From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.5 required=3.0 tests=MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C00DEC43331 for ; Fri, 6 Sep 2019 12:34:55 +0000 (UTC) Received: from mm01.cs.columbia.edu (mm01.cs.columbia.edu [128.59.11.253]) by mail.kernel.org (Postfix) with ESMTP id 517AC20854 for ; Fri, 6 Sep 2019 12:34:55 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 517AC20854 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvmarm-bounces@lists.cs.columbia.edu Received: from localhost (localhost [127.0.0.1]) by mm01.cs.columbia.edu (Postfix) with ESMTP id AFDD84A5BC; Fri, 6 Sep 2019 08:34:54 -0400 (EDT) X-Virus-Scanned: at lists.cs.columbia.edu Received: from mm01.cs.columbia.edu ([127.0.0.1]) by localhost (mm01.cs.columbia.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sZvf3jpgnstN; Fri, 6 Sep 2019 08:34:53 -0400 (EDT) Received: from mm01.cs.columbia.edu (localhost [127.0.0.1]) by mm01.cs.columbia.edu (Postfix) with ESMTP id 9BAB34A5AD; Fri, 6 Sep 2019 08:34:53 -0400 (EDT) Received: from localhost (localhost [127.0.0.1]) by mm01.cs.columbia.edu (Postfix) with ESMTP id DF7594A5AD for ; Fri, 6 Sep 2019 08:34:52 -0400 (EDT) X-Virus-Scanned: at lists.cs.columbia.edu Received: from mm01.cs.columbia.edu ([127.0.0.1]) by localhost (mm01.cs.columbia.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B2rSrwKMqsH8 for ; Fri, 6 Sep 2019 08:34:51 -0400 (EDT) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mm01.cs.columbia.edu (Postfix) with ESMTP id BE4F74A535 for ; Fri, 6 Sep 2019 08:34:51 -0400 (EDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 57B971570; Fri, 6 Sep 2019 05:34:51 -0700 (PDT) Received: from [10.1.197.61] (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 52B373F718; Fri, 6 Sep 2019 05:34:50 -0700 (PDT) Subject: Re: [PATCH 1/1] KVM: inject data abort if instruction cannot be decoded To: Alexander Graf , Christoffer Dall References: <20190904180736.29009-1-xypron.glpk@gmx.de> <86r24vrwyh.wl-maz@kernel.org> <86mufjrup7.wl-maz@kernel.org> <20190905092223.GC4320@e113682-lin.lund.arm.com> <4b6662bd-56e4-3c10-3b65-7c90828a22f9@kernel.org> <20190906080033.GF4320@e113682-lin.lund.arm.com> From: Marc Zyngier Organization: Approximate Message-ID: <0a99ce2b-7700-2a2f-eb3a-4922631cbe02@kernel.org> Date: Fri, 6 Sep 2019 13:34:48 +0100 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Language: en-US Cc: =?UTF-8?Q?Daniel_P=2e_Berrang=c3=a9?= , Heinrich Schuchardt , lkml - Kernel Mailing List , Stefan Hajnoczi , kvmarm@lists.cs.columbia.edu, arm-mail-list X-BeenThere: kvmarm@lists.cs.columbia.edu X-Mailman-Version: 2.1.14 Precedence: list List-Id: Where KVM/ARM decisions are made List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: kvmarm-bounces@lists.cs.columbia.edu Sender: kvmarm-bounces@lists.cs.columbia.edu On 06/09/2019 13:08, Alexander Graf wrote: > > > On 06.09.19 10:00, Christoffer Dall wrote: >> On Thu, Sep 05, 2019 at 02:09:18PM +0100, Marc Zyngier wrote: [...] >>>> @@ -673,6 +694,8 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run) >>>> ret = kvm_handle_mmio_return(vcpu, vcpu->run); >>>> if (ret) >>>> return ret; >>>> + } else if (run->exit_reason == KVM_EXIT_ARM_NISV) { >>>> + kvm_inject_undefined(vcpu); >>> >>> Just to make sure I understand: Is the expectation here that userspace >>> could clear the exit reason if it managed to handle the exit? And >>> otherwise we'd inject an UNDEF on reentry? >>> >> >> Yes, but I think we should change that to an external abort. I'll test >> something and send a proper patch with more clear documentation. > > Why not leave the injection to user space in any case? API wise there is > no need to be backwards compatible, as we require the CAP to be enabled, > right? > > IMHO it should be 100% a policy decision in user space whether to > emulate and what type of exception to inject, if anything. The exception has to be something that the trapped instruction can actually generate. An UNDEF is definitely wrong, as the guest would have otherwise UNDEF'd at EL1, and KVM would have never seen it. You cannot deviate from the rule of architecture, and userspace feels like the wrong place to enforce it. M. -- Jazz is not dead, it just smells funny... _______________________________________________ kvmarm mailing list kvmarm@lists.cs.columbia.edu https://lists.cs.columbia.edu/mailman/listinfo/kvmarm