Thomas Gleixner | caab277 | 2019-06-03 07:44:50 +0200 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 2 | /* |
| 3 | * Copyright (C) 2012,2013 - ARM Ltd |
| 4 | * Author: Marc Zyngier <marc.zyngier@arm.com> |
| 5 | * |
| 6 | * Derived from arch/arm/kvm/handle_exit.c: |
| 7 | * Copyright (C) 2012 - Virtual Open Systems and Columbia University |
| 8 | * Author: Christoffer Dall <c.dall@virtualopensystems.com> |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 9 | */ |
| 10 | |
| 11 | #include <linux/kvm.h> |
| 12 | #include <linux/kvm_host.h> |
Mark Rutland | c6d01a9 | 2014-11-24 13:59:30 +0000 | [diff] [blame] | 13 | |
| 14 | #include <asm/esr.h> |
James Morse | 0067df4 | 2018-01-15 19:39:05 +0000 | [diff] [blame] | 15 | #include <asm/exception.h> |
Marc Zyngier | 9d8415d | 2015-10-25 19:57:11 +0000 | [diff] [blame] | 16 | #include <asm/kvm_asm.h> |
Mark Rutland | c6d01a9 | 2014-11-24 13:59:30 +0000 | [diff] [blame] | 17 | #include <asm/kvm_emulate.h> |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 18 | #include <asm/kvm_mmu.h> |
Alex Bennée | e70dce7 | 2017-11-23 12:11:33 +0000 | [diff] [blame] | 19 | #include <asm/debug-monitors.h> |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 20 | #include <asm/traps.h> |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 21 | |
Christoffer Dall | 55009c6 | 2019-10-21 16:28:15 +0100 | [diff] [blame] | 22 | #include <kvm/arm_hypercalls.h> |
| 23 | |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 24 | #define CREATE_TRACE_POINTS |
Marc Zyngier | 9ed24f4 | 2020-05-13 11:40:34 +0100 | [diff] [blame] | 25 | #include "trace_handle_exit.h" |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 26 | |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 27 | typedef int (*exit_handle_fn)(struct kvm_vcpu *); |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 28 | |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 29 | static void kvm_handle_guest_serror(struct kvm_vcpu *vcpu, u32 esr) |
| 30 | { |
| 31 | if (!arm64_is_ras_serror(esr) || arm64_is_fatal_ras_serror(NULL, esr)) |
| 32 | kvm_inject_vabt(vcpu); |
| 33 | } |
| 34 | |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 35 | static int handle_hvc(struct kvm_vcpu *vcpu) |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 36 | { |
Anup Patel | e8e7fcc | 2014-04-29 11:24:18 +0530 | [diff] [blame] | 37 | int ret; |
Marc Zyngier | dcd2e40 | 2012-12-12 18:52:05 +0000 | [diff] [blame] | 38 | |
Pavel Fedin | f6be563 | 2015-12-04 15:03:14 +0300 | [diff] [blame] | 39 | trace_kvm_hvc_arm64(*vcpu_pc(vcpu), vcpu_get_reg(vcpu, 0), |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 40 | kvm_vcpu_hvc_get_imm(vcpu)); |
Amit Tomar | b19e689 | 2015-11-26 10:09:43 +0000 | [diff] [blame] | 41 | vcpu->stat.hvc_exit_stat++; |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 42 | |
Marc Zyngier | 09e6be1 | 2018-02-06 17:56:12 +0000 | [diff] [blame] | 43 | ret = kvm_hvc_call_handler(vcpu); |
Anup Patel | e8e7fcc | 2014-04-29 11:24:18 +0530 | [diff] [blame] | 44 | if (ret < 0) { |
Marc Zyngier | c0938c7 | 2018-02-06 17:56:05 +0000 | [diff] [blame] | 45 | vcpu_set_reg(vcpu, 0, ~0UL); |
Anup Patel | e8e7fcc | 2014-04-29 11:24:18 +0530 | [diff] [blame] | 46 | return 1; |
| 47 | } |
| 48 | |
| 49 | return ret; |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 50 | } |
