Thomas Gleixner | caab277 | 2019-06-03 07:44:50 +0200 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 2 | /* |
| 3 | * Copyright (C) 2012,2013 - ARM Ltd |
| 4 | * Author: Marc Zyngier <marc.zyngier@arm.com> |
| 5 | * |
| 6 | * Derived from arch/arm/kvm/handle_exit.c: |
| 7 | * Copyright (C) 2012 - Virtual Open Systems and Columbia University |
| 8 | * Author: Christoffer Dall <c.dall@virtualopensystems.com> |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 9 | */ |
| 10 | |
| 11 | #include <linux/kvm.h> |
| 12 | #include <linux/kvm_host.h> |
Mark Rutland | c6d01a9 | 2014-11-24 13:59:30 +0000 | [diff] [blame] | 13 | |
| 14 | #include <asm/esr.h> |
James Morse | 0067df4 | 2018-01-15 19:39:05 +0000 | [diff] [blame] | 15 | #include <asm/exception.h> |
Marc Zyngier | 9d8415d | 2015-10-25 19:57:11 +0000 | [diff] [blame] | 16 | #include <asm/kvm_asm.h> |
Mark Rutland | c6d01a9 | 2014-11-24 13:59:30 +0000 | [diff] [blame] | 17 | #include <asm/kvm_emulate.h> |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 18 | #include <asm/kvm_mmu.h> |
Alex Bennée | e70dce7 | 2017-11-23 12:11:33 +0000 | [diff] [blame] | 19 | #include <asm/debug-monitors.h> |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 20 | #include <asm/traps.h> |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 21 | |
Christoffer Dall | 55009c6 | 2019-10-21 16:28:15 +0100 | [diff] [blame] | 22 | #include <kvm/arm_hypercalls.h> |
| 23 | |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 24 | #define CREATE_TRACE_POINTS |
Marc Zyngier | 9ed24f4 | 2020-05-13 11:40:34 +0100 | [diff] [blame] | 25 | #include "trace_handle_exit.h" |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 26 | |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 27 | typedef int (*exit_handle_fn)(struct kvm_vcpu *); |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 28 | |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 29 | static void kvm_handle_guest_serror(struct kvm_vcpu *vcpu, u32 esr) |
| 30 | { |
| 31 | if (!arm64_is_ras_serror(esr) || arm64_is_fatal_ras_serror(NULL, esr)) |
| 32 | kvm_inject_vabt(vcpu); |
| 33 | } |
| 34 | |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 35 | static int handle_hvc(struct kvm_vcpu *vcpu) |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 36 | { |
Anup Patel | e8e7fcc | 2014-04-29 11:24:18 +0530 | [diff] [blame] | 37 | int ret; |
Marc Zyngier | dcd2e40 | 2012-12-12 18:52:05 +0000 | [diff] [blame] | 38 | |
Pavel Fedin | f6be563 | 2015-12-04 15:03:14 +0300 | [diff] [blame] | 39 | trace_kvm_hvc_arm64(*vcpu_pc(vcpu), vcpu_get_reg(vcpu, 0), |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 40 | kvm_vcpu_hvc_get_imm(vcpu)); |
Amit Tomar | b19e689 | 2015-11-26 10:09:43 +0000 | [diff] [blame] | 41 | vcpu->stat.hvc_exit_stat++; |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 42 | |
Marc Zyngier | 09e6be1 | 2018-02-06 17:56:12 +0000 | [diff] [blame] | 43 | ret = kvm_hvc_call_handler(vcpu); |
Anup Patel | e8e7fcc | 2014-04-29 11:24:18 +0530 | [diff] [blame] | 44 | if (ret < 0) { |
Marc Zyngier | c0938c7 | 2018-02-06 17:56:05 +0000 | [diff] [blame] | 45 | vcpu_set_reg(vcpu, 0, ~0UL); |
Anup Patel | e8e7fcc | 2014-04-29 11:24:18 +0530 | [diff] [blame] | 46 | return 1; |
| 47 | } |
| 48 | |
| 49 | return ret; |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 50 | } |
| 51 | |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 52 | static int handle_smc(struct kvm_vcpu *vcpu) |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 53 | { |
