Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755927AbdIHQSv (ORCPT ); Fri, 8 Sep 2017 12:18:51 -0400 Received: from szxga03-in.huawei.com ([45.249.212.189]:10905 "EHLO szxga03-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751543AbdIHQSq (ORCPT ); Fri, 8 Sep 2017 12:18:46 -0400 From: gengdongjiu To: Peter Maydell CC: "Michael S. Tsirkin" , Igor Mammedov , Zhaoshenglong , "Paolo Bonzini" , QEMU Developers , qemu-arm , kvm-devel , "edk2-devel@lists.01.org" , Christoffer Dall , Marc Zyngier , "Will Deacon" , James Morse , Tyler Baicar , Ard Biesheuvel , "Ingo Molnar" , "bp@suse.de" , Shiju Jose , "zjzhang@codeaurora.org" , arm-mail-list , "kvmarm@lists.cs.columbia.edu" , "lkml - Kernel Mailing List" , "linux-acpi@vger.kernel.org" , "devel@acpica.org" , "John Garry" , Jonathan Cameron , Shameerali Kolothum Thodi , huangdaode , "Wangzhou (B)" , Huangshaoyu , Wuquanming , Linuxarm , "Zhengqiang (turing)" Subject: Re: [PATCH v11 5/6] target-arm: kvm64: handle SIGBUS signal for synchronous External Abort Thread-Topic: [PATCH v11 5/6] target-arm: kvm64: handle SIGBUS signal for synchronous External Abort Thread-Index: AdMotzo77KrXAu/nR2mgQkVAQIVn8w== Date: Fri, 8 Sep 2017 16:17:46 +0000 Message-ID: <0184EA26B2509940AA629AE1405DD7F2015F5F11@DGGEMA503-MBX.china.huawei.com> Accept-Language: zh-CN, en-US Content-Language: zh-CN X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.45.61.121] Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020203.59B2C2BC.01DD,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0, ip=169.254.1.143, so=2014-11-16 11:51:01, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: a8cb77cfc913f833774c729c8216d47b Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by nfs id v88GIvQZ022091 Content-Length: 14729 Lines: 405 Hi peter, Sorry for the late response. > > On 18 August 2017 at 15:23, Dongjiu Geng wrote: > > Add SIGBUS signal handler. In this handler, it checks the exception > > type, translates the host VA which is delivered by host or KVM to > > guest PA, then fills this PA to CPER, finally injects a Error to guest > > OS through KVM. > > > > Add synchronous external abort injection logic, setup spsr_elx, > > esr_elx, PSTATE, far_elx, elr_elx etc, when switch to guest OS, it > > will jump to the synchronous external abort vector table entry. > > > > Signed-off-by: Dongjiu Geng > > Signed-off-by: Quanming Wu > > --- > > include/sysemu/kvm.h | 2 +- > > linux-headers/asm-arm64/kvm.h | 5 ++ > > target/arm/internals.h | 13 ++++ > > target/arm/kvm.c | 34 ++++++++++ > > target/arm/kvm64.c | 150 ++++++++++++++++++++++++++++++++++++++++++ > > target/arm/kvm_arm.h | 1 + > > 6 files changed, 204 insertions(+), 1 deletion(-) > > Have you tested whether this patchset builds OK on aarch32 ? Sorry, I have not tested the build on aarch32, because we only support RAS extension on aarch64 in software. I will fix the build issue on aarch32. > > > diff --git a/include/sysemu/kvm.h b/include/sysemu/kvm.h index > > 3a458f5..90c1605 100644 > > --- a/include/sysemu/kvm.h > > +++ b/include/sysemu/kvm.h > > @@ -361,7 +361,7 @@ bool kvm_vcpu_id_is_valid(int vcpu_id); > > /* Returns VCPU ID to be used on KVM_CREATE_VCPU ioctl() */ unsigned > > long kvm_arch_vcpu_id(CPUState *cpu); > > > > -#ifdef TARGET_I386 > > +#if defined(TARGET_I386) || defined(TARGET_AARCH64) > > #define KVM_HAVE_MCE_INJECTION 1 > > void kvm_arch_on_sigbus_vcpu(CPUState *cpu, int code, void *addr); > > #endif diff --git a/linux-headers/asm-arm64/kvm.h > > b/linux-headers/asm-arm64/kvm.h index d254700..5909c30 100644 > > --- a/linux-headers/asm-arm64/kvm.h > > +++ b/linux-headers/asm-arm64/kvm.h > > @@ -181,6 +181,11 @@ struct kvm_arch_memory_slot { #define > > KVM_REG_ARM64_SYSREG_OP2_MASK 0x0000000000000007 #define > > KVM_REG_ARM64_SYSREG_OP2_SHIFT 0 > > > > +/* AArch64 fault registers */ > > +#define KVM_REG_ARM64_FAULT (0x0014 << KVM_REG_ARM_COPROC_SHIFT) > > +#define KVM_REG_ARM64_FAULT_ESR_EC (0) > > +#define KVM_REG_ARM64_FAULT_FAR (1) > > + > > #define ARM64_SYS_REG_SHIFT_MASK(x,n) \ > > (((x) << KVM_REG_ARM64_SYSREG_ ## n ## _SHIFT) & \ > > KVM_REG_ARM64_SYSREG_ ## n ## _MASK) > > Again, linux-headers changes need to go in their own header sync patch. Ok. > > > diff --git a/target/arm/internals.h b/target/arm/internals.h index > > 1f6efef..fc0ad6d 100644 > > --- a/target/arm/internals.h > > +++ b/target/arm/internals.h > > @@ -235,6 +235,19 @@ enum arm_exception_class { #define > > ARM_EL_ISV_SHIFT 24 #define ARM_EL_IL (1 << ARM_EL_IL_SHIFT) #define > > ARM_EL_ISV (1 << ARM_EL_ISV_SHIFT) > > +#define ARM_EL_EC_MASK ((0x3F) << ARM_EL_EC_SHIFT) #define > > +ARM_EL_FSC_TYPE (0x3C) > > + > > +#define FSC_SEA (0x10) > > +#define FSC_SEA_TTW0 (0x14) > > +#define FSC_SEA_TTW1 (0x15) > > +#define FSC_SEA_TTW2 (0x16) > > +#define FSC_SEA_TTW3 (0x17) > > +#define FSC_SECC (0x18) > > +#define FSC_SECC_TTW0 (0x1c) > > +#define FSC_SECC_TTW1 (0x1d) > > +#define FSC_SECC_TTW2 (0x1e) > > +#define FSC_SECC_TTW3 (0x1f) > > > > /* Utility functions for constructing various kinds of syndrome value. > > * Note that in general we follow the AArch64 syndrome values; in a > > diff --git a/target/arm/kvm.c b/target/arm/kvm.c index > > 7c17f0d..2e1716a 100644 > > --- a/target/arm/kvm.c > > +++ b/target/arm/kvm.c > > @@ -129,6 +129,39 @@ void kvm_arm_destroy_scratch_host_vcpu(int *fdarray) > > } > > } > > > > +typedef struct HWPoisonPage { > > + ram_addr_t ram_addr; > > + QLIST_ENTRY(HWPoisonPage) list; > > +} HWPoisonPage; > > + > > +static QLIST_HEAD(, HWPoisonPage) hwpoison_page_list = > > + QLIST_HEAD_INITIALIZER(hwpoison_page_list); > > + > > +static void kvm_unpoison_all(void *param) { > > + HWPoisonPage *page, *next_page; > > + > > + QLIST_FOREACH_SAFE(page, &hwpoison_page_list, list, next_page) { > > + QLIST_REMOVE(page, list); > > + qemu_ram_remap(page->ram_addr, TARGET_PAGE_SIZE); > > + g_free(page); > > + } > > +} > > + > > +void kvm_hwpoison_page_add(ram_addr_t ram_addr) { > > + HWPoisonPage *page; > > + > > + QLIST_FOREACH(page, &hwpoison_page_list, list) { > > + if (page->ram_addr == ram_addr) { > > + return; > > + } > > + } > > + page = g_new(HWPoisonPage, 1); > > + page->ram_addr = ram_addr; > > + QLIST_INSERT_HEAD(&hwpoison_page_list, page, list); } > > This code has all just been copied-and-pasted from target/i386/kvm.c. > Please instead abstract it out properly into a cpu-independent source file. Yes, it copied from x86. Do you mean abstracting this code to a common folder so that i386 and arm platform share it? > > > static void kvm_arm_host_cpu_class_init(ObjectClass *oc, void *data) > > { > > ARMHostCPUClass *ahcc = ARM_HOST_CPU_CLASS(oc); @@ -182,6 +215,7 > > @@ int kvm_arch_init(MachineState *ms, KVMState *s) > > > > cap_has_mp_state = kvm_check_extension(s, KVM_CAP_MP_STATE); > > [...] > > +static int kvm_arm_cpreg_value(ARMCPU *cpu, ptrdiff_t fieldoffset) { > > + int i; > > + > > + for (i = 0; i < cpu->cpreg_array_len; i++) { > > + uint32_t regidx = kvm_to_cpreg_id(cpu->cpreg_indexes[i]); > > + const ARMCPRegInfo *ri; > > + ri = get_arm_cp_reginfo(cpu->cp_regs, regidx); > > + if (!ri) { > > + continue; > > + } > > + > > + if (ri->type & ARM_CP_NO_RAW) { > > + continue; > > + } > > + > > + if (ri->fieldoffset == fieldoffset) { > > + cpu->cpreg_values[i] = read_raw_cp_reg(&cpu->env, ri); > > + return 0; > > + } > > + } > > + return -EINVAL; > > What is this ??? You should never need to look up things in the cpreg arrays by fieldoffset. I used it to set the esr_el1's and far_el1's value, for example: /* set ESR_EL1 */ ret = kvm_arm_cpreg_value(cpu, offsetof(CPUARMState, cp15.esr_el[1])); /* set FAR_EL1 */ ret = kvm_arm_cpreg_value(cpu, offsetof(CPUARMState, cp15.far_el[1])); other people suggests me injecting the synchronous exception abort in the user space, so I need to set the esr_el1 and far_el1's value So use the added API kvm_arm_cpreg_value() to set their value. If not used it, do you better method to set their value? > > The code for handling debug exits (software step, watchpoint, etc) is probably a good place to look for how to deal with register state. > > > +} > > + > > +/* Inject synchronous external abort */ static int > > +kvm_inject_arm_sea(CPUState *c) { > > + ARMCPU *cpu = ARM_CPU(c); > > + CPUARMState *env = &cpu->env; > > + unsigned long cpsr = pstate_read(env); > > + uint32_t esr = 0; > > + int ret; > > + > > + c->exception_index = EXCP_DATA_ABORT; > > + /* Inject the exception to El1 */ > > + env->exception.target_el = 1; > > + CPUClass *cc = CPU_GET_CLASS(c); > > + > > + esr |= (EC_DATAABORT << ARM_EL_EC_SHIFT); > > We have functions in internals.h for constructing ESR values, please use them. Ok, thanks for the reminder, I will check it in internals.h > > > + /* This exception syndrome includes {I,D}FSC in the bits [5:0] > > + */ > > + esr |= (env->exception.syndrome & 0x3f); > > + > > + /* This exception is EL0 or EL1 fault. */ > > + if ((cpsr & 0xf) == PSTATE_MODE_EL0t) { > > + esr |= (EC_INSNABORT << ARM_EL_EC_SHIFT); > > + } else { > > + esr |= (EC_INSNABORT_SAME_EL << ARM_EL_EC_SHIFT); > > + } > > + > > + /* In the aarch64, there is only 32-bit instruction*/ > > + esr |= ARM_EL_IL; > > + env->exception.syndrome = esr; > > + cc->do_interrupt(c); > > + > > + /* set