| 51 | |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 52 | static int handle_smc(struct kvm_vcpu *vcpu) |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 53 | { |
Marc Zyngier | f5115e8 | 2018-02-06 17:56:07 +0000 | [diff] [blame] | 54 | /* |
| 55 | * "If an SMC instruction executed at Non-secure EL1 is |
| 56 | * trapped to EL2 because HCR_EL2.TSC is 1, the exception is a |
| 57 | * Trap exception, not a Secure Monitor Call exception [...]" |
| 58 | * |
| 59 | * We need to advance the PC after the trap, as it would |
| 60 | * otherwise return to the same address... |
| 61 | */ |
Marc Zyngier | c0938c7 | 2018-02-06 17:56:05 +0000 | [diff] [blame] | 62 | vcpu_set_reg(vcpu, 0, ~0UL); |
Marc Zyngier | cdb5e02 | 2020-10-14 09:29:27 +0100 | [diff] [blame] | 63 | kvm_incr_pc(vcpu); |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 64 | return 1; |
| 65 | } |
| 66 | |
Suzuki K Poulose | 82e0191 | 2016-11-08 13:56:21 +0000 | [diff] [blame] | 67 | /* |
| 68 | * Guest access to FP/ASIMD registers are routed to this handler only |
| 69 | * when the system doesn't support FP/ASIMD. |
| 70 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 71 | static int handle_no_fpsimd(struct kvm_vcpu *vcpu) |
Suzuki K Poulose | 82e0191 | 2016-11-08 13:56:21 +0000 | [diff] [blame] | 72 | { |
| 73 | kvm_inject_undefined(vcpu); |
| 74 | return 1; |
| 75 | } |
| 76 | |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 77 | /** |
Marc Zyngier | d241aac | 2013-08-02 11:41:13 +0100 | [diff] [blame] | 78 | * kvm_handle_wfx - handle a wait-for-interrupts or wait-for-event |
| 79 | * instruction executed by a guest |
| 80 | * |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 81 | * @vcpu: the vcpu pointer |
| 82 | * |
Marc Zyngier | d241aac | 2013-08-02 11:41:13 +0100 | [diff] [blame] | 83 | * WFE: Yield the CPU and come back to this vcpu when the scheduler |
| 84 | * decides to. |
| 85 | * WFI: Simply call kvm_vcpu_block(), which will halt execution of |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 86 | * world-switches and schedule other host processes until there is an |
| 87 | * incoming IRQ or FIQ to the VM. |
| 88 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 89 | static int kvm_handle_wfx(struct kvm_vcpu *vcpu) |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 90 | { |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 91 | if (kvm_vcpu_get_esr(vcpu) & ESR_ELx_WFx_ISS_WFE) { |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 92 | trace_kvm_wfx_arm64(*vcpu_pc(vcpu), true); |
Amit Tomar | b19e689 | 2015-11-26 10:09:43 +0000 | [diff] [blame] | 93 | vcpu->stat.wfe_exit_stat++; |
Longpeng(Mike) | f01fbd2 | 2017-08-08 12:05:35 +0800 | [diff] [blame] | 94 | kvm_vcpu_on_spin(vcpu, vcpu_mode_priv(vcpu)); |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 95 | } else { |
| 96 | trace_kvm_wfx_arm64(*vcpu_pc(vcpu), false); |
Amit Tomar | b19e689 | 2015-11-26 10:09:43 +0000 | [diff] [blame] | 97 | vcpu->stat.wfi_exit_stat++; |
Marc Zyngier | d241aac | 2013-08-02 11:41:13 +0100 | [diff] [blame] | 98 | kvm_vcpu_block(vcpu); |
Andrew Jones | 6a6d73b | 2017-06-04 14:43:54 +0200 | [diff] [blame] | 99 | kvm_clear_request(KVM_REQ_UNHALT, vcpu); |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 100 | } |
Marc Zyngier | d241aac | 2013-08-02 11:41:13 +0100 | [diff] [blame] | 101 | |
Marc Zyngier | cdb5e02 | 2020-10-14 09:29:27 +0100 | [diff] [blame] | 102 | kvm_incr_pc(vcpu); |
