Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp528160imw; Fri, 15 Jul 2022 07:59:58 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uMrYbKuDVoElvrQuVk455/nlF/LOwroyiyJiELQrpEdq6DNUgeJ+BDqlIqDYvR5lROXF5r X-Received: by 2002:a05:6402:3486:b0:43a:9b82:6d8a with SMTP id v6-20020a056402348600b0043a9b826d8amr20053012edc.23.1657897198625; Fri, 15 Jul 2022 07:59:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657897198; cv=none; d=google.com; s=arc-20160816; b=xTt+fZUBZn4jNOdXry3FnZFoC0sZAxGj6K1rh0UZjyYlXsDABFMVmDOqOfCx30JG+9 WlKOURmlfp7vybW4ZNgqVGUOneEigTGCUKz1GmybZmOOR3X4fKqc1nuSy1INFd83rmEX eu5DGMJSKWhKL3SCN0jpCVj9Gzh5fgwZm3gI2VLv61tMHdP6EwNCea0rPbixYJg58gI6 hyRQ7S0Yj1SrFct1aIwgadwgbppPLhnGUTktuaswwMgiIVi3heBJ+Aw7aZcMH0pbzeqw VXqUKE9zzhKNd0sTYRvmYsJX7oOwKHGUlM3QIsjR0+BE0KRn33vDr2aKcVsbBqyVeg/h zHcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=fmTpiXQsRGba6Ab2CmL1NtPiLfD0z73ZyAdaCn9pALw=; b=ewcCnZIzY3NH19laUdyPqRo8gn6i4ktgCAb75W2Sj4lxB0VWLaV6YCrISE2B8PqN0g xNR/C6sIj+VO5ckUvqtSZFTu5mENOKNhJYPyZJska05WCAgPHVItNOxn/PS+wIjp74dZ u9OCndXQiiFjuOegs8Mk9P2LZzRfm90Qx8UZDQ5JMD2zg1HKoXK3kMHj44pHNEMvCAfD x6qNbq/OSAqgOjklyJbNBzEHkRVCBlsmrESvsSVkUrxH3xLm3EvGRgvpOn5jxy+T6pBy Kqkj0oqDJ9sM8mkp8HlUtS1UXJmwyX9299fQ8qfGOGkaCjm9j9iAwW8g+DwabsqKFAcI 1C7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=H7fWj0Xk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dz15-20020a0564021d4f00b0043a6799389bsi7441237edb.425.2022.07.15.07.59.34; Fri, 15 Jul 2022 07:59:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=H7fWj0Xk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234909AbiGON4B (ORCPT + 99 others); Fri, 15 Jul 2022 09:56:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54382 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233141AbiGONz7 (ORCPT ); Fri, 15 Jul 2022 09:55:59 -0400 Received: from mail-oi1-x234.google.com (mail-oi1-x234.google.com [IPv6:2607:f8b0:4864:20::234]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 215B66872E for ; Fri, 15 Jul 2022 06:55:58 -0700 (PDT) Received: by mail-oi1-x234.google.com with SMTP id w81so6214357oiw.0 for ; Fri, 15 Jul 2022 06:55:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=fmTpiXQsRGba6Ab2CmL1NtPiLfD0z73ZyAdaCn9pALw=; b=H7fWj0XkAq8MDBI1mBbQ1020de9SLOGyH72c6VSc+FqcYsBfX+OgMVfxFlb0q3RXLR quVkqfwqd0ImP99UyZyuBvTzG1tOgfTfD0gUaqKSWA2BgvaK9LI4BTNSyuCL6pU7gAPP q74pdZGJb2YIkvSSO8wqIkGuI5+sx4Xu+GXrZ06YbQo0yJDZjNKJlmINJfA/WGE99HCM Q4FlqllVKRBjMEvmlQhC08Qr5ze+Xd8nAsbwNVlj14N1IV7esFJ1eak1e7ei9hPhah5z w8mz8H9jy44cZ7w3gRMjNh8hlgmHFAfT0ULFxEGBjURn40N5PW5GZ9YS+qPK2VPAx2kt HaUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fmTpiXQsRGba6Ab2CmL1NtPiLfD0z73ZyAdaCn9pALw=; b=CsDfPU4YrwVrhtM8E0AC5GlCyywC+IwFx3dE4o2rzhaox+BOGaLdRFSt3QngewL8pJ NAtms52qWvJQuxu9vNnWR+Wf9iXm5f25vwFiZ4nJ1+5RqwYVI5RaOB8oa0DKfmnBsVcC mTPwgUL8FVw8vyDYn66q/kZM/GuVWGQxasRF2UvQ4wtCYN8WvTrQiGa/H3zih++4agRY 4G+XIHPPcHUV5OzfIloV4V+bJbUy2TodPSIFqQ053SYSSMyqigZOeJbLg2PaB9fM+sK+ Bew9Laxg9qLk+XC9ebWb8vQjoGAfuD/00RRGiPVOHrL9701VO/hXmNP66CcFJcIuZb1h nDnA== X-Gm-Message-State: AJIora9YGPeFMzuIq/WkRPNJneFuLbF0AlKGsBvHFpomT9EStVp79BHT kCuy1RYhig4jIPclx68N0i0JXstPVdFuoHNjZxPoeg== X-Received: by 2002:a05:6808:1596:b0:337:8c17:b17f with SMTP id t22-20020a056808159600b003378c17b17fmr7427949oiw.294.1657893355814; Fri, 15 Jul 2022 06:55:55 -0700 (PDT) MIME-Version: 1.0 References: <20220715061027.1612149-1-kaleshsingh@google.com> In-Reply-To: <20220715061027.1612149-1-kaleshsingh@google.com> From: Fuad Tabba Date: Fri, 15 Jul 2022 14:55:19 +0100 Message-ID: Subject: Re: [PATCH v4 00/18] KVM nVHE Hypervisor stack unwinder To: Kalesh Singh Cc: maz@kernel.org, mark.rutland@arm.com, broonie@kernel.org, madvenka@linux.microsoft.com, will@kernel.org, qperret@google.com, james.morse@arm.com, alexandru.elisei@arm.com, suzuki.poulose@arm.com, catalin.marinas@arm.com, andreyknvl@gmail.com, russell.king@oracle.com, vincenzo.frascino@arm.com, mhiramat@kernel.org, ast@kernel.org, drjones@redhat.com, wangkefeng.wang@huawei.com, elver@google.com, keirf@google.com, yuzenghui@huawei.com, ardb@kernel.org, oupton@google.com, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org, android-mm@google.com, kernel-team@android.