Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp36544187rwd; Tue, 11 Jul 2023 02:22:27 -0700 (PDT) X-Google-Smtp-Source: APBJJlEofkkFYOn6I1aCMgmOiZ2CePIEQZO2jBWyoMGofHa4Nj9X8SMxvUL42Wwe4Ousa/68WGkX X-Received: by 2002:a05:6a00:1399:b0:682:616a:f910 with SMTP id t25-20020a056a00139900b00682616af910mr19138396pfg.20.1689067347009; Tue, 11 Jul 2023 02:22:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689067346; cv=none; d=google.com; s=arc-20160816; b=Hgl+tUQWRjvH6Af1AnahOxI6T1hkEDb1gwuziI+kFMzoQM2n9npsaB/CVlKWaWkzcv AYatqcO+phHE8hDv2AOQpbUYpdmRzGkIFZ08/q50c/YzBgZ7Y4nrPVXyX4PvMMWFbiQF Zl1Qn2M/tl/7u4Q6DISInGXXsSZTpS5XbYoZ54M45f8gFouWD5IMWsmRXIxT/9WnPOG0 G/fwOTHkRuP1P3DwQ/48rrLuuAcY4uhl8SkIGodw6+s+xnnZLYheHotTfMcwmEluBH2K YJxUzL2AKCNszZWH6z8kvCVA5PygpIKV0YqPpCD8QmejQvrN6v3uL5Lld41lrHlJK2k5 pJlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=KssJbwe0+rYMETg/cdDmRmbsYdlArqhR5pjfLiPL/ow=; fh=/TfPrRVPXgb+4wvPuE4vEBFe17mtokgwHkyPTnYKQG4=; b=DD949rARBz293uw9G/AYKjHyf6EKMjBpRclyA0S6yfDhvaOwL2m+w9yE/HhS3028on kLiTFlt4Nhurr3anfRfY6+O8pmXN3kiLRsjP6b7Qs2HTiHy6JcTW9GI0McOjIdzh++xj OaEqkA4CjA0y2yj0ig2SxRoq77K0WZ0H6eZasZgMksys7vZszr1lGT3Wn2+GZFU+mc2X 0gplAUUNHySzvzVMGqmo4udIB+/PWnuwaYmFBqwhoSNQSh2Pqe/kDI2KsIeZIW1M2Saj x2yQzAItDhIWQjPvxSDScASLlV9IizjJWdI148HPYuJzukiKWpFeAra0PBX4HSm2cG3b kQMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ou8EBKX4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y26-20020a056a001c9a00b0066aa7b0e3c8si1163644pfw.322.2023.07.11.02.22.14; Tue, 11 Jul 2023 02:22:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ou8EBKX4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231669AbjGKIgy (ORCPT + 99 others); Tue, 11 Jul 2023 04:36:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51194 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231751AbjGKIgu (ORCPT ); Tue, 11 Jul 2023 04:36:50 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BE00FBF for ; Tue, 11 Jul 2023 01:36:49 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 5262561362 for ; Tue, 11 Jul 2023 08:36:49 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B3309C433C7; Tue, 11 Jul 2023 08:36:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689064608; bh=jJKFtnXMClK0ncXpkYSuCL1aDHFBYXklvEpZYpBHeL8=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=ou8EBKX4G7AttPYdSNoPmPJnkGeyggQsIOAUOuA1/n/wRqUak+k+naPOKX11ImcwV wb89GBLOqoTeIjVU2bveAb/AJ6qdQQCCynYDVz9xiVK2ZF2rFdVsWXdVoAgnS8zoMA bf71wROIYTqwm6kOWzS/JZ83+T8gMJLJDhGuv68dgEfToNc7idp/Oaq9Lsa1QGJ/H5 jL9BoeBquM4z/TU+OK+u7HdHlfxMksLp95qCwTVn37uiTL1zZ0U42lymmkkmCYFWKf vCWWyPR9O3dpDfrvQB8dTNQefrg2EZ9qyd51wbR64eyQ2hb57666u35qpmIBd1yBua 2if5hXz0teyjA== Received: from sofa.misterjones.org ([185.219.108.64] helo=goblin-girl.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1qJ8rW-00C3PG-Au; Tue, 11 Jul 2023 09:36:46 +0100 Date: Tue, 11 Jul 2023 09:36:46 +0100 Message-ID: <86fs5ux2sh.wl-maz@kernel.org> From: Marc Zyngier To: Sudeep Holla Cc: kvmarm@lists.linux.dev, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Will Deacon , Oliver Upton , James Morse , Suzuki K Poulose , Zenghui Yu Subject: Re: [PATCH] KVM: arm64: Handle kvm_arm_init failure correctly in finalize_pkvm In-Reply-To: <20230704193243.3300506-1-sudeep.holla@arm.com> References: <20230704193243.3300506-1-sudeep.holla@arm.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/28.2 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: sudeep.holla@arm.com, kvmarm@lists.linux.dev, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, will@kernel.org, oliver.upton@linux.dev, james.morse@arm.com, suzuki.poulose@arm.com, yuzenghui@huawei.