Christoffer Dall | 05e0127 | 2014-08-26 14:33:02 +0200 | [diff] [blame] | 103 | |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 104 | return 1; |
| 105 | } |
| 106 | |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 107 | /** |
| 108 | * kvm_handle_guest_debug - handle a debug exception instruction |
| 109 | * |
| 110 | * @vcpu: the vcpu pointer |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 111 | * |
| 112 | * We route all debug exceptions through the same handler. If both the |
| 113 | * guest and host are using the same debug facilities it will be up to |
| 114 | * userspace to re-inject the correct exception for guest delivery. |
| 115 | * |
Raghavendra Rao Ananta | 8ce8a6f | 2021-08-23 22:39:40 +0000 | [diff] [blame] | 116 | * @return: 0 (while setting vcpu->run->exit_reason) |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 117 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 118 | static int kvm_handle_guest_debug(struct kvm_vcpu *vcpu) |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 119 | { |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 120 | struct kvm_run *run = vcpu->run; |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 121 | u32 esr = kvm_vcpu_get_esr(vcpu); |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 122 | |
| 123 | run->exit_reason = KVM_EXIT_DEBUG; |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 124 | run->debug.arch.hsr = esr; |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 125 | |
Raghavendra Rao Ananta | 8ce8a6f | 2021-08-23 22:39:40 +0000 | [diff] [blame] | 126 | if (ESR_ELx_EC(esr) == ESR_ELx_EC_WATCHPT_LOW) |
Alex Bennée | 834bf88 | 2015-07-07 17:30:02 +0100 | [diff] [blame] | 127 | run->debug.arch.far = vcpu->arch.fault.far_el2; |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 128 | |
Raghavendra Rao Ananta | 8ce8a6f | 2021-08-23 22:39:40 +0000 | [diff] [blame] | 129 | return 0; |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 130 | } |
| 131 | |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 132 | static int kvm_handle_unknown_ec(struct kvm_vcpu *vcpu) |
Mark Rutland | ba4dd15 | 2017-02-20 12:30:12 +0000 | [diff] [blame] | 133 | { |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 134 | u32 esr = kvm_vcpu_get_esr(vcpu); |
Mark Rutland | ba4dd15 | 2017-02-20 12:30:12 +0000 | [diff] [blame] | 135 | |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 136 | kvm_pr_unimpl("Unknown exception class: esr: %#08x -- %s\n", |
| 137 | esr, esr_get_class_string(esr)); |
Mark Rutland | ba4dd15 | 2017-02-20 12:30:12 +0000 | [diff] [blame] | 138 | |
| 139 | kvm_inject_undefined(vcpu); |
| 140 | return 1; |
| 141 | } |
| 142 | |
Mark Brown | d658220 | 2021-10-25 17:32:32 +0100 | [diff] [blame] | 143 | /* |
| 144 | * Guest access to SVE registers should be routed to this handler only |
| 145 | * when the system doesn't support SVE. |
| 146 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 147 | static int handle_sve(struct kvm_vcpu *vcpu) |
Dave Martin | aac45ff | 2017-10-31 15:51:17 +0000 | [diff] [blame] | 148 | { |
Dave Martin | aac45ff | 2017-10-31 15:51:17 +0000 | [diff] [blame] | 149 | kvm_inject_undefined(vcpu); |
| 150 | return 1; |
| 151 | } |
| 152 | |
Mark Rutland | 384b40c | 2019-04-23 10:12:35 +0530 | [diff] [blame] | 153 | /* |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 154 | * Guest usage of a ptrauth instruction (which the guest EL1 did not turn into |
Marc Zyngier | 29eb5a3 | 2020-06-04 11:14:00 +0100 | [diff] [blame] | 155 | * a NOP). If we get here, it is that we didn't fixup ptrauth on exit, and all |
| 156 | * that we can do is give the guest an UNDEF. |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 157 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 158 | static int kvm_handle_ptrauth(struct kvm_vcpu *vcpu) |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 159 | { |
Marc Zyngier | 29eb5a3 | 2020-06-04 11:14:00 +0100 | [diff] [blame] | 160 | kvm_inject_undefined(vcpu); |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 161 | return 1; |
| 162 | } |
| 163 | |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 164 | static exit_handle_fn arm_exit_handlers[] = { |
Mark Rutland | ba4dd15 | 2017-02-20 12:30:12 +0000 | [diff] [blame] | 165 | [0 ... ESR_ELx_EC_MAX] = kvm_handle_unknown_ec, |
Mark Rutland | c6d01a9 | 2014-11-24 13:59:30 +0000 | [diff] [blame] | 166 | [ESR_ELx_EC_WFx] = kvm_handle_wfx, |
| 167 | [ESR_ELx_EC_CP15_32] = kvm_handle_cp15_32, |
| 168 | [ESR_ELx_EC_CP15_64] = kvm_handle_cp15_64, |
| 169 | [ESR_ELx_EC_CP14_MR] = kvm_handle_cp14_32, |
| 170 | [ESR_ELx_EC_CP14_LS] = kvm_handle_cp14_load_store, |
| 171 | [ESR_ELx_EC_CP14_64] = kvm_handle_cp14_64, |
| 172 | [ESR_ELx_EC_HVC32] = handle_hvc, |
| 173 | [ESR_ELx_EC_SMC32] = handle_smc, |
| 174 | [ESR_ELx_EC_HVC64] = handle_hvc, |
| 175 | [ESR_ELx_EC_SMC64] = handle_smc, |
| 176 | [ESR_ELx_EC_SYS64] = kvm_handle_sys_reg, |
Dave Martin | aac45ff | 2017-10-31 15:51:17 +0000 | [diff] [blame] | 177 | [ESR_ELx_EC_SVE] = handle_sve, |
Mark Rutland | c6d01a9 | 2014-11-24 13:59:30 +0000 | [diff] [blame] | 178 | [ESR_ELx_EC_IABT_LOW] = kvm_handle_guest_abort, |
| 179 | [ESR_ELx_EC_DABT_LOW] = kvm_handle_guest_abort, |
Alex Bennée | 337b99b | 2015-07-07 17:29:58 +0100 | [diff] [blame] | 180 | [ESR_ELx_EC_SOFTSTP_LOW]= kvm_handle_guest_debug, |
Alex Bennée | 834bf88 | 2015-07-07 17:30:02 +0100 | [diff] [blame] | 181 | [ESR_ELx_EC_WATCHPT_LOW]= kvm_handle_guest_debug, |
| 182 | [ESR_ELx_EC_BREAKPT_LOW]= kvm_handle_guest_debug, |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 183 | [ESR_ELx_EC_BKPT32] = kvm_handle_guest_debug, |
| 184 | [ESR_ELx_EC_BRK64] = kvm_handle_guest_debug, |
Suzuki K Poulose | 82e0191 | 2016-11-08 13:56:21 +0000 | [diff] [blame] | 185 | [ESR_ELx_EC_FP_ASIMD] = handle_no_fpsimd, |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 186 | [ESR_ELx_EC_PAC] = kvm_handle_ptrauth, |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 187 | }; |
| 188 | |
| 189 | static exit_handle_fn kvm_get_exit_handler(struct kvm_vcpu *vcpu) |
| 190 | { |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 191 | u32 esr = kvm_vcpu_get_esr(vcpu); |
| 192 | u8 esr_ec = ESR_ELx_EC(esr); |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 193 | |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 194 | return arm_exit_handlers[esr_ec]; |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 195 | } |
| 196 | |
| 197 | /* |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 198 | * We may be single-stepping an emulated instruction. If the emulation |
| 199 | * has been completed in the kernel, we can return to userspace with a |
| 200 | * KVM_EXIT_DEBUG, otherwise userspace needs to complete its |
| 201 | * emulation first. |
| 202 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 203 | static int handle_trap_exceptions(struct kvm_vcpu *vcpu) |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 204 | { |
