From: christoffer.dall@linaro.org (Christoffer Dall)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH 0/8] arm64: KVM: Fix PMU exception generation
Date: Tue, 7 Mar 2017 01:52:08 -0800 [thread overview]
Message-ID: <20170307095208.GA101711@lvm> (raw)
In-Reply-To: <874lz51le6.fsf@on-the-bus.cambridge.arm.com>
On Tue, Mar 07, 2017 at 09:33:37AM +0000, Marc Zyngier wrote:
> On Sun, Mar 05 2017 at 3:01:09 pm GMT, Christoffer Dall <christoffer.dall@linaro.org> wrote:
> > Hi Marc,
> >
> > On Wed, Feb 22, 2017 at 11:47:20AM +0000, Marc Zyngier wrote:
> >> Running the following code:
> >>
> >> root at zomby-woof:~# cat test-pmu.c
> >> int main(int argc, char *argv[])
> >> {
> >> unsigned int val;
> >> asm ("mrc p15, 0, %0, c9, c13, 0\n" : "=r" (val));
> >> return val;
> >> }
> >>
> >> in a 32bit guest (or a 64bit guest with a 32bit userspace) results in
> >> this surprising result:
> >>
> >> [ 120.347497] kvm [1150]: Unsupported guest CP15 access at: ab0945ae
> >> [ 120.353689] kvm [1142]: { Op0( 0), Op1( 0), CRn( 9), CRm(13), Op2( 0), func_read },
> >>
> >> which is weird, because the guest behaves correctly:
> >> root at zomby-woof:~# ./test-pmu
> >> [ 16.184422] test-pmu[740]: undefined instruction: pc=00000000ab0945ae
> >> [ 16.186043] Code: 00340001 b4800000 af00b085 60396078 (3f1dee19)
> >> Illegal instruction
> >>
> >> It gets the expected UNDEF, and all is fine. So what?
> >>
> >> It turns out that the PMU emulation code is a bit lazy, and tells the
> >> rest of KVM that the emulation has failed, so that an exception gets
> >> delivered. Subtle differences in the 32bit vs 64bit handling make it
> >> spit an "Unsupported..." error.
> >>
> >> This series tries to set things straight:
> >> - Allow an exception to be injected from an emulation handler
> >> - Make all PMU illegal accesses inject an UNDEF
> >> - Make these illegal accesses a successful emulation w.r.t the rest of KVM.
> >>
> >> In the process, we also squash an interesting bug in the 64bit CP
> >> access. Similar treatment could be applied to the 32bit kernel, except
> >> that we don't ever inject an exception there (no PMU support yet).
> >
> > I'm a bit confused about this series and not too thrilled of the
> > approach where we add a side-channel of the sys_reg param in the vcpu
> > structure, which may or may not contain valid data at any given point.
> >
> > Couldn't we use a slightly bigger hammer (with cleaner semantics) and
> > let all system register handling (cp on 32-bit and 64-bit sys regs
> > alike) simply return true if they were emulated, in which case the
> > caller should advance the PC, or false ifsomething else happened, and
> > leave it up to the emulation of the individual registers to decide if
> > any exceptions should be injected.
>
> So that was my other option - changing the semantics of the return
> value, and considering that an emulation never fails. At that stage, we
> can repurpose the return value form the accessor to simply indicate
> whether or not we should skip the current instruction.
>
> > I don't think we have that many places where we want to inject an
> > undefined exception in our handlers, and doing it explicitly might
> > actually be a good idea to make it more clear that we're emulating the
> > architecture properly. What do you think?
>
> I think that'd work nicely. I'll rework the series along these lines.
>
Awesome, thanks.
-Christoffer
prev parent reply other threads:[~2017-03-07 9:52 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-02-22 11:47 [PATCH 0/8] arm64: KVM: Fix PMU exception generation Marc Zyngier
2017-02-22 11:47 ` [PATCH 1/8] arm64: KVM: Don't skip an instruction if an exception is pending Marc Zyngier
2017-02-22 11:47 ` [PATCH 2/8] arm64: KVM: Let the vcpu carry a pointer to the sys_reg being emulated Marc Zyngier
2017-02-22 11:47 ` [PATCH 3/8] arm64: KVM: Refactor pmu_*_el0_disabled Marc Zyngier
2017-02-22 11:47 ` [PATCH 4/8] arm64: KVM: pmu: Inject UNDEF exception on illegal register access Marc Zyngier
2017-02-22 11:47 ` [PATCH 5/8] arm64: KVM: PMU: Inject UNDEF on non-privileged accesses Marc Zyngier
2017-02-22 11:47 ` [PATCH 6/8] arm64: KVM: PMU: Inject UNDEF on read access to PMSWINC_EL0 Marc Zyngier
2017-02-22 11:47 ` [PATCH 7/8] arm64: KVM: pmu: Make illegal accesses seen as successfully emulated Marc Zyngier
2017-02-22 11:47 ` [PATCH 8/8] arm64: KVM: Do not corrupt registers on failed 64bit CP read Marc Zyngier
2017-03-05 15:01 ` [PATCH 0/8] arm64: KVM: Fix PMU exception generation Christoffer Dall
2017-03-07 9:33 ` Marc Zyngier
2017-03-07 9:52 ` Christoffer Dall [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170307095208.GA101711@lvm \
--to=christoffer.dall@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).