~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/arch/arm64/kvm/hyp/entry.S

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /* SPDX-License-Identifier: GPL-2.0-only */
  2 /*
  3  * Copyright (C) 2015 - ARM Ltd
  4  * Author: Marc Zyngier <marc.zyngier@arm.com>
  5  */
  6 
  7 #include <linux/linkage.h>
  8 
  9 #include <asm/alternative.h>
 10 #include <asm/assembler.h>
 11 #include <asm/fpsimdmacros.h>
 12 #include <asm/kvm.h>
 13 #include <asm/kvm_arm.h>
 14 #include <asm/kvm_asm.h>
 15 #include <asm/kvm_mmu.h>
 16 #include <asm/kvm_mte.h>
 17 #include <asm/kvm_ptrauth.h>
 18 
 19         .text
 20 
 21 /*
 22  * u64 __guest_enter(struct kvm_vcpu *vcpu);
 23  */
 24 SYM_FUNC_START(__guest_enter)
 25         // x0: vcpu
 26         // x1-x17: clobbered by macros
 27         // x29: guest context
 28 
 29         adr_this_cpu x1, kvm_hyp_ctxt, x2
 30 
 31         // Store the hyp regs
 32         save_callee_saved_regs x1
 33 
 34         // Save hyp's sp_el0
 35         save_sp_el0     x1, x2
 36 
 37         // Now the hyp state is stored if we have a pending RAS SError it must
 38         // affect the host or hyp. If any asynchronous exception is pending we
 39         // defer the guest entry. The DSB isn't necessary before v8.2 as any
 40         // SError would be fatal.
 41 alternative_if ARM64_HAS_RAS_EXTN
 42         dsb     nshst
 43         isb
 44 alternative_else_nop_endif
 45         mrs     x1, isr_el1
 46         cbz     x1,  1f
 47         mov     x0, #ARM_EXCEPTION_IRQ
 48         ret
 49 
 50 1:
 51         set_loaded_vcpu x0, x1, x2
 52 
 53         add     x29, x0, #VCPU_CONTEXT
 54 
 55         // mte_switch_to_guest(g_ctxt, h_ctxt, tmp1)
 56         mte_switch_to_guest x29, x1, x2
 57 
 58         // Macro ptrauth_switch_to_guest format:
 59         //      ptrauth_switch_to_guest(guest cxt, tmp1, tmp2, tmp3)
 60         // The below macro to restore guest keys is not implemented in C code
 61         // as it may cause Pointer Authentication key signing mismatch errors
 62         // when this feature is enabled for kernel code.
 63         ptrauth_switch_to_guest x29, x0, x1, x2
 64 
 65         // Restore the guest's sp_el0
 66         restore_sp_el0 x29, x0
 67 
 68         // Restore guest regs x0-x17
 69         ldp     x0, x1,   [x29, #CPU_XREG_OFFSET(0)]
 70         ldp     x2, x3,   [x29, #CPU_XREG_OFFSET(2)]
 71         ldp     x4, x5,   [x29, #CPU_XREG_OFFSET(4)]
 72         ldp     x6, x7,   [x29, #CPU_XREG_OFFSET(6)]
 73         ldp     x8, x9,   [x29, #CPU_XREG_OFFSET(8)]
 74         ldp     x10, x11, [x29, #CPU_XREG_OFFSET(10)]
 75         ldp     x12, x13, [x29, #CPU_XREG_OFFSET(12)]
 76         ldp     x14, x15, [x29, #CPU_XREG_OFFSET(14)]
 77         ldp     x16, x17, [x29, #CPU_XREG_OFFSET(16)]
 78 
 79         // Restore guest regs x18-x29, lr
 80         restore_callee_saved_regs x29
 81 
 82         // Do not touch any register after this!
 83         eret
 84         sb
 85 
 86 SYM_INNER_LABEL(__guest_exit_restore_elr_and_panic, SYM_L_GLOBAL)
 87         // x2-x29,lr: vcpu regs
 88         // vcpu x0-x1 on the stack
 89 
 90         adr_this_cpu x0, kvm_hyp_ctxt, x1
 91         ldr     x0, [x0, #CPU_ELR_EL2]
 92         msr     elr_el2, x0
 93 
 94 SYM_INNER_LABEL(__guest_exit_panic, SYM_L_GLOBAL)
 95         // x2-x29,lr: vcpu regs
 96         // vcpu x0-x1 on the stack
 97 
 98         // If the hyp context is loaded, go straight to hyp_panic
 99         get_loaded_vcpu x0, x1
100         cbnz    x0, 1f
101         b       hyp_panic
102 
103 1:
104         // The hyp context is saved so make sure it is restored to allow
105         // hyp_panic to run at hyp and, subsequently, panic to run in the host.
106         // This makes use of __guest_exit to avoid duplication but sets the
107         // return address to tail call into hyp_panic. As a side effect, the
108         // current state is saved to the guest context but it will only be
109         // accurate if the guest had been completely restored.