Marc Zyngier | f5115e8 | 2018-02-06 17:56:07 +0000 | [diff] [blame] | 54 | /* |
| 55 | * "If an SMC instruction executed at Non-secure EL1 is |
| 56 | * trapped to EL2 because HCR_EL2.TSC is 1, the exception is a |
| 57 | * Trap exception, not a Secure Monitor Call exception [...]" |
| 58 | * |
| 59 | * We need to advance the PC after the trap, as it would |
| 60 | * otherwise return to the same address... |
| 61 | */ |
Marc Zyngier | c0938c7 | 2018-02-06 17:56:05 +0000 | [diff] [blame] | 62 | vcpu_set_reg(vcpu, 0, ~0UL); |
Marc Zyngier | cdb5e02 | 2020-10-14 09:29:27 +0100 | [diff] [blame] | 63 | kvm_incr_pc(vcpu); |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 64 | return 1; |
| 65 | } |
| 66 | |
Suzuki K Poulose | 82e0191 | 2016-11-08 13:56:21 +0000 | [diff] [blame] | 67 | /* |
| 68 | * Guest access to FP/ASIMD registers are routed to this handler only |
| 69 | * when the system doesn't support FP/ASIMD. |
| 70 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 71 | static int handle_no_fpsimd(struct kvm_vcpu *vcpu) |
Suzuki K Poulose | 82e0191 | 2016-11-08 13:56:21 +0000 | [diff] [blame] | 72 | { |
| 73 | kvm_inject_undefined(vcpu); |
| 74 | return 1; |
| 75 | } |
| 76 | |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 77 | /** |
Marc Zyngier | d241aac | 2013-08-02 11:41:13 +0100 | [diff] [blame] | 78 | * kvm_handle_wfx - handle a wait-for-interrupts or wait-for-event |
| 79 | * instruction executed by a guest |
| 80 | * |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 81 | * @vcpu: the vcpu pointer |
| 82 | * |
Marc Zyngier | d241aac | 2013-08-02 11:41:13 +0100 | [diff] [blame] | 83 | * WFE: Yield the CPU and come back to this vcpu when the scheduler |
| 84 | * decides to. |
Sean Christopherson | 91b99ea | 2021-10-08 19:12:06 -0700 | [diff] [blame] | 85 | * WFI: Simply call kvm_vcpu_halt(), which will halt execution of |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 86 | * world-switches and schedule other host processes until there is an |
| 87 | * incoming IRQ or FIQ to the VM. |
| 88 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 89 | static int kvm_handle_wfx(struct kvm_vcpu *vcpu) |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 90 | { |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 91 | if (kvm_vcpu_get_esr(vcpu) & ESR_ELx_WFx_ISS_WFE) { |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 92 | trace_kvm_wfx_arm64(*vcpu_pc(vcpu), true); |
Amit Tomar | b19e689 | 2015-11-26 10:09:43 +0000 | [diff] [blame] | 93 | vcpu->stat.wfe_exit_stat++; |
Longpeng(Mike) | f01fbd2 | 2017-08-08 12:05:35 +0800 | [diff] [blame] | 94 | kvm_vcpu_on_spin(vcpu, vcpu_mode_priv(vcpu)); |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 95 | } else { |
| 96 | trace_kvm_wfx_arm64(*vcpu_pc(vcpu), false); |
Amit Tomar | b19e689 | 2015-11-26 10:09:43 +0000 | [diff] [blame] | 97 | vcpu->stat.wfi_exit_stat++; |
Sean Christopherson | 6109c5a | 2021-10-08 19:12:03 -0700 | [diff] [blame] | 98 | kvm_vcpu_wfi(vcpu); |
Wei Huang | 0d97f884 | 2015-01-12 11:53:36 -0500 | [diff] [blame] | 99 | } |
Marc Zyngier | d241aac | 2013-08-02 11:41:13 +0100 | [diff] [blame] | 100 | |
Marc Zyngier | cdb5e02 | 2020-10-14 09:29:27 +0100 | [diff] [blame] | 101 | kvm_incr_pc(vcpu); |
Christoffer Dall | 05e0127 | 2014-08-26 14:33:02 +0200 | [diff] [blame] | 102 | |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 103 | return 1; |
| 104 | } |
| 105 | |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 106 | /** |
