Received: by 2002:ac0:e34a:0:0:0:0:0 with SMTP id g10csp502211imn; Tue, 26 Jul 2022 01:29:08 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uFDJJb+JeK75PJrpkHtKSmDOjddZWjbPWjg55BrT0dJCsCu8mT2ZsF9ig3wUXXM2YheOJC X-Received: by 2002:a17:902:8644:b0:16b:ea77:a6cb with SMTP id y4-20020a170902864400b0016bea77a6cbmr15865293plt.59.1658824148339; Tue, 26 Jul 2022 01:29:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658824148; cv=none; d=google.com; s=arc-20160816; b=cDK58/quEK4RgULYlFpB78ziUsUn8DmPkcmiVqG/8SoIlJuljjyx2q20zWa/vIse8Z Wbys+SIda/I25p8Qp+lirwbOZOYp4W+1KuKrCwen3GTS8rzuCu6eEuM+qBwlIxtjXrmX VKq4EMMYEPEIp3dLuxeuNUFXTx+WvjRH7qBPnqfs/w5hHJaPDq9S02FEeNc8h0a5hO0s N2GhiXd7U9o9UOWx3DkglVBWMBclWHn1w22KAXNiADC19AX+UlJHFwP7RRNPkiR64bGv qOM94CpM/IUVz4lj3b9zp4KEnKLaHTtYJGxh+yyRj+B1Nx0TXu3GZKIpa2OU1VlDnmcZ uHkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=Zkvbbd71rFcp/5pkrofzfRbxCdOfkUQrx8t07Ja45VM=; b=dpgQAg+BUB1vY1AVVRJpzAOKhs5s15FSw/MvfhKPC4c51tTMwDSy+/jn9gRjUoF5O/ 9meVXvlbdSRvx7yK7uRVMjeGNS24UuZBFn9QxCO2mjgWsW+Css1cPpMq18j4+xT8y5QY IKTHXNo23IaqZsGVvYg8U59wM/sYakFqH6adyj0jlxmJasdKDgTkaf//cfYrvpD1FHX7 qZAC/J0BNdPBv0BA5qee0OJLnaLFs8PLiJqx9ILnSJWVRKJX2z67pG+4JpCgsMmkgSOL VuRDuOJ/n0UiQgyVAMLxPAjzIR8n/lS9U0To9tBVKWhHxynhd7gVN+M5eXS1kn0gCLDD mCeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=BsTFVNcl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ij13-20020a170902ab4d00b0016da0b33843si612765plb.260.2022.07.26.01.28.54; Tue, 26 Jul 2022 01:29:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=BsTFVNcl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238119AbiGZHiz (ORCPT + 99 others); Tue, 26 Jul 2022 03:38:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53988 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238270AbiGZHii (ORCPT ); Tue, 26 Jul 2022 03:38:38 -0400 Received: from mail-yb1-xb49.google.com (mail-yb1-xb49.google.com [IPv6:2607:f8b0:4864:20::b49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CB7E81ADA0 for ; Tue, 26 Jul 2022 00:37:55 -0700 (PDT) Received: by mail-yb1-xb49.google.com with SMTP id m11-20020a5b040b000000b0066fcc60d1a0so10506640ybp.19 for ; Tue, 26 Jul 2022 00:37:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:message-id:mime-version:subject:from:to:cc; bh=Zkvbbd71rFcp/5pkrofzfRbxCdOfkUQrx8t07Ja45VM=; b=BsTFVNclyw0PgiHpJkckONN5sobCiNVeaNkOuXPQh0z/fr3/H/ZpJq229bQB4WI8wH dCpFTOw3hIUtXYetVsnvxEd6YG5AHn3GC9O+CZYb51dySuTzvvd9hatiRjSNtCmolgNA Si3A1LZUVDzfouL+qH+feg/jA921FtBlsSRkAGYovsFM4NxbUv3oMIla0duEjjqxL6r0 s7bYgreKYpay29mjBR55y8DGLtNN0dCEyqqM06vSiUb+3azEzwBIIXw9TMPw1KRlEMKk p4pOtC2fNC/gIOzW3GObbQuj0ZXHWwFJ9C8jnjejHVPBGOBuI7Im25Ue5T0JpTeW8OXL GgBQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=Zkvbbd71rFcp/5pkrofzfRbxCdOfkUQrx8t07Ja45VM=; b=3q0Ik6cR1ZKnCN4MhgZrf2oYXXkZyuQ9iNUMdrO9TvNZdD0gJmkDQU3O9tsnxWsJR8 WYYvVenK/zRlssWbXBaJNSAMSZeOsVVB7fqsyShGHAcDLs7FneFq7vBTpT/EcZAPTA5/ QVkgKXIZdUVN+rx4y1PVn0zzu4LP7MWI7uh2ge0Iv+zGLoGC0iPw3nv/Jg5vdrhujx0E 8imSfm1gVnOL1dhUcMqB9ijUtN8aw3TcMb+HIQs7Icck2wWaVCPSxmFfDVOufBcvvVFH pQbPHB3UqocQTGKh/FqTp1Aaa/RmQ9OdC4iBQPAJyeBC6bE4d37r0miJv0Vmcykiyg4t P4UA== X-Gm-Message-State: AJIora/19s6TG9sLMKLTWeOzPWkYg4/mKFGvdAj8xnD7Kk9IsUg+i6dR RbAFK1dt6jglscwGabX+e0HoKaX86mxas1ygQA== X-Received: from kaleshsingh.mtv.corp.google.com ([2620:15c:211:200:4f77:3b64:736a:394e]) (user=kaleshsingh job=sendgmr) by 2002:a05:6902:706:b0:670:a469:6efb with SMTP id k6-20020a056902070600b00670a4696efbmr13007602ybt.410.1658821075048; Tue, 26 Jul 2022 00:37:55 -0700 (PDT) Date: Tue, 26 Jul 2022 00:37:33 -0700 Message-Id: <20220726073750.3219117-1-kaleshsingh@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.37.1.359.gd136c6c3e2-goog Subject: [PATCH v6 00/17] KVM nVHE Hypervisor stack