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 04 Jul 2023 20:32:43 +0100, Sudeep Holla wrote: > > Currently there is no synchronisation between finalize_pkvm() and > kvm_arm_init() initcalls. The finalize_pkvm() proceeds happily even if > kvm_arm_init() fails resulting in the following warning on all the CPUs > and eventually a HYP panic: > > | kvm [1]: IPA Size Limit: 48 bits > | kvm [1]: Failed to init hyp memory protection > | kvm [1]: error initializing Hyp mode: -22 > | > | > | > | WARNING: CPU: 0 PID: 0 at arch/arm64/kvm/pkvm.c:226 _kvm_host_prot_finalize+0x30/0x50 > | Modules linked in: > | CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.4.0 #237 > | Hardware name: FVP Base RevC (DT) > | pstate: 634020c5 (nZCv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) > | pc : _kvm_host_prot_finalize+0x30/0x50 > | lr : __flush_smp_call_function_queue+0xd8/0x230 > | > | Call trace: > | _kvm_host_prot_finalize+0x3c/0x50 > | on_each_cpu_cond_mask+0x3c/0x6c > | pkvm_drop_host_privileges+0x4c/0x78 > | finalize_pkvm+0x3c/0x5c > | do_one_initcall+0xcc/0x240 > | do_initcall_level+0x8c/0xac > | do_initcalls+0x54/0x94 > | do_basic_setup+0x1c/0x28 > | kernel_init_freeable+0x100/0x16c > | kernel_init+0x20/0x1a0 > | ret_from_fork+0x10/0x20 > | Failed to finalize Hyp protection: -22 > | dtb=fvp-base-revc.dtb > | kvm [95]: nVHE hyp BUG at: arch/arm64/kvm/hyp/nvhe/mem_protect.c:540! > | kvm [95]: nVHE call trace: > | kvm [95]: [] __kvm_nvhe_hyp_panic+0xac/0xf8 > | kvm [95]: [] __kvm_nvhe_handle_host_mem_abort+0x1a0/0x2ac > | kvm [95]: [] __kvm_nvhe_handle_trap+0x4c/0x160 > | kvm [95]: [] __kvm_nvhe___skip_pauth_save+0x4/0x4 > | kvm [95]: ---[ end nVHE call trace ]--- > | kvm [95]: Hyp Offset: 0xfffe8db00ffa0000 > | Kernel panic - not syncing: HYP panic: > | PS:a34023c9 PC:0000f250710b973c ESR:00000000f2000800 > | FAR:ffff000800cb00d0 HPFAR:000000000880cb00 PAR:0000000000000000 > | VCPU:0000000000000000 > | CPU: 3 PID: 95 Comm: kworker/u16:2 Tainted: G W 6.4.0 #237 > | Hardware name: FVP Base RevC (DT) > | Workqueue: rpciod rpc_async_schedule > | Call trace: > | dump_backtrace+0xec/0x108 > | show_stack+0x18/0x2c > | dump_stack_lvl+0x50/0x68 > | dump_stack+0x18/0x24 > | panic+0x138/0x33c > | nvhe_hyp_panic_handler+0x100/0x184 > | new_slab+0x23c/0x54c > | ___slab_alloc+0x3e4/0x770 > | kmem_cache_alloc_node+0x1f0/0x278 > | __alloc_skb+0xdc/0x294 > | tcp_stream_alloc_skb+0x2c/0xf0 > | tcp_sendmsg_locked+0x3d0/0xda4 > | tcp_sendmsg+0x38/0x5c > | inet_sendmsg+0x44/0x60 > | sock_sendmsg+0x1c/0x34 > | xprt_sock_sendmsg+0xdc/0x274 > | xs_tcp_send_request+0x1ac/0x28c > | xprt_transmit+0xcc/0x300 > | call_transmit+0x78/0x90 > | __rpc_execute+0x114/0x3d8 > | rpc_async_schedule+0x28/0x48 > | process_one_work+0x1d8/0x314 > | worker_thread+0x248/0x474 > | kthread+0xfc/0x184 > | ret_from_fork+0x10/0x20 > | SMP: stopping secondary CPUs > | Kernel Offset: 0x57c5cb460000 from 0xffff800080000000 > | PHYS_OFFSET: 0x80000000 > | CPU features: 0x00000000,1035b7a3,ccfe773f > | Memory Limit: none > | ---[ end Kernel panic - not syncing: HYP panic: > | PS:a34023c9 PC:0000f250710b973c ESR:00000000f2000800 > | FAR:ffff000800cb00d0 HPFAR:000000000880cb00 PAR:0000000000000000 > | VCPU:0000000000000000 ]--- > > Fix it by checking for the successfull initialisation of kvm_arm_init() > in finalize_pkvm() before proceeding any futher. > > Fixes: 87727ba2bb05 ("KVM: arm64: Ensure CPU PMU probes before pKVM host de-privilege") > Cc: Will Deacon > Cc: Marc Zyngier > Cc: Oliver Upton > Cc: James Morse > Cc: Suzuki K Poulose > Cc: Zenghui Yu > Signed-off-by: Sudeep Holla I really dislike the additional helper, but now that the capabilities are patched, I can't see another way to achieve this so: Acked-by: Marc Zyngier M. -- Without deviation from the norm, progress is not possible.