| 107 | * kvm_handle_guest_debug - handle a debug exception instruction |
| 108 | * |
| 109 | * @vcpu: the vcpu pointer |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 110 | * |
| 111 | * We route all debug exceptions through the same handler. If both the |
| 112 | * guest and host are using the same debug facilities it will be up to |
| 113 | * userspace to re-inject the correct exception for guest delivery. |
| 114 | * |
Raghavendra Rao Ananta | 8ce8a6f | 2021-08-23 22:39:40 +0000 | [diff] [blame] | 115 | * @return: 0 (while setting vcpu->run->exit_reason) |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 116 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 117 | static int kvm_handle_guest_debug(struct kvm_vcpu *vcpu) |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 118 | { |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 119 | struct kvm_run *run = vcpu->run; |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 120 | u32 esr = kvm_vcpu_get_esr(vcpu); |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 121 | |
| 122 | run->exit_reason = KVM_EXIT_DEBUG; |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 123 | run->debug.arch.hsr = esr; |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 124 | |
Raghavendra Rao Ananta | 8ce8a6f | 2021-08-23 22:39:40 +0000 | [diff] [blame] | 125 | if (ESR_ELx_EC(esr) == ESR_ELx_EC_WATCHPT_LOW) |
Alex Bennée | 834bf88 | 2015-07-07 17:30:02 +0100 | [diff] [blame] | 126 | run->debug.arch.far = vcpu->arch.fault.far_el2; |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 127 | |
Raghavendra Rao Ananta | 8ce8a6f | 2021-08-23 22:39:40 +0000 | [diff] [blame] | 128 | return 0; |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 129 | } |
| 130 | |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 131 | static int kvm_handle_unknown_ec(struct kvm_vcpu *vcpu) |
Mark Rutland | ba4dd15 | 2017-02-20 12:30:12 +0000 | [diff] [blame] | 132 | { |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 133 | u32 esr = kvm_vcpu_get_esr(vcpu); |
Mark Rutland | ba4dd15 | 2017-02-20 12:30:12 +0000 | [diff] [blame] | 134 | |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 135 | kvm_pr_unimpl("Unknown exception class: esr: %#08x -- %s\n", |
| 136 | esr, esr_get_class_string(esr)); |
Mark Rutland | ba4dd15 | 2017-02-20 12:30:12 +0000 | [diff] [blame] | 137 | |
| 138 | kvm_inject_undefined(vcpu); |
| 139 | return 1; |
| 140 | } |
| 141 | |
Mark Brown | d658220 | 2021-10-25 17:32:32 +0100 | [diff] [blame] | 142 | /* |
| 143 | * Guest access to SVE registers should be routed to this handler only |
| 144 | * when the system doesn't support SVE. |
| 145 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 146 | static int handle_sve(struct kvm_vcpu *vcpu) |
Dave Martin | aac45ff | 2017-10-31 15:51:17 +0000 | [diff] [blame] | 147 | { |
Dave Martin | aac45ff | 2017-10-31 15:51:17 +0000 | [diff] [blame] | 148 | kvm_inject_undefined(vcpu); |
| 149 | return 1; |
| 150 | } |
| 151 | |
Mark Rutland | 384b40c | 2019-04-23 10:12:35 +0530 | [diff] [blame] | 152 | /* |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 153 | * Guest usage of a ptrauth instruction (which the guest EL1 did not turn into |
Marc Zyngier | 29eb5a3 | 2020-06-04 11:14:00 +0100 | [diff] [blame] | 154 | * a NOP). If we get here, it is that we didn't fixup ptrauth on exit, and all |