unwinder From: Kalesh Singh To: maz@kernel.org, mark.rutland@arm.com, broonie@kernel.org, madvenka@linux.microsoft.com, tabba@google.com, oliver.upton@linux.dev Cc: will@kernel.org, qperret@google.com, kaleshsingh@google.com, james.morse@arm.com, alexandru.elisei@arm.com, suzuki.poulose@arm.com, catalin.marinas@arm.com, andreyknvl@gmail.com, vincenzo.frascino@arm.com, mhiramat@kernel.org, ast@kernel.org, wangkefeng.wang@huawei.com, elver@google.com, keirf@google.com, yuzenghui@huawei.com, ardb@kernel.org, oupton@google.com, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org, android-mm@google.com, kernel-team@android.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi all, This is v6 of nVHE stacktrace support. The series is based on arm64 for-next/stacktrace. The previous versions were posted at: v5: https://lore.kernel.org/r/20220721055728.718573-1-kaleshsingh@google.com/ v4: https://lore.kernel.org/r/20220715061027.1612149-1-kaleshsingh@google.com/ v3: https://lore.kernel.org/r/20220607165105.639716-1-kaleshsingh@google.com/ v2: https://lore.kernel.org/r/20220502191222.4192768-1-kaleshsingh@google.com/ v1: https://lore.kernel.org/r/20220427184716.1949239-1-kaleshsingh@google.com/ This version mainly reorganizes the order of to patches into more coherent groups, along with addressing the other feedback in v5. Patches 1 to 6 factor out the common unwinding logic into into arch/arm64/include/asm/stacktrace/common.h, for reuse by the nVHE unwinder. No functional change is introduced by these: [01/17] arm64: stacktrace: Add shared header for common stack unwinding code [02/17] arm64: stacktrace: Factor out on_accessible_stack_common() [03/17] arm64: stacktrace: Factor out unwind_next_common() [04/17] arm64: stacktrace: Handle frame pointer from different address spaces [05/17] arm64: stacktrace: Factor out common unwind() [06/17] arm64: stacktrace: Add description of stacktrace/common.h Patches 7 to 11 implement stacktraces for conventional nVHE (non-protected mode): [07/17] KVM: arm64: On stack overflow switch to hyp overflow_stack [08/17] KVM: arm64: Stub implementation of non-protected nVHE HYP stack unwinder [09/17] KVM: arm64: Prepare non-protected nVHE hypervisor stacktrace [10/17] KVM: arm64: Implement non-protected nVHE hyp stack unwinder [11/17] KVM: arm64: Introduce hyp_dump_backtrace() Patches 12 to 17 implement stacktraces for protected-nVHE (pKVM): [12/17] KVM: arm64: Add PROTECTED_NVHE_STACKTRACE Kconfig [13/17] KVM: arm64: Allocate shared pKVM hyp stacktrace buffers [14/17] KVM: arm64: Stub implementation of pKVM HYP stack unwinder [15/17] KVM: arm64: Save protected-nVHE (pKVM) hyp stacktrace [16/17] KVM: arm64: Implement protected nVHE hyp stack unwinder [17/17] KVM: arm64: Introduce pkvm_dump_backtrace() The updated cover letter is copied below for convenience. Thanks, Kalesh ============ KVM nVHE Stack unwinding. === nVHE has two modes of operation: protected (pKVM) and unprotected (conventional nVHE). Depending on the mode, a slightly different approach is used to dump the hypervisor stacktrace but the core unwinding logic remains the same. Protected nVHE (pKVM) stacktraces ==== In protected nVHE mode, the host cannot directly access hypervisor memory. The hypervisor stack unwinding happens in EL2 and is made accessible to the host via a shared buffer. Symbolizing and printing the stacktrace addresses is delegated to the host and happens in EL1. Non-protected (Conventional) nVHE stacktraces ==== In non-protected mode, the host is able to directly access the hypervisor stack pages. The hypervisor stack unwinding and dumping of the stacktrace is performed by the host in EL1, as this avoids the memory overhead of setting up shared buffers between the host and hypervisor. Resuing the Core Unwinding Logic ==== Since the hypervisor cannot link against the kernel code in proteced mode. The common stack unwinding code is moved to a shared header to allow reuse in the nVHE hypervisor. Reducing the memory footprint ==== In this version the below steps were taken to reduce the memory usage of nVHE stack unwinding: 1) The nVHE overflow stack is reduced from PAGE_SIZE to 4KB; benificial for configurations with non 4KB pages (16KB or 64KB pages). 