110         adr_this_cpu x0, kvm_hyp_ctxt, x1
111         adr_l   x1, hyp_panic
112         str     x1, [x0, #CPU_XREG_OFFSET(30)]
113 
114         get_vcpu_ptr    x1, x0
115 
116 SYM_INNER_LABEL(__guest_exit, SYM_L_GLOBAL)
117         // x0: return code
118         // x1: vcpu
119         // x2-x29,lr: vcpu regs
120         // vcpu x0-x1 on the stack
121 
122         add     x1, x1, #VCPU_CONTEXT
123 
124         ALTERNATIVE(nop, SET_PSTATE_PAN(1), ARM64_HAS_PAN, CONFIG_ARM64_PAN)
125 
126         // Store the guest regs x2 and x3
127         stp     x2, x3,   [x1, #CPU_XREG_OFFSET(2)]
128 
129         // Retrieve the guest regs x0-x1 from the stack
130         ldp     x2, x3, [sp], #16       // x0, x1
131 
132         // Store the guest regs x0-x1 and x4-x17
133         stp     x2, x3,   [x1, #CPU_XREG_OFFSET(0)]
134         stp     x4, x5,   [x1, #CPU_XREG_OFFSET(4)]
135         stp     x6, x7,   [x1, #CPU_XREG_OFFSET(6)]
136         stp     x8, x9,   [x1, #CPU_XREG_OFFSET(8)]
137         stp     x10, x11, [x1, #CPU_XREG_OFFSET(10)]
138         stp     x12, x13, [x1, #CPU_XREG_OFFSET(12)]
139         stp     x14, x15, [x1, #CPU_XREG_OFFSET(14)]
140         stp     x16, x17, [x1, #CPU_XREG_OFFSET(16)]
141 
142         // Store the guest regs x18-x29, lr
143         save_callee_saved_regs x1
144 
145         // Store the guest's sp_el0
146         save_sp_el0     x1, x2
147 
148         adr_this_cpu x2, kvm_hyp_ctxt, x3
149 
150         // Macro ptrauth_switch_to_hyp format:
151         //      ptrauth_switch_to_hyp(guest cxt, host cxt, tmp1, tmp2, tmp3)
152         // The below macro to save/restore keys is not implemented in C code
153         // as it may cause Pointer Authentication key signing mismatch errors
154         // when this feature is enabled for kernel code.
155         ptrauth_switch_to_hyp x1, x2, x3, x4, x5
156 
157         // mte_switch_to_hyp(g_ctxt, h_ctxt, reg1)
158         mte_switch_to_hyp x1, x2, x3
159 
160         // Restore hyp's sp_el0
161         restore_sp_el0 x2, x3
162 
163         // Now restore the hyp regs
164         restore_callee_saved_regs x2
165 
166         set_loaded_vcpu xzr, x2, x3
167 
168 alternative_if ARM64_HAS_RAS_EXTN
169         // If we have the RAS extensions we can consume a pending error
170         // without an unmask-SError and isb. The ESB-instruction consumed any
171         // pending guest error when we took the exception from the guest.
172         mrs_s   x2, SYS_DISR_EL1
173         str     x2, [x1, #(VCPU_FAULT_DISR - VCPU_CONTEXT)]
174         cbz     x2, 1f
175         msr_s   SYS_DISR_EL1, xzr
176         orr     x0, x0, #(1<<ARM_EXIT_WITH_SERROR_BIT)
177 1:      ret
178 alternative_else
179         dsb     sy              // Synchronize against in-flight ld/st
180         isb                     // Prevent an early read of side-effect free ISR
181         mrs     x2, isr_el1
182         tbnz    x2, #ISR_EL1_A_SHIFT, 2f
183         ret
184         nop
185 2:
186 alternative_endif
187         // We know we have a pending asynchronous abort, now is the
188         // time to flush it out. From your VAXorcist book, page 666:
189         // "Threaten me not, oh Evil one!  For I speak with
190         // the power of DEC, and I command thee to show thyself!"
191         mrs     x2, elr_el2
192         mrs     x3, esr_el2
193         mrs     x4, spsr_el2
194         mov     x5, x0
195 
196         msr     daifclr, #4     // Unmask aborts
197 
198         // This is our single instruction exception window. A pending
199         // SError is guaranteed to occur at the earliest when we unmask
200         // it, and at the latest just after the ISB.
201 abort_guest_exit_start:
202 
203         isb
204 
205 abort_guest_exit_end:
206 
207         msr     daifset, #4     // Mask aborts
208         ret
209 
210         _kvm_extable    abort_guest_exit_start, 9997f
211         _kvm_extable    abort_guest_exit_end, 9997f
212 9997:
213         msr     daifset, #4     // Mask aborts
214         mov     x0, #(1 << ARM_EXIT_WITH_SERROR_BIT)
215 
216         // restore the EL1 exception context so that we can report some
217         // information. Merge the exception code with the SError pending bit.
218         msr     elr_el2, x2
219         msr     esr_el2, x3
220         msr     spsr_el2, x4
221         orr     x0, x0, x5
222 1:      ret
223 SYM_FUNC_END(__guest_enter)

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php