Re: [PATCH 26/59] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 26/06/2019 06:31, Julien Thierry wrote:
> 
> 
> On 06/21/2019 10:38 AM, Marc Zyngier wrote:
>> From: Jintack Lim <jintack.lim@xxxxxxxxxx>
>>
>> Forward traps due to HCR_EL2.NV bit to the virtual EL2 if they are not
>> coming from the virtual EL2 and the virtual HCR_EL2.NV bit is set.
>>
>> In addition to EL2 register accesses, setting NV bit will also make EL12
>> register accesses trap to EL2. To emulate this for the virtual EL2,
>> forword traps due to EL12 register accessses to the virtual EL2 if the
>> virtual HCR_EL2.NV bit is set.
>>
>> This is for recursive nested virtualization.
>>
>> Signed-off-by: Jintack Lim <jintack.lim@xxxxxxxxxx>
>> [Moved code to emulate-nested.c]
>> Signed-off-by: Christoffer Dall <christoffer.dall@xxxxxxx>
>> Signed-off-by: Marc Zyngier <marc.zyngier@xxxxxxx>
>> ---
>>  arch/arm64/include/asm/kvm_arm.h    |  1 +
>>  arch/arm64/include/asm/kvm_nested.h |  2 ++
>>  arch/arm64/kvm/emulate-nested.c     | 28 ++++++++++++++++++++++++++++
>>  arch/arm64/kvm/handle_exit.c        |  6 ++++++
>>  arch/arm64/kvm/sys_regs.c           | 18 ++++++++++++++++++
>>  5 files changed, 55 insertions(+)
>>
>> diff --git a/arch/arm64/include/asm/kvm_arm.h b/arch/arm64/include/asm/kvm_arm.h
>> index 48e15af2bece..d21486274eeb 100644
>> --- a/arch/arm64/include/asm/kvm_arm.h
>> +++ b/arch/arm64/include/asm/kvm_arm.h
>> @@ -24,6 +24,7 @@
>>  
>>  /* Hyp Configuration Register (HCR) bits */
>>  #define HCR_FWB		(UL(1) << 46)
>> +#define HCR_NV		(UL(1) << 42)
>>  #define HCR_API		(UL(1) << 41)
>>  #define HCR_APK		(UL(1) << 40)
>>  #define HCR_TEA		(UL(1) << 37)
>> diff --git a/arch/arm64/include/asm/kvm_nested.h b/arch/arm64/include/asm/kvm_nested.h
>> index 645e5e11b749..61e71d0d2151 100644
>> --- a/arch/arm64/include/asm/kvm_nested.h
>> +++ b/arch/arm64/include/asm/kvm_nested.h
>> @@ -11,5 +11,7 @@ static inline bool nested_virt_in_use(const struct kvm_vcpu *vcpu)
>>  }
>>  
>>  int handle_wfx_nested(struct kvm_vcpu *vcpu, bool is_wfe);
>> +extern bool forward_traps(struct kvm_vcpu *vcpu, u64 control_bit);
>> +extern bool forward_nv_traps(struct kvm_vcpu *vcpu);
>>  
>>  #endif /* __ARM64_KVM_NESTED_H */
>> diff --git a/arch/arm64/kvm/emulate-nested.c b/arch/arm64/kvm/emulate-nested.c
>> index f829b8b04dc8..c406fd688b9f 100644
>> --- a/arch/arm64/kvm/emulate-nested.c
>> +++ b/arch/arm64/kvm/emulate-nested.c
>> @@ -24,6 +24,27 @@
>>  
>>  #include "trace.h"
>>  
>> +bool forward_traps(struct kvm_vcpu *vcpu, u64 control_bit)
> 
> Should this one be static?

$ git grep forward_traps
arch/arm64/include/asm/kvm_nested.h:extern bool forward_traps(struct kvm_vcpu *vcpu, u64 control_bit);
arch/arm64/kvm/emulate-nested.c:bool forward_traps(struct kvm_vcpu *vcpu, u64 control_bit)
arch/arm64/kvm/emulate-nested.c:        return forward_traps(vcpu, HCR_NV);
arch/arm64/kvm/sys_regs.c:      return forward_traps(vcpu, HCR_AT);
arch/arm64/kvm/sys_regs.c:      return forward_traps(vcpu, HCR_TTLB);
arch/arm64/kvm/sys_regs.c:      return forward_traps(vcpu, HCR_NV1);

I guess not.

> 
>> +{
>> +	bool control_bit_set;
>> +
>> +	if (!nested_virt_in_use(vcpu))
>> +		return false;
>> +
>> +	control_bit_set = __vcpu_sys_reg(vcpu, HCR_EL2) & control_bit;
>> +	if (!vcpu_mode_el2(vcpu) && control_bit_set) {
>> +		kvm_inject_nested_sync(vcpu, kvm_vcpu_get_hsr(vcpu));
>> +		return true;
>> +	}
>> +	return false;
>> +}
>> +
>> +bool forward_nv_traps(struct kvm_vcpu *vcpu)
>> +{
>> +	return forward_traps(vcpu, HCR_NV);
>> +}
>> +
>> +
>>  /* This is borrowed from get_except_vector in inject_fault.c */
>>  static u64 get_el2_except_vector(struct kvm_vcpu *vcpu,
>>  		enum exception_type type)
>> @@ -55,6 +76,13 @@ void kvm_emulate_nested_eret(struct kvm_vcpu *vcpu)
>>  	u64 spsr, elr, mode;
>>  	bool direct_eret;
>>  
>> +	/*
>> +	 * Forward this trap to the virtual EL2 if the virtual
>> +	 * HCR_EL2.NV bit is set and this is coming from !EL2.
>> +	 */
>> +	if (forward_nv_traps(vcpu))
>> +		return;
>> +
>>  	/*
>>  	 * Going through the whole put/load motions is a waste of time
>>  	 * if this is a VHE guest hypervisor returning to its own
>> diff --git a/arch/arm64/kvm/handle_exit.c b/arch/arm64/kvm/handle_exit.c
>> index 39602a4c1d61..7e8b1ec1d251 100644
>> --- a/arch/arm64/kvm/handle_exit.c
>> +++ b/arch/arm64/kvm/handle_exit.c
>> @@ -72,6 +72,12 @@ static int handle_smc(struct kvm_vcpu *vcpu, struct kvm_run *run)
>>  {
>>  	int ret;
>>  
>> +	/*
>> +	 * Forward this trapped smc instruction to the virtual EL2.
>> +	 */
>> +	if ((vcpu_read_sys_reg(vcpu, HCR_EL2) & HCR_TSC) && forward_nv_traps(vcpu))
> 
> Not sure I understand why this would be only when the guest hyp also has
> NV set.
> 
> If the guest hyp requested to trap smc instructions and that we received
> one while in vel1, shouldn't we always forward it to the guest hyp to
> let it implement the smc response the way it wants?

There is a small difference, but I'm not sure it matters: If EL3 is not
implemented, SMC UNDEFs at EL1 unless NV is set. So we know here that our
guest is running a guest hypervisor. But does it change a thing?

I need to think about it again... :-(

	M.
-- 
Jazz is not dead. It just smells funny...



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux