Message ID | 1554172037-4516-5-git-send-email-amit.kachhap@arm.com |
---|---|
State | New |
Headers | show |
Series | [v8,1/9] KVM: arm64: Propagate vcpu into read_id_reg() | expand |
On Tue, Apr 02, 2019 at 07:57:12AM +0530, Amit Daniel Kachhap wrote: > From: Mark Rutland <mark.rutland@arm.com> > > When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which > is a constant value. This works today, as the host HCR_EL2 value is > always the same, but this will get in the way of supporting extensions > that require HCR_EL2 bits to be set conditionally for the host. > > To allow such features to work without KVM having to explicitly handle > every possible host feature combination, this patch has KVM save/restore > for the host HCR when switching to/from a guest HCR. The saving of the > register is done once during cpu hypervisor initialization state and is > just restored after switch from guest. > > For fetching HCR_EL2 during kvm initialisation, a hyp call is made using > kvm_call_hyp and is helpful in non-VHE case. > > For the hyp TLB maintenance code, __tlb_switch_to_host_vhe() is updated > to toggle the TGE bit with a RMW sequence, as we already do in > __tlb_switch_to_guest_vhe(). > > The value of hcr_el2 is now stored in struct kvm_cpu_context as both host > and guest can now use this field in a common way. > > Signed-off-by: Mark Rutland <mark.rutland@arm.com> > [Added cpu_init_host_ctxt, hcr_el2 field in struct kvm_cpu_context, > save hcr_el2 in hyp init stage] > Signed-off-by: Amit Daniel Kachhap <amit.kachhap@arm.com> > Reviewed-by: James Morse <james.morse@arm.com> > Cc: Marc Zyngier <marc.zyngier@arm.com> > Cc: Christoffer Dall <christoffer.dall@arm.com> > Cc: kvmarm@lists.cs.columbia.edu [...] > diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h > index a01fe087..3b09fd0 100644 > --- a/arch/arm64/include/asm/kvm_host.h > +++ b/arch/arm64/include/asm/kvm_host.h > @@ -209,6 +209,8 @@ struct kvm_cpu_context { > u32 copro[NR_COPRO_REGS]; > }; > > + /* HYP host/guest configuration */ > + u64 hcr_el2; Minor nit: You could delete "host/guest" from the comment here. This is implied by the fact that the member is in struct kvm_cpu_context in the first place. > struct kvm_vcpu *__hyp_running_vcpu; > }; [...] > diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c > index 3563fe6..f5cefa1 100644 > --- a/arch/arm64/kvm/hyp/switch.c > +++ b/arch/arm64/kvm/hyp/switch.c [...] > @@ -159,9 +159,10 @@ static void deactivate_traps_vhe(void) > } > NOKPROBE_SYMBOL(deactivate_traps_vhe); > > -static void __hyp_text __deactivate_traps_nvhe(void) > +static void __hyp_text __deactivate_traps_nvhe(struct kvm_cpu_context *host_ctxt) Where __hyp_text functions accept pointer arguments, they are usually hyp pointers already... (see below) > { > u64 mdcr_el2 = read_sysreg(mdcr_el2); > + struct kvm_cpu_context *hyp_host_ctxt = kern_hyp_va(host_ctxt); > > __deactivate_traps_common(); > > @@ -169,25 +170,28 @@ static void __hyp_text __deactivate_traps_nvhe(void) > mdcr_el2 |= MDCR_EL2_E2PB_MASK << MDCR_EL2_E2PB_SHIFT; > > write_sysreg(mdcr_el2, mdcr_el2); > - write_sysreg(HCR_HOST_NVHE_FLAGS, hcr_el2); > + write_sysreg(hyp_host_ctxt->hcr_el2, hcr_el2); > write_sysreg(CPTR_EL2_DEFAULT, cptr_el2); > } > > static void __hyp_text __deactivate_traps(struct kvm_vcpu *vcpu) > { > + struct kvm_cpu_context *host_ctxt; > + > + host_ctxt = vcpu->arch.host_cpu_context; host_ctxt is not otherwise used here, so can we convert it up-front so that the argument to __deactivate_traps_nvhe() and deactivate_traps_vhe() is a hyp pointer already? So: struct kvm_cpu_context *hyp_host_ctxt; hyp_host_ctxt = kern_hyp_va(vcpu->arch.host_cpu_context); > /* > * If we pended a virtual abort, preserve it until it gets > * cleared. See D1.14.3 (Virtual Interrupts) for details, but > * the crucial bit is "On taking a vSError interrupt, > * HCR_EL2.VSE is cleared to 0." > */ > - if (vcpu->arch.hcr_el2 & HCR_VSE) > - vcpu->arch.hcr_el2 = read_sysreg(hcr_el2); > + if (vcpu->arch.ctxt.hcr_el2 & HCR_VSE) > + vcpu->arch.ctxt.hcr_el2 = read_sysreg(hcr_el2); > > if (has_vhe()) > - deactivate_traps_vhe(); > + deactivate_traps_vhe(host_ctxt); > else > - __deactivate_traps_nvhe(); > + __deactivate_traps_nvhe(host_ctxt); Then just pass hyp_host_ctxt to both of these, and drop the kern_hyp_va() conversion from __deactivate_traps_nvhe(). This may be a bit less confusing. Alternatively, just pass in the vcpu pointer (since this pattern is already well established all over the place). Another option could be to pull the hcr_el2 write out of the backends entirely and put it in this common code instead. This doesn't look straightforward though (or at least, I don't remember enough about how all these traps handling functions fit together...) [...] Cheers ---Dave
Hi Amit, On 02/04/2019 03:27, Amit Daniel Kachhap wrote: > From: Mark Rutland <mark.rutland@arm.com> > > When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which > is a constant value. This works today, as the host HCR_EL2 value is > always the same, but this will get in the way of supporting extensions > that require HCR_EL2 bits to be set conditionally for the host. > > To allow such features to work without KVM having to explicitly handle > every possible host feature combination, this patch has KVM save/restore > for the host HCR when switching to/from a guest HCR. The saving of the > register is done once during cpu hypervisor initialization state and is > just restored after switch from guest. > > For fetching HCR_EL2 during kvm initialisation, a hyp call is made using > kvm_call_hyp and is helpful in non-VHE case. > > For the hyp TLB maintenance code, __tlb_switch_to_host_vhe() is updated > to toggle the TGE bit with a RMW sequence, as we already do in > __tlb_switch_to_guest_vhe(). > > The value of hcr_el2 is now stored in struct kvm_cpu_context as both host > and guest can now use this field in a common way. These HCR_EL2 flags have had me confused for quite a while. I thought this was preserving the value that head.S or cpufeature.c had set, and with ptrauth we couldn't know what this register should be anymore, the host flags has to vary. Kristina's explanation of it[0], clarified things, and with a bit more digging it appears we always set API/APK, even if the hardware doesn't support the feature (as its harmless). So we don't need to vary the host flags... My question is, what breaks if this patch isn't merged? (the MDCR change is cleanup we can do because of this HCR change), is this HCR change just cleanup too? If so, can we merge ptrauth without either, so we only make the change when its needed? (it will cause some changes in your patch 7, but I can't see where you depend on the host flags). I recall Christoffer wanting to keep the restored DAIF register value on guest-exit static to avoid extra loads/stores when we know what the value would be. I think the same logic applies here. You mentioned in the cover letter the series has some history to it! Thanks, James [0] http://lore.kernel.org/r/7ec2f950-7587-5ecd-6caa-c2fd091ad22c@arm.com
Hi, On 4/5/19 4:32 PM, Dave Martin wrote: > On Tue, Apr 02, 2019 at 07:57:12AM +0530, Amit Daniel Kachhap wrote: >> From: Mark Rutland <mark.rutland@arm.com> >> >> When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which >> is a constant value. This works today, as the host HCR_EL2 value is >> always the same, but this will get in the way of supporting extensions >> that require HCR_EL2 bits to be set conditionally for the host. >> >> To allow such features to work without KVM having to explicitly handle >> every possible host feature combination, this patch has KVM save/restore >> for the host HCR when switching to/from a guest HCR. The saving of the >> register is done once during cpu hypervisor initialization state and is >> just restored after switch from guest. >> >> For fetching HCR_EL2 during kvm initialisation, a hyp call is made using >> kvm_call_hyp and is helpful in non-VHE case. >> >> For the hyp TLB maintenance code, __tlb_switch_to_host_vhe() is updated >> to toggle the TGE bit with a RMW sequence, as we already do in >> __tlb_switch_to_guest_vhe(). >> >> The value of hcr_el2 is now stored in struct kvm_cpu_context as both host >> and guest can now use this field in a common way. >> >> Signed-off-by: Mark Rutland <mark.rutland@arm.com> >> [Added cpu_init_host_ctxt, hcr_el2 field in struct kvm_cpu_context, >> save hcr_el2 in hyp init stage] >> Signed-off-by: Amit Daniel Kachhap <amit.kachhap@arm.com> >> Reviewed-by: James Morse <james.morse@arm.com> >> Cc: Marc Zyngier <marc.zyngier@arm.com> >> Cc: Christoffer Dall <christoffer.dall@arm.com> >> Cc: kvmarm@lists.cs.columbia.edu > > [...] > >> diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h >> index a01fe087..3b09fd0 100644 >> --- a/arch/arm64/include/asm/kvm_host.h >> +++ b/arch/arm64/include/asm/kvm_host.h >> @@ -209,6 +209,8 @@ struct kvm_cpu_context { >> u32 copro[NR_COPRO_REGS]; >> }; >> >> + /* HYP host/guest configuration */ >> + u64 hcr_el2; > > Minor nit: You could delete "host/guest" from the comment here. This is > implied by the fact that the member is in struct kvm_cpu_context in the > first place. ok. Agree with you. > >> struct kvm_vcpu *__hyp_running_vcpu; >> }; > > [...] > >> diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c >> index 3563fe6..f5cefa1 100644 >> --- a/arch/arm64/kvm/hyp/switch.c >> +++ b/arch/arm64/kvm/hyp/switch.c > > [...] > >> @@ -159,9 +159,10 @@ static void deactivate_traps_vhe(void) >> } >> NOKPROBE_SYMBOL(deactivate_traps_vhe); >> >> -static void __hyp_text __deactivate_traps_nvhe(void) >> +static void __hyp_text __deactivate_traps_nvhe(struct kvm_cpu_context *host_ctxt) > > Where __hyp_text functions accept pointer arguments, they are usually > hyp pointers already... (see below) > >> { >> u64 mdcr_el2 = read_sysreg(mdcr_el2); >> + struct kvm_cpu_context *hyp_host_ctxt = kern_hyp_va(host_ctxt); >> >> __deactivate_traps_common(); >> >> @@ -169,25 +170,28 @@ static void __hyp_text __deactivate_traps_nvhe(void) >> mdcr_el2 |= MDCR_EL2_E2PB_MASK << MDCR_EL2_E2PB_SHIFT; >> >> write_sysreg(mdcr_el2, mdcr_el2); >> - write_sysreg(HCR_HOST_NVHE_FLAGS, hcr_el2); >> + write_sysreg(hyp_host_ctxt->hcr_el2, hcr_el2); >> write_sysreg(CPTR_EL2_DEFAULT, cptr_el2); >> } >> >> static void __hyp_text __deactivate_traps(struct kvm_vcpu *vcpu) >> { >> + struct kvm_cpu_context *host_ctxt; >> + >> + host_ctxt = vcpu->arch.host_cpu_context; > > host_ctxt is not otherwise used here, so can we convert it up-front so > that the argument to __deactivate_traps_nvhe() and > deactivate_traps_vhe() is a hyp pointer already? > > So: > > struct kvm_cpu_context *hyp_host_ctxt; > > hyp_host_ctxt = kern_hyp_va(vcpu->arch.host_cpu_context); > >> /* >> * If we pended a virtual abort, preserve it until it gets >> * cleared. See D1.14.3 (Virtual Interrupts) for details, but >> * the crucial bit is "On taking a vSError interrupt, >> * HCR_EL2.VSE is cleared to 0." >> */ >> - if (vcpu->arch.hcr_el2 & HCR_VSE) >> - vcpu->arch.hcr_el2 = read_sysreg(hcr_el2); >> + if (vcpu->arch.ctxt.hcr_el2 & HCR_VSE) >> + vcpu->arch.ctxt.hcr_el2 = read_sysreg(hcr_el2); >> >> if (has_vhe()) >> - deactivate_traps_vhe(); >> + deactivate_traps_vhe(host_ctxt); >> else >> - __deactivate_traps_nvhe(); >> + __deactivate_traps_nvhe(host_ctxt); > > Then just pass hyp_host_ctxt to both of these, and drop the > kern_hyp_va() conversion from __deactivate_traps_nvhe(). > > This may be a bit less confusing. Yes your explanation makes sense. > > Alternatively, just pass in the vcpu pointer (since this pattern is > already well established all over the place). I think passing vcpu as parameter will make it consistent with other existing functions. __kvm_vcpu_run_nvhe function also takes vcpu and extracts hyp_host_ctxt. > > Another option could be to pull the hcr_el2 write out of the backends > entirely and put it in this common code instead. This doesn't look > straightforward though (or at least, I don't remember enough about how > all these traps handling functions fit together...) ok. Thanks, Amit D > > [...] > > Cheers > ---Dave >
Hi James, On 4/6/19 4:07 PM, James Morse wrote: > Hi Amit, > > On 02/04/2019 03:27, Amit Daniel Kachhap wrote: >> From: Mark Rutland <mark.rutland@arm.com> >> >> When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which >> is a constant value. This works today, as the host HCR_EL2 value is >> always the same, but this will get in the way of supporting extensions >> that require HCR_EL2 bits to be set conditionally for the host. >> >> To allow such features to work without KVM having to explicitly handle >> every possible host feature combination, this patch has KVM save/restore >> for the host HCR when switching to/from a guest HCR. The saving of the >> register is done once during cpu hypervisor initialization state and is >> just restored after switch from guest. >> >> For fetching HCR_EL2 during kvm initialisation, a hyp call is made using >> kvm_call_hyp and is helpful in non-VHE case. >> >> For the hyp TLB maintenance code, __tlb_switch_to_host_vhe() is updated >> to toggle the TGE bit with a RMW sequence, as we already do in >> __tlb_switch_to_guest_vhe(). >> >> The value of hcr_el2 is now stored in struct kvm_cpu_context as both host >> and guest can now use this field in a common way. > > These HCR_EL2 flags have had me confused for quite a while. > I thought this was preserving the value that head.S or cpufeature.c had set, and with > ptrauth we couldn't know what this register should be anymore, the host flags has to vary. > > Kristina's explanation of it[0], clarified things, and with a bit more digging it appears > we always set API/APK, even if the hardware doesn't support the feature (as its harmless). > So we don't need to vary the host flags... API/APK is always set for NVHE host mode. > > My question is, what breaks if this patch isn't merged? (the MDCR change is cleanup we can > do because of this HCR change), is this HCR change just cleanup too? If so, can we merge > ptrauth without either, so we only make the change when its needed? (it will cause some > changes in your patch 7, but I can't see where you depend on the host flags). Yes you are right that this patch does not directly effect pointer authentication functionality but contains several optimizations and cleanups such as, * Removes assigning static flags HCR_HOST_VHE_FLAGS/HCR_HOST_NVHE_FLAGS from switch.c so switching functions now