| 205 | int handled; |
| 206 | |
| 207 | /* |
| 208 | * See ARM ARM B1.14.1: "Hyp traps on instructions |
| 209 | * that fail their condition code check" |
| 210 | */ |
| 211 | if (!kvm_condition_valid(vcpu)) { |
Marc Zyngier | cdb5e02 | 2020-10-14 09:29:27 +0100 | [diff] [blame] | 212 | kvm_incr_pc(vcpu); |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 213 | handled = 1; |
| 214 | } else { |
| 215 | exit_handle_fn exit_handler; |
| 216 | |
| 217 | exit_handler = kvm_get_exit_handler(vcpu); |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 218 | handled = exit_handler(vcpu); |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 219 | } |
| 220 | |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 221 | return handled; |
| 222 | } |
| 223 | |
| 224 | /* |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 225 | * Return > 0 to return to guest, < 0 on error, 0 (and set exit_reason) on |
| 226 | * proper exit to userspace. |
| 227 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 228 | int handle_exit(struct kvm_vcpu *vcpu, int exception_index) |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 229 | { |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 230 | struct kvm_run *run = vcpu->run; |
| 231 | |
Marc Zyngier | ddb3d07 | 2016-09-06 14:02:06 +0100 | [diff] [blame] | 232 | exception_index = ARM_EXCEPTION_CODE(exception_index); |
| 233 | |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 234 | switch (exception_index) { |
| 235 | case ARM_EXCEPTION_IRQ: |
| 236 | return 1; |
Marc Zyngier | 0215a6e | 2016-09-06 14:02:03 +0100 | [diff] [blame] | 237 | case ARM_EXCEPTION_EL1_SERROR: |
Mark Rutland | bd7d95c | 2018-11-09 15:07:11 +0000 | [diff] [blame] | 238 | return 1; |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 239 | case ARM_EXCEPTION_TRAP: |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 240 | return handle_trap_exceptions(vcpu); |
James Morse | c94b0cf | 2016-04-27 17:47:04 +0100 | [diff] [blame] | 241 | case ARM_EXCEPTION_HYP_GONE: |
| 242 | /* |
| 243 | * EL2 has been reset to the hyp-stub. This happens when a guest |
| 244 | * is pre-empted by kvm_reboot()'s shutdown call. |
| 245 | */ |
| 246 | run->exit_reason = KVM_EXIT_FAIL_ENTRY; |
| 247 | return 0; |
Christoffer Dall | e4e11cc | 2018-10-17 20:21:16 +0200 | [diff] [blame] | 248 | case ARM_EXCEPTION_IL: |
| 249 | /* |
| 250 | * We attempted an illegal exception return. Guest state must |
| 251 | * have been corrupted somehow. Give up. |
| 252 | */ |
| 253 | run->exit_reason = KVM_EXIT_FAIL_ENTRY; |
| 254 | return -EINVAL; |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 255 | default: |
| 256 | kvm_pr_unimpl("Unsupported exception type: %d", |
| 257 | exception_index); |
| 258 | run->exit_reason = KVM_EXIT_INTERNAL_ERROR; |
| 259 | return 0; |
| 260 | } |
| 261 | } |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 262 | |
| 263 | /* For exit types that need handling before we can be preempted */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 264 | void handle_exit_early(struct kvm_vcpu *vcpu, int exception_index) |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 265 | { |
James Morse | 0067df4 | 2018-01-15 19:39:05 +0000 | [diff] [blame] | 266 | if (ARM_SERROR_PENDING(exception_index)) { |
| 267 | if (this_cpu_has_cap(ARM64_HAS_RAS_EXTN)) { |
| 268 | u64 disr = kvm_vcpu_get_disr(vcpu); |