ESR_EL1 */ > > + ret = kvm_arm_cpreg_value(cpu, offsetof(CPUARMState, > > + cp15.esr_el[1])); > > + > > + if (ret) { > > + fprintf(stderr, "<%s> failed to set esr_el1\n", __func__); > > + abort(); > > + } > > + > > + /* set FAR_EL1 */ > > + ret = kvm_arm_cpreg_value(cpu, offsetof(CPUARMState, cp15.far_el[1])); > > + if (ret) { > > + fprintf(stderr, "<%s> failed to set far_el1\n", __func__); > > + abort(); > > + } > > + > > + return 0; > > +} > > + > > #define AARCH64_CORE_REG(x) (KVM_REG_ARM64 | KVM_REG_SIZE_U64 | \ > > KVM_REG_ARM_CORE | KVM_REG_ARM_CORE_REG(x)) > > > > @@ -599,6 +674,9 @@ int kvm_arm_cpreg_level(uint64_t regidx) > > #define AARCH64_SIMD_CTRL_REG(x) (KVM_REG_ARM64 | KVM_REG_SIZE_U32 | \ > > KVM_REG_ARM_CORE | KVM_REG_ARM_CORE_REG(x)) > > > > +#define AARCH64_FAULT_REG(x) (KVM_REG_ARM64 | KVM_REG_SIZE_U64 | \ > > + KVM_REG_ARM64_FAULT | (x)) > > + > > int kvm_arch_put_registers(CPUState *cs, int level) { > > struct kvm_one_reg reg; > > @@ -873,6 +951,22 @@ int kvm_arch_get_registers(CPUState *cs) > > } > > vfp_set_fpcr(env, fpr); > > > > + if (is_a64(env)) { > > + reg.id = AARCH64_FAULT_REG(KVM_REG_ARM64_FAULT_ESR_EC); > > + reg.addr = (uintptr_t)(&env->exception.syndrome); > > + ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); > > + if (ret) { > > + return ret; > > + } > > + > > + reg.id = AARCH64_FAULT_REG(KVM_REG_ARM64_FAULT_FAR); > > + reg.addr = (uintptr_t)(&env->exception.vaddress); > > + ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); > > This looks dubious. exception.syndrome and exception.vaddress are just internal information QEMU uses, not guest visible things. > And only synchronizing them if the CPU happens to be in AArch64 at the point when this function is called is also odd. Now I needs to get the exception.syndrome(esr_el2) to judge whether the exception is a synchronization about or asynchronous abort, and get the exception.vaddress(esr_el2) value to inject the fault address for the synchronization exception about. But currently the two EL2 values are not exposed to userspace. So I need to call IOCTL to get their values. Meanwhile, we only support RAS in AArch64, not in AArch32, so it only gets the two values in Aarch64. > > > + if (ret) { > > + return ret; > > + } > > + } > > + > > if (!write_kvmstate_to_list(cpu)) { > > return EINVAL; > > } > > @@ -887,6 +981,62 @@ int kvm_arch_get_registers(CPUState *cs) > > return ret; > > } > > > > +static bool is_abort_sea(unsigned long syndrome) { > > + unsigned long fault_status; > > Don't use "unsigned long" when you really mean uint32_t. Ok, thanks, I will change it. > > > + uint8_t ec = ((syndrome & ARM_EL_EC_MASK) >> ARM_EL_EC_SHIFT); > > + if ((ec != EC_INSNABORT) && (ec != EC_DATAABORT)) { > > + return false; > > + } > > + > > + fault_status = syndrome & ARM_EL_FSC_TYPE; > > + switch (fault_status) { > > + case FSC_SEA: > > + case FSC_SEA_TTW0: > > + case FSC_SEA_TTW1: > > + case FSC_SEA_TTW2: > > + case FSC_SEA_TTW3: > > + case FSC_SECC: > > + case FSC_SECC_TTW0: > > + case FSC_SECC_TTW1: > > + case FSC_SECC_TTW2: > > + case