are more generic in nature. * Currently the variation in hcr_el2 flags is across modes (VHE/NVHE). Any future conditional change within those modes in host HCR_EL2 may not effect code changes in switch.c * Save of hcr_el2 done at hyp init time so not expensive switching wise. I am fine on posting it separately also. > > I recall Christoffer wanting to keep the restored DAIF register value on guest-exit static > to avoid extra loads/stores when we know what the value would be. I think the same logic > applies here. Yes the saving of host registers once was suggested by Christoffer. Thanks, Amit D > > You mentioned in the cover letter the series has some history to it! > > > Thanks, > > James > > [0] http://lore.kernel.org/r/7ec2f950-7587-5ecd-6caa-c2fd091ad22c@arm.com >
On 08/04/2019 14:05, Amit Daniel Kachhap wrote: > Hi James, > > On 4/6/19 4:07 PM, James Morse wrote: >> Hi Amit, >> >> On 02/04/2019 03:27, Amit Daniel Kachhap wrote: >>> From: Mark Rutland <mark.rutland@arm.com> >>> >>> When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which >>> is a constant value. This works today, as the host HCR_EL2 value is >>> always the same, but this will get in the way of supporting extensions >>> that require HCR_EL2 bits to be set conditionally for the host. >>> >>> To allow such features to work without KVM having to explicitly handle >>> every possible host feature combination, this patch has KVM save/restore >>> for the host HCR when switching to/from a guest HCR. The saving of the >>> register is done once during cpu hypervisor initialization state and is >>> just restored after switch from guest. >>> >>> For fetching HCR_EL2 during kvm initialisation, a hyp call is made using >>> kvm_call_hyp and is helpful in non-VHE case. >>> >>> For the hyp TLB maintenance code, __tlb_switch_to_host_vhe() is updated >>> to toggle the TGE bit with a RMW sequence, as we already do in >>> __tlb_switch_to_guest_vhe(). >>> >>> The value of hcr_el2 is now stored in struct kvm_cpu_context as both host >>> and guest can now use this field in a common way. >> >> These HCR_EL2 flags have had me confused for quite a while. >> I thought this was preserving the value that head.S or cpufeature.c had set, and with >> ptrauth we couldn't know what this register should be anymore, the host flags has to vary. >> >> Kristina's explanation of it[0], clarified things, and with a bit more digging it appears >> we always set API/APK, even if the hardware doesn't support the feature (as its harmless). >> So we don't need to vary the host flags... > > API/APK is always set for NVHE host mode. >> >> My question is, what breaks if this patch isn't merged? (the MDCR change is cleanup we can >> do because of this HCR change), is this HCR change just cleanup too? If so, can we merge >> ptrauth without either, so we only make the change when its needed? (it will cause some >> changes in your patch 7, but I can't see where you depend on the host flags). > > Yes you are right that this patch does not directly effect pointer authentication functionality but contains several optimizations and cleanups such as, > > * Removes assigning static flags HCR_HOST_VHE_FLAGS/HCR_HOST_NVHE_FLAGS from switch.c so switching functions now are more generic in nature. > * Currently the variation in hcr_el2 flags is across modes (VHE/NVHE). Any future conditional change within those modes in host HCR_EL2 may not effect code changes in switch.c > * Save of hcr_el2 done at hyp init time so not expensive switching wise. > > I am fine on posting it separately also. FWIW I think it makes sense to post the HCR and MDCR patches separately from this series. That should make it clear that pointer auth does not depend on these changes, and should make it easier to evaluate the changes on their own. Others' opinions are welcome as well. >> I recall Christoffer wanting to keep the restored DAIF register value on guest-exit static >> to avoid extra loads/stores when we know what the value would be. I think the same logic >> applies here. > Yes the saving of host registers once was suggested by Christoffer. I'm not familiar with this, but James may be referring to kvm_arm_vhe_guest_exit, which restores DAIF to a constant value. It seems like originally the patch saved/restored DAIF [1], but it was decided that a constant value was better. Thanks, Kristina [1] https://www.spinics.net/lists/arm-kernel/msg599798.html >> You mentioned in the cover letter the series has some history to it! >> >> >> Thanks, >> >> James >> >> [0] http://lore.kernel.org/r/7ec2f950-7587-5ecd-6caa-c2fd091ad22c@arm.com >>
