cregit-Linux how code gets into the kernel

Release 4.17 arch/arm64/kvm/inject_fault.c

Directory: arch/arm64/kvm
/*
 * Fault injection for both 32 and 64bit guests.
 *
 * Copyright (C) 2012,2013 - ARM Ltd
 * Author: Marc Zyngier <marc.zyngier@arm.com>
 *
 * Based on arch/arm/kvm/emulate.c
 * Copyright (C) 2012 - Virtual Open Systems and Columbia University
 * Author: Christoffer Dall <c.dall@virtualopensystems.com>
 *
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */

#include <linux/kvm_host.h>
#include <asm/kvm_emulate.h>
#include <asm/esr.h>


#define PSTATE_FAULT_BITS_64 	(PSR_MODE_EL1h | PSR_A_BIT | PSR_F_BIT | \
                                 PSR_I_BIT | PSR_D_BIT)


#define CURRENT_EL_SP_EL0_VECTOR	0x0

#define CURRENT_EL_SP_ELx_VECTOR	0x200

#define LOWER_EL_AArch64_VECTOR		0x400

#define LOWER_EL_AArch32_VECTOR		0x600


enum exception_type {
	
except_type_sync	= 0,
	
except_type_irq		= 0x80,
	
except_type_fiq		= 0x100,
	
except_type_serror	= 0x180,
};


static u64 get_except_vector(struct kvm_vcpu *vcpu, enum exception_type type) { u64 exc_offset; switch (*vcpu_cpsr(vcpu) & (PSR_MODE_MASK | PSR_MODE32_BIT)) { case PSR_MODE_EL1t: exc_offset = CURRENT_EL_SP_EL0_VECTOR; break; case PSR_MODE_EL1h: exc_offset = CURRENT_EL_SP_ELx_VECTOR; break; case PSR_MODE_EL0t: exc_offset = LOWER_EL_AArch64_VECTOR; break; default: exc_offset = LOWER_EL_AArch32_VECTOR; } return vcpu_read_sys_reg(vcpu, VBAR_EL1) + exc_offset + type; }

Contributors

PersonTokensPropCommitsCommitProp
Marc Zyngier7498.67%150.00%
Christoffer Dall11.33%150.00%
Total75100.00%2100.00%


static void inject_abt64(struct kvm_vcpu *vcpu, bool is_iabt, unsigned long addr) { unsigned long cpsr = *vcpu_cpsr(vcpu); bool is_aarch32 = vcpu_mode_is_32bit(vcpu); u32 esr = 0; vcpu_write_elr_el1(vcpu, *vcpu_pc(vcpu)); *vcpu_pc(vcpu) = get_except_vector(vcpu, except_type_sync); *vcpu_cpsr(vcpu) = PSTATE_FAULT_BITS_64; vcpu_write_spsr(vcpu, cpsr); vcpu_write_sys_reg(vcpu, addr, FAR_EL1); /* * Build an {i,d}abort, depending on the level and the * instruction set. Report an external synchronous abort. */ if (kvm_vcpu_trap_il_is32bit(vcpu)) esr |= ESR_ELx_IL; /* * Here, the guest runs in AArch64 mode when in EL1. If we get * an AArch32 fault, it means we managed to trap an EL0 fault. */ if (is_aarch32 || (cpsr & PSR_MODE_MASK) == PSR_MODE_EL0t) esr |= (ESR_ELx_EC_IABT_LOW << ESR_ELx_EC_SHIFT); else esr |= (ESR_ELx_EC_IABT_CUR << ESR_ELx_EC_SHIFT); if (!is_iabt) esr |= ESR_ELx_EC_DABT_LOW << ESR_ELx_EC_SHIFT; vcpu_write_sys_reg(vcpu, esr | ESR_ELx_FSC_EXTABT, ESR_EL1); }