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Kalesh, On Fri, Jul 15, 2022 at 7:10 AM Kalesh Singh wrote: > > Hi all, > > This is v4 of the series adding support for nVHE hypervisor stacktraces; > and is based on arm64 for-next/stacktrace. > > Thanks all for your feedback on previous revisions. Mark Brown, I > appreciate your Reviewed-by on the v3, I have dropped the tags in this > new verision since I think the series has changed quite a bit. > > The previous versions were posted at: > v3: https://lore.kernel.org/r/20220607165105.639716-1-kaleshsingh@google.com/ > v2: https://lore.kernel.org/r/20220502191222.4192768-1-kaleshsingh@google.com/ > v1: https://lore.kernel.org/r/20220427184716.1949239-1-kaleshsingh@google.com/ > > The main updates in this version are to address concerens from Marc on the > memory usage and reusing the common code by refactoring into a shared header. > > Thanks, > Kalesh I tested an earlier version of this patch series, and it worked fine, with symbolization. However, testing it now, both with nvhe and with pkvm the symbolization isn't working for me. e.g. [ 32.986706] kvm [251]: Protected nVHE HYP call trace: [ 32.986796] kvm [251]: [] 0xffff800008f8b0e0 [ 32.987391] kvm [251]: [] 0xffff800008f8b388 [ 32.987493] kvm [251]: [] 0xffff800008f8d230 [ 32.987591] kvm [251]: [] 0xffff800008f8d51c [ 32.987695] kvm [251]: [] 0xffff800008f8c064 [ 32.987803] kvm [251]: ---- End of Protected nVHE HYP call trace ---- CONFIG_PROTECTED_NVHE_STACKTRACE CONFIG_NVHE_EL2_DEBUG and CONFIG_DEBUG_INFO_DWARF_TOOLCHAIN_DEFAULT are all enabled. Generating a backtrace in the host I get proper symbolisation. Is there anything else you'd like to know about my setup that would help get to the bottom of this? Thanks, /fuad > > ============ > > KVM nVHE Stack unwinding. > === > > nVHE has two modes of operation: protected (pKVM) and unprotected > (conventional nVHE). Depending on the mode, a slightly different approach > is used to dump the hyperviosr stacktrace but the core unwinding logic > remains the same. > > Protected nVHE (pKVM) stacktraces > ==== > > In protected nVHE mode, the host cannot directly access hypervisor memory. > > The hypervisor stack unwinding happens in EL2 and is made accessible to > the host via a shared buffer. Symbolizing and printing the stacktrace > addresses is delegated to the host and happens in EL1. > > Non-protected (Conventional) nVHE stacktraces > ==== > > In non-protected mode, the host is able to directly access the hypervisor > stack pages. > > The hypervisor stack unwinding and dumping of the stacktrace is performed > by the host in EL1, as this avoids the memory overhead of setting up > shared buffers between the host and hypervisor. > > Resuing the Core Unwinding Logic > ==== > > Since the hypervisor cannot link against the kernel code in proteced mode. > The common stack unwinding code is moved to a shared header to allow reuse > in the nVHE hypervisor. > > Reducing the memory footprint > ==== > > In this version the below steps were taken to reduce the memory usage of > nVHE stack unwinding: > > 1) The nVHE overflow stack is reduced from PAGE_SIZE