On 08/04/2019 19:39, Kristina Martsenko wrote: > On 08/04/2019 14:05, Amit Daniel Kachhap wrote: >> Hi James, >> >> On 4/6/19 4:07 PM, James Morse wrote: >>> Hi Amit, >>> >>> On 02/04/2019 03:27, Amit Daniel Kachhap wrote: >>>> From: Mark Rutland <mark.rutland@arm.com> >>>> >>>> When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which >>>> is a constant value. This works today, as the host HCR_EL2 value is >>>> always the same, but this will get in the way of supporting extensions >>>> that require HCR_EL2 bits to be set conditionally for the host. >>>> >>>> To allow such features to work without KVM having to explicitly handle >>>> every possible host feature combination, this patch has KVM save/restore >>>> for the host HCR when switching to/from a guest HCR. The saving of the >>>> register is done once during cpu hypervisor initialization state and is >>>> just restored after switch from guest. >>>> >>>> For fetching HCR_EL2 during kvm initialisation, a hyp call is made using >>>> kvm_call_hyp and is helpful in non-VHE case. >>>> >>>> For the hyp TLB maintenance code, __tlb_switch_to_host_vhe() is updated >>>> to toggle the TGE bit with a RMW sequence, as we already do in >>>> __tlb_switch_to_guest_vhe(). >>>> >>>> The value of hcr_el2 is now stored in struct kvm_cpu_context as both host >>>> and guest can now use this field in a common way. >>> >>> These HCR_EL2 flags have had me confused for quite a while. >>> I thought this was preserving the value that head.S or cpufeature.c had set, and with >>> ptrauth we couldn't know what this register should be anymore, the host flags has to vary. >>> >>> Kristina's explanation of it[0], clarified things, and with a bit more digging it appears >>> we always set API/APK, even if the hardware doesn't support the feature (as its harmless). >>> So we don't need to vary the host flags... >> >> API/APK is always set for NVHE host mode. >>> >>> My question is, what breaks if this patch isn't merged? (the MDCR change is cleanup we can >>> do because of this HCR change), is this HCR change just cleanup too? If so, can we merge >>> ptrauth without either, so we only make the change when its needed? (it will cause some >>> changes in your patch 7, but I can't see where you depend on the host flags). >> >> Yes you are right that this patch does not directly effect pointer authentication functionality but contains several optimizations and cleanups such as, >> >> * Removes assigning static flags HCR_HOST_VHE_FLAGS/HCR_HOST_NVHE_FLAGS from switch.c so switching functions now are more generic in nature. >> * Currently the variation in hcr_el2 flags is across modes (VHE/NVHE). Any future conditional change within those modes in host HCR_EL2 may not effect code changes in switch.c >> * Save of hcr_el2 done at hyp init time so not expensive switching wise. >> >> I am fine on posting it separately also. > > FWIW I think it makes sense to post the HCR and MDCR patches separately > from this series. That should make it clear that pointer auth does not > depend on these changes, and should make it easier to evaluate the > changes on their own. > > Others' opinions are welcome as well. Agreed. I'm quite eager to move forward with this series, and the least unrelated changes it makes, the better. Cleanups and optimizations can always be merged at a later time. Thanks, M. -- Jazz is not dead. It just smells funny...
Hi, On 4/9/19 12:09 AM, Kristina Martsenko wrote: > On 08/04/2019 14:05, Amit Daniel Kachhap wrote: >> Hi James, >> >> On 4/6/19 4:07 PM, James Morse wrote: >>> Hi Amit, >>> >>> On 02/04/2019 03:27, Amit Daniel Kachhap wrote: >>>> From: Mark Rutland <mark.rutland@arm.com> >>>> >>>> When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which >>>> is a constant value. This works today, as the host HCR_EL2 value is >>>> always the same, but this will get in the way of supporting extensions >>>> that require HCR_EL2 bits to be set conditionally for the host. >>>> >>>> To allow such features to work without KVM having to explicitly handle >>>> every possible host feature combination, this patch has KVM save/restore >>>> for the host HCR when switching to/from a guest HCR. The saving of the >>>> register is done once during cpu hypervisor initialization state and is >>>> just restored after switch from guest. >>>> >>>> For fetching HCR_EL2 during kvm initialisation, a hyp call is made using >>>> kvm_call_hyp and is helpful in non-VHE case. >>>> >>>> For the hyp TLB maintenance code, __tlb_switch_to_host_vhe() is updated >>>> to toggle the TGE bit with a RMW sequence, as we already do in >>>> __tlb_switch_to_guest_vhe(). >>>> >>>> The value of hcr_el2 is now stored in struct kvm_cpu_context as both host >>>> and guest can now use this field in a common way. >>> >>> These HCR_EL2 flags have had me confused for quite a while. >>> I thought this was preserving the value that head.S or cpufeature.c had set, and with >>> ptrauth we couldn't know what this register should be anymore, the host flags has to vary. >>> >>> Kristina's explanation of