| 155 | * that we can do is give the guest an UNDEF. |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 156 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 157 | static int kvm_handle_ptrauth(struct kvm_vcpu *vcpu) |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 158 | { |
Marc Zyngier | 29eb5a3 | 2020-06-04 11:14:00 +0100 | [diff] [blame] | 159 | kvm_inject_undefined(vcpu); |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 160 | return 1; |
| 161 | } |
| 162 | |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 163 | static exit_handle_fn arm_exit_handlers[] = { |
Mark Rutland | ba4dd15 | 2017-02-20 12:30:12 +0000 | [diff] [blame] | 164 | [0 ... ESR_ELx_EC_MAX] = kvm_handle_unknown_ec, |
Mark Rutland | c6d01a9 | 2014-11-24 13:59:30 +0000 | [diff] [blame] | 165 | [ESR_ELx_EC_WFx] = kvm_handle_wfx, |
| 166 | [ESR_ELx_EC_CP15_32] = kvm_handle_cp15_32, |
| 167 | [ESR_ELx_EC_CP15_64] = kvm_handle_cp15_64, |
| 168 | [ESR_ELx_EC_CP14_MR] = kvm_handle_cp14_32, |
| 169 | [ESR_ELx_EC_CP14_LS] = kvm_handle_cp14_load_store, |
| 170 | [ESR_ELx_EC_CP14_64] = kvm_handle_cp14_64, |
| 171 | [ESR_ELx_EC_HVC32] = handle_hvc, |
| 172 | [ESR_ELx_EC_SMC32] = handle_smc, |
| 173 | [ESR_ELx_EC_HVC64] = handle_hvc, |
| 174 | [ESR_ELx_EC_SMC64] = handle_smc, |
| 175 | [ESR_ELx_EC_SYS64] = kvm_handle_sys_reg, |
Dave Martin | aac45ff | 2017-10-31 15:51:17 +0000 | [diff] [blame] | 176 | [ESR_ELx_EC_SVE] = handle_sve, |
Mark Rutland | c6d01a9 | 2014-11-24 13:59:30 +0000 | [diff] [blame] | 177 | [ESR_ELx_EC_IABT_LOW] = kvm_handle_guest_abort, |
| 178 | [ESR_ELx_EC_DABT_LOW] = kvm_handle_guest_abort, |
Alex Bennée | 337b99b | 2015-07-07 17:29:58 +0100 | [diff] [blame] | 179 | [ESR_ELx_EC_SOFTSTP_LOW]= kvm_handle_guest_debug, |
Alex Bennée | 834bf88 | 2015-07-07 17:30:02 +0100 | [diff] [blame] | 180 | [ESR_ELx_EC_WATCHPT_LOW]= kvm_handle_guest_debug, |
| 181 | [ESR_ELx_EC_BREAKPT_LOW]= kvm_handle_guest_debug, |
Alex Bennée | 4bd611c | 2015-07-07 17:29:57 +0100 | [diff] [blame] | 182 | [ESR_ELx_EC_BKPT32] = kvm_handle_guest_debug, |
| 183 | [ESR_ELx_EC_BRK64] = kvm_handle_guest_debug, |
Suzuki K Poulose | 82e0191 | 2016-11-08 13:56:21 +0000 | [diff] [blame] | 184 | [ESR_ELx_EC_FP_ASIMD] = handle_no_fpsimd, |
Mark Rutland | a1ee8ab | 2018-12-07 18:39:22 +0000 | [diff] [blame] | 185 | [ESR_ELx_EC_PAC] = kvm_handle_ptrauth, |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 186 | }; |
| 187 | |
| 188 | static exit_handle_fn kvm_get_exit_handler(struct kvm_vcpu *vcpu) |
| 189 | { |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 190 | u32 esr = kvm_vcpu_get_esr(vcpu); |
| 191 | u8 esr_ec = ESR_ELx_EC(esr); |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 192 | |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 193 | return arm_exit_handlers[esr_ec]; |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 194 | } |
| 195 | |
| 196 | /* |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 197 | * We may be single-stepping an emulated instruction. If the emulation |
| 198 | * has been completed in the kernel, we can return to userspace with a |
| 199 | * KVM_EXIT_DEBUG, otherwise userspace needs to complete its |
| 200 | * emulation first. |
| 201 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 202 | static int handle_trap_exceptions(struct kvm_vcpu *vcpu) |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 203 | { |
| 204 | int handled; |
| 205 | |
| 206 | /* |
| 207 | * See ARM ARM B1.14.1: "Hyp traps on instructions |
| 208 | * that fail their condition code check" |
| 209 | */ |
| 210 | if (!kvm_condition_valid(vcpu)) { |
