   gfn_t gfn;
>   int ret, idx;
>  
> + fault_status = kvm_vcpu_trap_get_fault_type(vcpu);
> +
> + fault_ipa = kvm_vcpu_get_fault_ipa(vcpu);
> +
> + /*
> +  * The host kernel will handle the synchronous external abort. There
> +  * is no need to pass the error into the guest.
> +  */
> + if (is_abort_sea(fault_status))
> + if (!handle_guest_sea(fault_ipa, kvm_vcpu_get_hsr(vcpu)))
> + return 1;
> +

So what's the logic in presenting this as a vabt to the guest when the
host couldn't handle it?  What do you do in other parts of the kernel if
you see an abort that the host cannot handle?

nit: I'd prefer to see braces around the the multi-line block above.


>   is_iabt = kvm_vcpu_trap_is_iabt(vcpu);
>   if (unlikely(!is_iabt && kvm_vcpu_dabt_isextabt(vcpu))) {
>   kvm_inject_vabt(vcpu);
>   return 1;
>   }
>  
> - fault_ipa = kvm_vcpu_get_fault_ipa(vcpu);
> -
>   trace_kvm_guest_fault(*vcpu_pc(vcpu), kvm_vcpu_get_hsr(vcpu),
> kvm_vcpu_get_hfar(vcpu), fault_ipa);
>  
>   /* Check the stage-2 fault is trans. fault or write fault */
> - fault_status = kvm_vcpu_trap_get_fault_type(vcpu);
>   if (fault_status != FSC_FAULT && fault_status != FSC_PERM &&
>   fault_status != FSC_ACCESS) {
>   kvm_err("Unsupported FSC: EC=%#x xFSC=%#lx ESR_EL2=%#lx\n",
> diff --git a/arch/arm64/include/asm/kvm_arm.h 
>