| 269 | |
| 270 | kvm_handle_guest_serror(vcpu, disr_to_esr(disr)); |
| 271 | } else { |
| 272 | kvm_inject_vabt(vcpu); |
| 273 | } |
| 274 | |
| 275 | return; |
| 276 | } |
| 277 | |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 278 | exception_index = ARM_EXCEPTION_CODE(exception_index); |
| 279 | |
| 280 | if (exception_index == ARM_EXCEPTION_EL1_SERROR) |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 281 | kvm_handle_guest_serror(vcpu, kvm_vcpu_get_esr(vcpu)); |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 282 | } |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 283 | |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 284 | void __noreturn __cold nvhe_hyp_panic_handler(u64 esr, u64 spsr, |
| 285 | u64 elr_virt, u64 elr_phys, |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 286 | u64 par, uintptr_t vcpu, |
| 287 | u64 far, u64 hpfar) { |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 288 | u64 elr_in_kimg = __phys_to_kimg(elr_phys); |
| 289 | u64 hyp_offset = elr_in_kimg - kaslr_offset() - elr_virt; |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 290 | u64 mode = spsr & PSR_MODE_MASK; |
| 291 | |
| 292 | /* |
| 293 | * The nVHE hyp symbols are not included by kallsyms to avoid issues |
| 294 | * with aliasing. That means that the symbols cannot be printed with the |
| 295 | * "%pS" format specifier, so fall back to the vmlinux address if |
| 296 | * there's no better option. |
| 297 | */ |
| 298 | if (mode != PSR_MODE_EL2t && mode != PSR_MODE_EL2h) { |
| 299 | kvm_err("Invalid host exception to nVHE hyp!\n"); |
| 300 | } else if (ESR_ELx_EC(esr) == ESR_ELx_EC_BRK64 && |
| 301 | (esr & ESR_ELx_BRK64_ISS_COMMENT_MASK) == BUG_BRK_IMM) { |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 302 | const char *file = NULL; |
| 303 | unsigned int line = 0; |
| 304 | |
| 305 | /* All hyp bugs, including warnings, are treated as fatal. */ |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 306 | if (!is_protected_kvm_enabled() || |
| 307 | IS_ENABLED(CONFIG_NVHE_EL2_DEBUG)) { |
| 308 | struct bug_entry *bug = find_bug(elr_in_kimg); |
| 309 | |
| 310 | if (bug) |
| 311 | bug_get_file_line(bug, &file, &line); |
| 312 | } |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 313 | |
| 314 | if (file) |
| 315 | kvm_err("nVHE hyp BUG at: %s:%u!\n", file, line); |
| 316 | else |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 317 | kvm_err("nVHE hyp BUG at: %016llx!\n", elr_virt + hyp_offset); |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 318 | } else { |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 319 | kvm_err("nVHE hyp panic at: %016llx!\n", elr_virt + hyp_offset); |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 320 | } |
| 321 | |
| 322 | /* |
| 323 | * Hyp has panicked and we're going to handle that by panicking the |
| 324 | * kernel. The kernel offset will be revealed in the panic so we're |
| 325 | * also safe to reveal the hyp offset as a debugging aid for translating |
| 326 | * hyp VAs to vmlinux addresses. |
| 327 | */ |
| 328 | kvm_err("Hyp Offset: 0x%llx\n", hyp_offset); |
| 329 | |
| 330 | panic("HYP panic:\nPS:%08llx PC:%016llx ESR:%08llx\nFAR:%016llx HPFAR:%016llx PAR:%016llx\nVCPU:%016lx\n", |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 331 | spsr, elr_virt, esr, far, hpfar, par, vcpu); |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 332 | } |