Marc Zyngier | cdb5e02 | 2020-10-14 09:29:27 +0100 | [diff] [blame] | 211 | kvm_incr_pc(vcpu); |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 212 | handled = 1; |
| 213 | } else { |
| 214 | exit_handle_fn exit_handler; |
| 215 | |
| 216 | exit_handler = kvm_get_exit_handler(vcpu); |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 217 | handled = exit_handler(vcpu); |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 218 | } |
| 219 | |
Alex Bennée | 7226bc2 | 2017-11-16 15:39:20 +0000 | [diff] [blame] | 220 | return handled; |
| 221 | } |
| 222 | |
| 223 | /* |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 224 | * Return > 0 to return to guest, < 0 on error, 0 (and set exit_reason) on |
| 225 | * proper exit to userspace. |
| 226 | */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 227 | int handle_exit(struct kvm_vcpu *vcpu, int exception_index) |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 228 | { |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 229 | struct kvm_run *run = vcpu->run; |
| 230 | |
James Morse | 1229630 | 2022-01-27 12:20:51 +0000 | [diff] [blame] | 231 | if (ARM_SERROR_PENDING(exception_index)) { |
| 232 | /* |
| 233 | * The SError is handled by handle_exit_early(). If the guest |
| 234 | * survives it will re-execute the original instruction. |
| 235 | */ |
| 236 | return 1; |
| 237 | } |
| 238 | |
Marc Zyngier | ddb3d07 | 2016-09-06 14:02:06 +0100 | [diff] [blame] | 239 | exception_index = ARM_EXCEPTION_CODE(exception_index); |
| 240 | |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 241 | switch (exception_index) { |
| 242 | case ARM_EXCEPTION_IRQ: |
| 243 | return 1; |
Marc Zyngier | 0215a6e | 2016-09-06 14:02:03 +0100 | [diff] [blame] | 244 | case ARM_EXCEPTION_EL1_SERROR: |
Mark Rutland | bd7d95c | 2018-11-09 15:07:11 +0000 | [diff] [blame] | 245 | return 1; |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 246 | case ARM_EXCEPTION_TRAP: |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 247 | return handle_trap_exceptions(vcpu); |
James Morse | c94b0cf | 2016-04-27 17:47:04 +0100 | [diff] [blame] | 248 | case ARM_EXCEPTION_HYP_GONE: |
| 249 | /* |
| 250 | * EL2 has been reset to the hyp-stub. This happens when a guest |
| 251 | * is pre-empted by kvm_reboot()'s shutdown call. |
| 252 | */ |
| 253 | run->exit_reason = KVM_EXIT_FAIL_ENTRY; |
| 254 | return 0; |
Christoffer Dall | e4e11cc | 2018-10-17 20:21:16 +0200 | [diff] [blame] | 255 | case ARM_EXCEPTION_IL: |
| 256 | /* |
| 257 | * We attempted an illegal exception return. Guest state must |
| 258 | * have been corrupted somehow. Give up. |
| 259 | */ |
| 260 | run->exit_reason = KVM_EXIT_FAIL_ENTRY; |
| 261 | return -EINVAL; |
Marc Zyngier | c4b1afd | 2012-12-10 16:40:41 +0000 | [diff] [blame] | 262 | default: |
| 263 | kvm_pr_unimpl("Unsupported exception type: %d", |
| 264 | exception_index); |
| 265 | run->exit_reason = KVM_EXIT_INTERNAL_ERROR; |
| 266 | return 0; |
| 267 | } |
| 268 | } |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 269 | |
| 270 | /* For exit types that need handling before we can be preempted */ |
Tianjia Zhang | 74cc7e0 | 2020-06-23 21:14:15 +0800 | [diff] [blame] | 271 | void handle_exit_early(struct kvm_vcpu *vcpu, int exception_index) |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 272 | { |
James Morse | 0067df4 | 2018-01-15 19:39:05 +0000 | [diff] [blame] | 273 | if (ARM_SERROR_PENDING(exception_index)) { |
| 274 | if (this_cpu_has_cap(ARM64_HAS_RAS_EXTN)) { |