to 4KB; benificial > for configurations with non 4KB pages (16KB or 64KB pages). > 2) In protected nVHE mode (pKVM), the shared stacktrace buffers with the > host are reduced from PAGE_SIZE to the minimum size required. > 3) In systems other than Android, conventional nVHE makes up the vast > majority of use case. So the pKVM stack tracing is disabled by default > (!CONFIG_PROTECTED_NVHE_STACKTRACE), which avoid the memory usage for > setting up shared buffers. > 4) In non-protected nVHE mode (conventional nVHE), the stack unwinding > is done directly in EL1 by the host and no shared buffers with the > hyperviosr are needed. > > Sample Output > ==== > > The below shows an example output from a simple stack overflow test: > > [ 126.862960] kvm [371]: nVHE hyp panic at: [] __kvm_nvhe_recursive_death+0x10/0x34! > [ 126.869920] kvm [371]: Protected nVHE HYP call trace: > [ 126.870528] kvm [371]: [] __kvm_nvhe_hyp_panic+0xac/0xf8 > [ 126.871342] kvm [371]: [] __kvm_nvhe_hyp_panic_bad_stack+0x10/0x10 > [ 126.872174] kvm [371]: [] __kvm_nvhe_recursive_death+0x24/0x34 > [ 126.872971] kvm [371]: [] __kvm_nvhe_recursive_death+0x24/0x34 > . . . > > [ 126.927314] kvm [371]: [] __kvm_nvhe_recursive_death+0x24/0x34 > [ 126.927727] kvm [371]: [] __kvm_nvhe_recursive_death+0x24/0x34 > [ 126.928137] kvm [371]: [] __kvm_nvhe___kvm_vcpu_run+0x30/0x40c > [ 126.928561] kvm [371]: [] __kvm_nvhe_handle___kvm_vcpu_run+0x30/0x48 > [ 126.928984] kvm [371]: [] __kvm_nvhe_handle_trap+0xc4/0x128 > [ 126.929385] kvm [371]: [] __kvm_nvhe___host_exit+0x64/0x64 > [ 126.929804] kvm [371]: ---- End of Protected nVHE HYP call trace ---- > > ============ > > > Kalesh Singh (18): > arm64: stacktrace: Add shared header for common stack unwinding code > arm64: stacktrace: Factor out on_accessible_stack_common() > arm64: stacktrace: Factor out unwind_next_common() > arm64: stacktrace: Handle frame pointer from different address spaces > arm64: stacktrace: Factor out common unwind() > arm64: stacktrace: Add description of stacktrace/common.h > KVM: arm64: On stack overflow switch to hyp overflow_stack > KVM: arm64: Add PROTECTED_NVHE_STACKTRACE Kconfig > KVM: arm64: Allocate shared pKVM hyp stacktrace buffers > KVM: arm64: Stub implementation of pKVM HYP stack unwinder > KVM: arm64: Stub implementation of non-protected nVHE HYP stack > unwinder > KVM: arm64: Save protected-nVHE (pKVM) hyp stacktrace > KVM: arm64: Prepare non-protected nVHE hypervisor stacktrace > KVM: arm64: Implement protected nVHE hyp stack unwinder > KVM: arm64: Implement non-protected nVHE hyp stack unwinder > KVM: arm64: Introduce pkvm_dump_backtrace() > KVM: arm64: Introduce hyp_dump_backtrace() > KVM: arm64: Dump nVHE hypervisor stack on panic > > arch/arm64/include/asm/kvm_asm.h | 16 ++ > arch/arm64/include/asm/memory.h | 7 + > arch/arm64/include/asm/stacktrace.h | 92 ++++--- > arch/arm64/include/asm/stacktrace/common.h | 224 ++++++++++++++++ > arch/arm64/include/asm/stacktrace/nvhe.h | 291 +++++++++++++++++++++ > arch/arm64/kernel/stacktrace.c | 157 ----------- > arch/arm64/kvm/Kconfig | 15 ++ > arch/arm64/kvm/arm.c | 2 +- > arch/arm64/kvm/handle_exit.c | 4 + > arch/arm64/kvm/hyp/nvhe/Makefile | 2 +- > arch/arm64/kvm/hyp/nvhe/host.S | 9 +- > arch/arm64/kvm/hyp/nvhe/stacktrace.c | 108 ++++++++ > arch/arm64/kvm/hyp/nvhe/switch.c | 5 + > 13 files changed, 727 insertions(+), 205 deletions(-) > create mode 100644 arch/arm64/include/asm/stacktrace/common.h > create mode 100644 arch/arm64/include/asm/stacktrace/nvhe.h > create mode 100644 arch/arm64/kvm/hyp/nvhe/stacktrace.c > > > base-commit: 82a592c13b0aeff94d84d54183dae0b26384c95f > -- > 2.37.0.170.g444d1eabd0-goog >