FSC_SECC_TTW3: > > + return true; > > + default: > > + return false; > > + } > > +} > > + > > +void kvm_arch_on_sigbus_vcpu(CPUState *c, int code, void *addr) { > > + ram_addr_t ram_addr; > > + hwaddr paddr; > > + > > + ARMCPU *cpu = ARM_CPU(c); > > + CPUARMState *env = &cpu->env; > > + assert(code == BUS_MCEERR_AR || code == BUS_MCEERR_AO); > > + if (addr) { > > + ram_addr = qemu_ram_addr_from_host(addr); > > + if (ram_addr != RAM_ADDR_INVALID && > > + kvm_physical_memory_addr_from_host(c->kvm_state, addr, &paddr)) { > > + kvm_cpu_synchronize_state(c); > > + kvm_hwpoison_page_add(ram_addr); > > + if (is_abort_sea(env->exception.syndrome)) { > > + ghes_update_guest(ACPI_HEST_NOTIFY_SEA, paddr); > > + kvm_inject_arm_sea(c); > > + } > > This looks a bit odd. There are cases where we hwpoison the page but don't tell the guest about it? When would we get this kind of sigbus > when the exception syndrome wasn't the right kind ? I explained it in detail. 1. Firstly, when guest happen abort, it will firstly trap to host EL3 firmware, then jump to hypervisor exception entry, then exits from guest. When exits from guest, KVM will record the exception syndrome to the VCPU structure. 2. KVM calls host ACPI driver, host APEI driver gets the error address from APEI table and calls host memory_failure(), memory_failure() sets this page to poison page, then send the sigbus. 3. Qemu gets this sigbus, call kvm_cpu_synchronize_state() which will get the right exception syndrome from kvm, this step will make sure the exception syndrome Is the right kind. 4. Qemu calls ghes_update_guest() to record this CPER to APEI table for guest, and notify guest there is an error through kvm_inject_arm_sea(). 5. when guest received error notification, it will parse guest APEI table in which have the CPER record. > > Are we guaranteed not to get this kind of signal if we told the kernel not to expose RAS to the guest ? Now we are still discussing whether needs to check the RAS extension when user space received the sigbus. > > > + return; > > + } > > + fprintf(stderr, "Hardware memory error for memory used by " > > + "QEMU itself instead of guest system!\n"); > > + } > > + > > + if (code == BUS_MCEERR_AR) { > > + fprintf(stderr, "Hardware memory error!\n"); > > + exit(1); > > + } > > +} > > + > > /* C6.6.29 BRK instruction */ > > static const uint32_t brk_insn = 0xd4200000; > > > > diff --git a/target/arm/kvm_arm.h b/target/arm/kvm_arm.h index > > 633d088..7cdde97 100644 > > --- a/target/arm/kvm_arm.h > > +++ b/target/arm/kvm_arm.h > > @@ -288,4 +288,5 @@ static inline const char *its_class_name(void) > > } > > } > > > > +void kvm_hwpoison_page_add(ram_addr_t ram_addr); > > Any new globally-visible function prototype in a header should have a doc-comment formatted documentation comment, please. Ok, thanks for this reminder. Do you mean I need to add comments for this globally-visible function, such as below: /* * xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx */ void kvm_hwpoison_page_add(ram_addr_t ram_addr); > > > #endif > > -- > > 1.8.3.1 > > thanks > -- PMM