it[0], clarified things, and with a bit more digging it appears >>> we always set API/APK, even if the hardware doesn't support the feature (as its harmless). >>> So we don't need to vary the host flags... >> >> API/APK is always set for NVHE host mode. >>> >>> My question is, what breaks if this patch isn't merged? (the MDCR change is cleanup we can >>> do because of this HCR change), is this HCR change just cleanup too? If so, can we merge >>> ptrauth without either, so we only make the change when its needed? (it will cause some >>> changes in your patch 7, but I can't see where you depend on the host flags). >> >> Yes you are right that this patch does not directly effect pointer authentication functionality but contains several optimizations and cleanups such as, >> >> * Removes assigning static flags HCR_HOST_VHE_FLAGS/HCR_HOST_NVHE_FLAGS from switch.c so switching functions now are more generic in nature. >> * Currently the variation in hcr_el2 flags is across modes (VHE/NVHE). Any future conditional change within those modes in host HCR_EL2 may not effect code changes in switch.c >> * Save of hcr_el2 done at hyp init time so not expensive switching wise. >> >> I am fine on posting it separately also. > > FWIW I think it makes sense to post the HCR and MDCR patches separately > from this series. That should make it clear that pointer auth does not > depend on these changes, and should make it easier to evaluate the > changes on their own. ok. > > Others' opinions are welcome as well. > >>> I recall Christoffer wanting to keep the restored DAIF register value on guest-exit static >>> to avoid extra loads/stores when we know what the value would be. I think the same logic >>> applies here. >> Yes the saving of host registers once was suggested by Christoffer. > > I'm not familiar with this, but James may be referring to > kvm_arm_vhe_guest_exit, which restores DAIF to a constant value. It > seems like originally the patch saved/restored DAIF [1], but it was > decided that a constant value was better. Thanks for the pointer. I mis-understood it. Thanks, Amit D > > Thanks, > Kristina > > [1] https://www.spinics.net/lists/arm-kernel/msg599798.html > >>> You mentioned in the cover letter the series has some history to it! >>> >>> >>> Thanks, >>> >>> James >>> >>> [0] http://lore.kernel.org/r/7ec2f950-7587-5ecd-6caa-c2fd091ad22c@arm.com >>> >
Hi Mark, On 4/9/19 2:08 PM, Marc Zyngier wrote: > On 08/04/2019 19:39, Kristina Martsenko wrote: >> On 08/04/2019 14:05, Amit Daniel Kachhap wrote: >>> Hi James, >>> >>> On 4/6/19 4:07 PM, James Morse wrote: >>>> Hi Amit, >>>> >>>> On 02/04/2019 03:27, Amit Daniel Kachhap wrote: >>>>> From: Mark Rutland <mark.rutland@arm.com> >>>>> >>>>> When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which >>>>> is a constant value. This works today, as the host HCR_EL2 value is >>>>> always the same, but this will get in the way of supporting extensions >>>>> that require HCR_EL2 bits to be set conditionally for the host. >>>>> >>>>> To allow such features to work without KVM having to explicitly handle >>>>> every possible host feature combination, this patch has KVM save/restore >>>>> for the host HCR when switching to/from a guest HCR. The saving of the >>>>> register is done once during cpu hypervisor initialization state and is >>>>> just restored after switch from guest. >>>>> >>>>> For fetching HCR_EL2 during kvm initialisation, a hyp call is made using >>>>> kvm_call_hyp and is helpful in non-VHE case. >>>>> >>>>> For the hyp TLB maintenance code, __tlb_switch_to_host_vhe() is updated >>>>> to toggle the TGE bit with a RMW sequence, as we already do in >>>>> __tlb_switch_to_guest_vhe(). >>>>> >>>>> The value of hcr_el2 is now stored in struct kvm_cpu_context as both host >>>>> and guest can now use this field in a common way. >>>> >>>> These HCR_EL2 flags have had me confused for quite a while. >>>> I thought this was preserving the value that head.S or cpufeature.c had set, and with >>>> ptrauth we couldn't know what this register should be anymore, the host flags has to vary. >>>> >>>> Kristina's explanation of it[0], clarified things, and with a bit more digging it appears >>>> we always set API/APK, even if the hardware doesn't support the feature (as its harmless). >>>> So we don't need to vary the host flags... >>> >>> API/APK is always set for NVHE host mode. >>>> >>>> My question is, what breaks if this patch isn't merged? (the MDCR change is cleanup we can >>>> do because of this HCR change), is this HCR change just cleanup too? If so, can we merge >>>> ptrauth without either, so we only make the change when its needed? (it will cause some >>>> changes in your patch 7, but I can't see where you depend on the host flags). >>> >>> Yes you are right that this patch does not directly effect pointer authentication