| 275 | u64 disr = kvm_vcpu_get_disr(vcpu); |
| 276 | |
| 277 | kvm_handle_guest_serror(vcpu, disr_to_esr(disr)); |
| 278 | } else { |
| 279 | kvm_inject_vabt(vcpu); |
| 280 | } |
| 281 | |
| 282 | return; |
| 283 | } |
| 284 | |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 285 | exception_index = ARM_EXCEPTION_CODE(exception_index); |
| 286 | |
| 287 | if (exception_index == ARM_EXCEPTION_EL1_SERROR) |
Gavin Shan | 3a949f4 | 2020-06-30 11:57:05 +1000 | [diff] [blame] | 288 | kvm_handle_guest_serror(vcpu, kvm_vcpu_get_esr(vcpu)); |
James Morse | 3368bd8 | 2018-01-15 19:39:04 +0000 | [diff] [blame] | 289 | } |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 290 | |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 291 | void __noreturn __cold nvhe_hyp_panic_handler(u64 esr, u64 spsr, |
| 292 | u64 elr_virt, u64 elr_phys, |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 293 | u64 par, uintptr_t vcpu, |
| 294 | u64 far, u64 hpfar) { |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 295 | u64 elr_in_kimg = __phys_to_kimg(elr_phys); |
| 296 | u64 hyp_offset = elr_in_kimg - kaslr_offset() - elr_virt; |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 297 | u64 mode = spsr & PSR_MODE_MASK; |
| 298 | |
| 299 | /* |
| 300 | * The nVHE hyp symbols are not included by kallsyms to avoid issues |
| 301 | * with aliasing. That means that the symbols cannot be printed with the |
| 302 | * "%pS" format specifier, so fall back to the vmlinux address if |
| 303 | * there's no better option. |
| 304 | */ |
| 305 | if (mode != PSR_MODE_EL2t && mode != PSR_MODE_EL2h) { |
| 306 | kvm_err("Invalid host exception to nVHE hyp!\n"); |
| 307 | } else if (ESR_ELx_EC(esr) == ESR_ELx_EC_BRK64 && |
| 308 | (esr & ESR_ELx_BRK64_ISS_COMMENT_MASK) == BUG_BRK_IMM) { |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 309 | const char *file = NULL; |
| 310 | unsigned int line = 0; |
| 311 | |
| 312 | /* All hyp bugs, including warnings, are treated as fatal. */ |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 313 | if (!is_protected_kvm_enabled() || |
| 314 | IS_ENABLED(CONFIG_NVHE_EL2_DEBUG)) { |
| 315 | struct bug_entry *bug = find_bug(elr_in_kimg); |
| 316 | |
| 317 | if (bug) |
| 318 | bug_get_file_line(bug, &file, &line); |
| 319 | } |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 320 | |
| 321 | if (file) |
| 322 | kvm_err("nVHE hyp BUG at: %s:%u!\n", file, line); |
| 323 | else |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 324 | kvm_err("nVHE hyp BUG at: %016llx!\n", elr_virt + hyp_offset); |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 325 | } else { |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 326 | kvm_err("nVHE hyp panic at: %016llx!\n", elr_virt + hyp_offset); |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 327 | } |
| 328 | |
| 329 | /* |
| 330 | * Hyp has panicked and we're going to handle that by panicking the |
| 331 | * kernel. The kernel offset will be revealed in the panic so we're |
| 332 | * also safe to reveal the hyp offset as a debugging aid for translating |
| 333 | * hyp VAs to vmlinux addresses. |
| 334 | */ |
| 335 | kvm_err("Hyp Offset: 0x%llx\n", hyp_offset); |
| 336 | |
| 337 | panic("HYP panic:\nPS:%08llx PC:%016llx ESR:%08llx\nFAR:%016llx HPFAR:%016llx PAR:%016llx\nVCPU:%016lx\n", |
Will Deacon | ccac969 | 2021-08-13 14:03:36 +0100 | [diff] [blame] | 338 | spsr, elr_virt, esr, far, hpfar, par, vcpu); |
Andrew Scull | aec0fae | 2021-03-18 14:33:11 +0000 | [diff] [blame] | 339 | } |