2) In protected nVHE mode (pKVM), the shared stacktrace buffers with the host are reduced from PAGE_SIZE to the minimum size required. 3) In systems other than Android, conventional nVHE makes up the vast majority of use case. So the pKVM stack tracing is disabled by default (!CONFIG_PROTECTED_NVHE_STACKTRACE), which avoid the memory usage for setting up shared buffers. 4) In non-protected nVHE mode (conventional nVHE), the stack unwinding is done directly in EL1 by the host and no shared buffers with the hypervisor are needed. Sample Output ==== The below shows an example output from a simple stack overflow test: [ 111.623091] kvm [367]: nVHE call trace: [ 111.623215] kvm [367]: [] __kvm_nvhe_hyp_panic+0xac/0xf8 [ 111.623448] kvm [367]: [] __kvm_nvhe_hyp_panic_bad_stack+0x10/0x10 [ 111.623642] kvm [367]: [] __kvm_nvhe_recursive_death+0x24/0x34 . . . [ 111.640366] kvm [367]: [] __kvm_nvhe_recursive_death+0x24/0x34 [ 111.640467] kvm [367]: [] __kvm_nvhe_recursive_death+0x24/0x34 [ 111.640574] kvm [367]: [] __kvm_nvhe___kvm_vcpu_run+0x30/0x40c [ 111.640676] kvm [367]: [] __kvm_nvhe_handle___kvm_vcpu_run+0x30/0x48 [ 111.640778] kvm [367]: [] __kvm_nvhe_handle_trap+0xc4/0x128 [ 111.640880] kvm [367]: [] __kvm_nvhe___host_exit+0x64/0x64 [ 111.640996] kvm [367]: ---[ end nVHE call trace ]--- ============ Kalesh Singh (17): arm64: stacktrace: Add shared header for common stack unwinding code arm64: stacktrace: Factor out on_accessible_stack_common() arm64: stacktrace: Factor out unwind_next_common() arm64: stacktrace: Handle frame pointer from different address spaces arm64: stacktrace: Factor out common unwind() arm64: stacktrace: Add description of stacktrace/common.h KVM: arm64: On stack overflow switch to hyp overflow_stack KVM: arm64: Stub implementation of non-protected nVHE HYP stack unwinder KVM: arm64: Prepare non-protected nVHE hypervisor stacktrace KVM: arm64: Implement non-protected nVHE hyp stack unwinder KVM: arm64: Introduce hyp_dump_backtrace() KVM: arm64: Add PROTECTED_NVHE_STACKTRACE Kconfig KVM: arm64: Allocate shared pKVM hyp stacktrace buffers KVM: arm64: Stub implementation of pKVM HYP stack unwinder KVM: arm64: Save protected-nVHE (pKVM) hyp stacktrace KVM: arm64: Implement protected nVHE hyp stack unwinder KVM: arm64: Introduce pkvm_dump_backtrace() arch/arm64/include/asm/kvm_asm.h | 16 ++ arch/arm64/include/asm/memory.h | 8 + arch/arm64/include/asm/stacktrace.h | 92 +++++---- arch/arm64/include/asm/stacktrace/common.h | 230 +++++++++++++++++++++ arch/arm64/include/asm/stacktrace/nvhe.h | 176 ++++++++++++++++ arch/arm64/kernel/stacktrace.c | 157 -------------- arch/arm64/kvm/Kconfig | 15 ++ arch/arm64/kvm/arm.c | 2 +- arch/arm64/kvm/handle_exit.c | 102 +++++++++ arch/arm64/kvm/hyp/nvhe/Makefile | 2 +- arch/arm64/kvm/hyp/nvhe/host.S | 9 +- arch/arm64/kvm/hyp/nvhe/stacktrace.c | 109 ++++++++++ arch/arm64/kvm/hyp/nvhe/switch.c | 6 + 13 files changed, 720 insertions(+), 204 deletions(-) create mode 100644 arch/arm64/include/asm/stacktrace/common.h create mode 100644 arch/arm64/include/asm/stacktrace/nvhe.h create mode 100644 arch/arm64/kvm/hyp/nvhe/stacktrace.c base-commit: 82a592c13b0aeff94d84d54183dae0b26384c95f -- 2.37.1.359.gd136c6c3e2-goog