functionality but contains several optimizations and cleanups such as, >>> >>> * Removes assigning static flags HCR_HOST_VHE_FLAGS/HCR_HOST_NVHE_FLAGS from switch.c so switching functions now are more generic in nature. >>> * Currently the variation in hcr_el2 flags is across modes (VHE/NVHE). Any future conditional change within those modes in host HCR_EL2 may not effect code changes in switch.c >>> * Save of hcr_el2 done at hyp init time so not expensive switching wise. >>> >>> I am fine on posting it separately also. >> >> FWIW I think it makes sense to post the HCR and MDCR patches separately >> from this series. That should make it clear that pointer auth does not >> depend on these changes, and should make it easier to evaluate the >> changes on their own. >> >> Others' opinions are welcome as well. > > Agreed. I'm quite eager to move forward with this series, and the least > unrelated changes it makes, the better. Cleanups and optimizations can > always be merged at a later time. yes sure. I will re-spin the patch series shortly. Thanks, Amit D. > > Thanks, > > M. >
diff --git a/arch/arm/include/asm/kvm_host.h b/arch/arm/include/asm/kvm_host.h index 770d732..6d0aac4 100644 --- a/arch/arm/include/asm/kvm_host.h +++ b/arch/arm/include/asm/kvm_host.h @@ -322,6 +322,8 @@ static inline void __cpu_init_stage2(void) kvm_call_hyp(__init_stage2_translation); } +static inline void cpu_init_host_ctxt(void) {} + static inline int kvm_arch_vm_ioctl_check_extension(struct kvm *kvm, long ext) { return 0; diff --git a/arch/arm64/include/asm/kvm_asm.h b/arch/arm64/include/asm/kvm_asm.h index 57a07e8..a68205c 100644 --- a/arch/arm64/include/asm/kvm_asm.h +++ b/arch/arm64/include/asm/kvm_asm.h @@ -80,6 +80,8 @@ extern void __vgic_v3_init_lrs(void); extern u32 __kvm_get_mdcr_el2(void); +extern void __kvm_populate_host_regs(void); + /* * Obtain the PC-relative address of a kernel symbol * s: symbol diff --git a/arch/arm64/include/asm/kvm_emulate.h b/arch/arm64/include/asm/kvm_emulate.h index d384279..426815d 100644 --- a/arch/arm64/include/asm/kvm_emulate.h +++ b/arch/arm64/include/asm/kvm_emulate.h @@ -50,25 +50,25 @@ void kvm_inject_pabt32(struct kvm_vcpu *vcpu, unsigned long addr); static inline bool vcpu_el1_is_32bit(struct kvm_vcpu *vcpu) { - return !(vcpu->arch.hcr_el2 & HCR_RW); + return !(vcpu->arch.ctxt.hcr_el2 & HCR_RW); } static inline void vcpu_reset_hcr(struct kvm_vcpu *vcpu) { - vcpu->arch.hcr_el2 = HCR_GUEST_FLAGS; + vcpu->arch.ctxt.hcr_el2 = HCR_GUEST_FLAGS; if (is_kernel_in_hyp_mode()) - vcpu->arch.hcr_el2 |= HCR_E2H; + vcpu->arch.ctxt.hcr_el2 |= HCR_E2H; if (cpus_have_const_cap(ARM64_HAS_RAS_EXTN)) { /* route synchronous external abort exceptions to EL2 */ - vcpu->arch.hcr_el2 |= HCR_TEA; + vcpu->arch.ctxt.hcr_el2 |= HCR_TEA; /* trap error record accesses */ - vcpu->arch.hcr_el2 |= HCR_TERR; + vcpu->arch.ctxt.hcr_el2 |= HCR_TERR; } if (cpus_have_const_cap(ARM64_HAS_STAGE2_FWB)) - vcpu->arch.hcr_el2 |= HCR_FWB; + vcpu->arch.ctxt.hcr_el2 |= HCR_FWB; if (test_bit(KVM_ARM_VCPU_EL1_32BIT, vcpu->arch.features)) - vcpu->arch.hcr_el2 &= ~HCR_RW; + vcpu->arch.ctxt.hcr_el2 &= ~HCR_RW; /* * TID3: trap feature register accesses that we virtualise. @@ -76,26 +76,26 @@ static inline void vcpu_reset_hcr(struct kvm_vcpu *vcpu) * are currently virtualised. */ if (!vcpu_el1_is_32bit(vcpu)) - vcpu->arch.hcr_el2 |= HCR_TID3; + vcpu->arch.ctxt.hcr_el2 |= HCR_TID3; if (cpus_have_const_cap(ARM64_MISMATCHED_CACHE_TYPE) || vcpu_el1_is_32bit(vcpu)) - vcpu->arch.hcr_el2 |= HCR_TID2; + vcpu->arch.ctxt.hcr_el2 |= HCR_TID2; } static inline unsigned long *vcpu_hcr(struct kvm_vcpu *vcpu) { - return (unsigned long *)&vcpu->arch.hcr_el2; + return (unsigned long *)&vcpu->arch.ctxt.hcr_el2; } static inline void vcpu_clear_wfe_traps(struct kvm_vcpu *vcpu) { - vcpu->arch.hcr_el2 &= ~HCR_TWE; + vcpu->arch.ctxt.hcr_el2 &= ~HCR_TWE; } static inline void vcpu_set_wfe_traps(struct kvm_vcpu *vcpu) { - vcpu->arch.hcr_el2 |= HCR_TWE; + vcpu->arch.ctxt.hcr_el2 |= HCR_TWE; } static inline unsigned long vcpu_get_vsesr(struct kvm_vcpu *vcpu) diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h index a01fe087..3b09fd0 100644 --- a/arch/arm64/include/asm/kvm_host.h +++ b/arch/arm64/include/asm/kvm_host.h @@ -209,6 +209,8 @@ struct kvm_cpu_context { u32 copro[NR_COPRO_REGS]; }; + /* HYP host/guest configuration */ + u64 hcr_el2; struct kvm_vcpu *__hyp_running_vcpu; }; @@ -225,7 +227,6 @@ struct kvm_vcpu_arch { struct kvm_cpu_context ctxt; /* HYP configuration */ - u64 hcr_el2; u32 mdcr_el2; /* Exception Information */ @@ -510,6 +511,18 @@ int kvm_arm_vcpu_arch_has_attr(struct kvm_vcpu *vcpu, static inline void __cpu_init_stage2(void) {} +/** + * cpu_init_host_ctxt - save the boot hyp configuration registers + * + * It is called per-cpu during CPU hyp initialisation and the + * registers context saved may be used during host/guest context + * switch. + */ +static inline void cpu_init_host_ctxt(void) +{ + kvm_call_hyp(__kvm_populate_host_regs); +} + /* Guest/host FPSIMD coordination helpers */ int kvm_arch_vcpu_run_map_fp(struct kvm_vcpu *vcpu); void kvm_arch_vcpu_load_fp(struct kvm_vcpu *vcpu); diff --git a/arch/arm64/kvm/guest.c b/arch/arm64/kvm/guest.c index dd436a5..e2f0268 100644 --- a/arch/arm64/kvm/guest.c +++ b/arch/arm64/kvm/guest.c @@ -345,7 +345,7 @@ int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu, int __kvm_arm_vcpu_get_events(struct kvm_vcpu *vcpu, struct kvm_vcpu_events *events) { - events->exception.serror_pending = !!(vcpu->arch.hcr_el2 & HCR_VSE); + events->exception.serror_pending = !!(vcpu->arch.ctxt.hcr_el2 & HCR_VSE); events->exception.serror_has_esr = cpus_have_const_cap(ARM64_HAS_RAS_EXTN); if (events->exception.serror_pending && events->exception.serror_has_esr) diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c index 3563fe6..f5cefa1 100644 --- a/arch/arm64/kvm/hyp/switch.c +++ b/arch/arm64/kvm/hyp/switch.c @@ -129,7 +129,7 @@ static void __hyp_text __activate_traps_nvhe(struct kvm_vcpu *vcpu) static void __hyp_text __activate_traps(struct kvm_vcpu *vcpu) { - u64 hcr = vcpu->arch.hcr_el2; + u64 hcr = vcpu->arch.ctxt.hcr_el2; write_sysreg(hcr, hcr_el2); @@ -142,10 +142,10 @@ static void __hyp_text __activate_traps(struct kvm_vcpu *vcpu) __activate_traps_nvhe(vcpu); } -static void deactivate_traps_vhe(void) +static void deactivate_traps_vhe(struct kvm_cpu_context *host_ctxt) { extern char vectors[]; /* kernel exception vectors */ - write_sysreg(HCR_HOST_VHE_FLAGS, hcr_el2); + write_sysreg(host_ctxt->hcr_el2, hcr_el2); /* * ARM erratum 1165522 requires the actual execution of the above @@ -159,9 +159,10 @@ static void deactivate_traps_vhe(void) } NOKPROBE_SYMBOL(deactivate_traps_vhe); -static void __hyp_text __deactivate_traps_nvhe(void) +static void __hyp_text __deactivate_traps_nvhe(struct kvm_cpu_context *host_ctxt) { u64 mdcr_el2 = read_sysreg(mdcr_el2); + struct kvm_cpu_context *hyp_host_ctxt = kern_hyp_va(host_ctxt); __deactivate_traps_common(); @@ -169,25 +170,28 @@ static void __hyp_text __deactivate_traps_nvhe(void) mdcr_el2 |= MDCR_EL2_E2PB_MASK << MDCR_EL2_E2PB_SHIFT; write_sysreg(mdcr_el2, mdcr_el2); - write_sysreg(HCR_HOST_NVHE_FLAGS, hcr_el2); + write_sysreg(hyp_host_ctxt->hcr_el2, hcr_el2); write_sysreg(CPTR_EL2_DEFAULT, cptr_el2); } static void __hyp_text __deactivate_traps(struct kvm_vcpu *vcpu) { + struct kvm_cpu_context *host_ctxt; + + host_ctxt = vcpu->arch.host_cpu_context; /* * If we pended a virtual abort, preserve it until it gets * cleared. See D1.14.3 (Virtual Interrupts) for details, but * the crucial bit is "On taking a vSError interrupt, * HCR_EL2.VSE is cleared to 0." */ - if (vcpu->arch.hcr_el2 & HCR_VSE) - vcpu->arch.hcr_el2 = read_sysreg(hcr_el2); + if (vcpu->arch.ctxt.hcr_el2 & HCR_VSE) + vcpu->arch.ctxt.hcr_el2 = read_sysreg(hcr_el2); if (has_vhe()) - deactivate_traps_vhe(); + deactivate_traps_vhe(host_ctxt); else - __deactivate_traps_nvhe(); + __deactivate_traps_nvhe(host_ctxt); } void activate_traps_vhe_load(struct kvm_vcpu *vcpu) diff --git a/arch/arm64/kvm/hyp/sysreg-sr.c b/arch/arm64/kvm/hyp/sysreg-sr.c index c52a845..277f82b 100644 --- a/arch/arm64/kvm/hyp/sysreg-sr.c +++ b/arch/arm64/kvm/hyp/sysreg-sr.c @@ -320,3 +320,17 @@ void __hyp_text __kvm_enable_ssbs(void) "msr sctlr_el2, %0" : "=&r" (tmp) : "L" (SCTLR_ELx_DSSBS)); } + +/** + * __kvm_populate_host_regs - Fetches host register values + * + * This function acts as a function handler parameter for kvm_call_hyp and + * may be called from EL1 exception level to fetch the host register values. + */ +void __hyp_text __kvm_populate_host_regs(void) +{ + struct kvm_cpu_context *host_ctxt; + + host_ctxt = __hyp_this_cpu_ptr(kvm_host_cpu_state); + host_ctxt->hcr_el2 = read_sysreg(hcr_el2); +} diff --git a/arch/arm64/kvm/hyp/tlb.c b/arch/arm64/kvm/hyp/tlb.c index 76c3086..c5e7144 100644 --- a/arch/arm64/kvm/hyp/tlb.c +++ b/arch/arm64/kvm/hyp/tlb.c @@ -86,12 +86,16 @@ static hyp_alternate_select(__tlb_switch_to_guest, static void __hyp_text __tlb_switch_to_host_vhe(struct kvm *kvm, struct tlb_inv_context *cxt) { + u64 val; + /* * We're done with the TLB operation, let's restore the host's * view of HCR_EL2. */ write_sysreg(0, vttbr_el2); - write_sysreg(HCR_HOST_VHE_FLAGS, hcr_el2); + val = read_sysreg(hcr_el2); + val |= HCR_TGE; + write_sysreg(val, hcr_el2); isb(); if (cpus_have_const_cap(ARM64_WORKAROUND_1165522)) { diff --git a/virt/kvm/arm/arm.c b/virt/kvm/arm/arm.c index 99c3738..e8c2ee6 100644 --- a/virt/kvm/arm/arm.c +++ b/virt/kvm/arm/arm.c @@ -1323,6 +1323,7 @@ static void cpu_hyp_reinit(void) cpu_init_hyp_mode(NULL); kvm_arm_init_debug(); + cpu_init_host_ctxt(); if (vgic_present) kvm_vgic_init_cpu_hardware();