Contributors

PersonTokensPropCommitsCommitProp
Marc Zyngier12279.74%225.00%
Christoffer Dall138.50%337.50%
Andrew Jones95.88%112.50%
Mark Rutland74.58%112.50%
Matt Evans21.31%112.50%
Total153100.00%8100.00%


static void inject_undef64(struct kvm_vcpu *vcpu) { unsigned long cpsr = *vcpu_cpsr(vcpu); u32 esr = (ESR_ELx_EC_UNKNOWN << ESR_ELx_EC_SHIFT); vcpu_write_elr_el1(vcpu, *vcpu_pc(vcpu)); *vcpu_pc(vcpu) = get_except_vector(vcpu, except_type_sync); *vcpu_cpsr(vcpu) = PSTATE_FAULT_BITS_64; vcpu_write_spsr(vcpu, cpsr); /* * Build an unknown exception, depending on the instruction * set. */ if (kvm_vcpu_trap_il_is32bit(vcpu)) esr |= ESR_ELx_IL; vcpu_write_sys_reg(vcpu, esr, ESR_EL1); }

Contributors

PersonTokensPropCommitsCommitProp
Marc Zyngier7482.22%228.57%
Christoffer Dall910.00%342.86%
Andrew Jones44.44%114.29%
Mark Rutland33.33%114.29%
Total90100.00%7100.00%

/** * kvm_inject_dabt - inject a data abort into the guest * @vcpu: The VCPU to receive the undefined exception * @addr: The address to report in the DFAR * * It is assumed that this code is called from the VCPU thread and that the * VCPU therefore is not currently executing guest code. */
void kvm_inject_dabt(struct kvm_vcpu *vcpu, unsigned long addr) { if (vcpu_el1_is_32bit(vcpu)) kvm_inject_dabt32(vcpu, addr); else inject_abt64(vcpu, false, addr); }

Contributors

PersonTokensPropCommitsCommitProp
Marc Zyngier3592.11%480.00%
Christoffer Dall37.89%120.00%
Total38100.00%5100.00%

/** * kvm_inject_pabt - inject a prefetch abort into the guest * @vcpu: The VCPU to receive the undefined exception * @addr: The address to report in the DFAR * * It is assumed that this code is called from the VCPU thread and that the * VCPU therefore is not currently executing guest code. */
void kvm_inject_pabt(struct kvm_vcpu *vcpu, unsigned long addr) { if (vcpu_el1_is_32bit(vcpu)) kvm_inject_pabt32(vcpu, addr); else inject_abt64(vcpu, true, addr); }

Contributors

PersonTokensPropCommitsCommitProp
Marc Zyngier3592.11%480.00%
Christoffer Dall37.89%120.00%
Total38100.00%5100.00%

/** * kvm_inject_undefined - inject an undefined instruction into the guest * * It is assumed that this code is called from the VCPU thread and that the * VCPU therefore is not currently executing guest code. */
void kvm_inject_undefined(struct kvm_vcpu *vcpu) { if (vcpu_el1_is_32bit(vcpu)) kvm_inject_undef32(vcpu); else inject_undef64(vcpu); }

Contributors

PersonTokensPropCommitsCommitProp
Marc Zyngier2589.29%480.00%
Christoffer Dall310.71%120.00%
Total28100.00%5100.00%


static void pend_guest_serror(struct kvm_vcpu *vcpu, u64 esr) { vcpu_set_vsesr(vcpu, esr); *vcpu_hcr(vcpu) |= HCR_VSE; }

Contributors

PersonTokensPropCommitsCommitProp
Marc Zyngier1448.28%133.33%
James Morse1241.38%133.33%
Christoffer Dall310.34%133.33%
Total29100.00%3100.00%

/** * kvm_inject_vabt - inject an async abort / SError into the guest * @vcpu: The VCPU to receive the exception * * It is assumed that this code is called from the VCPU thread and that the * VCPU therefore is not currently executing guest code. * * Systems with the RAS Extensions specify an imp-def ESR (ISV/IDS = 1) with * the remaining ISS all-zeros so that this error is not interpreted as an * uncategorized RAS error. Without the RAS Extensions we can't specify an ESR * value, so the CPU generates an imp-def value. */
void kvm_inject_vabt(struct kvm_vcpu *vcpu) { pend_guest_serror(vcpu, ESR_ELx_ISV); }

Contributors

PersonTokensPropCommitsCommitProp
James Morse17100.00%1100.00%
Total17100.00%1100.00%


Overall Contributors

PersonTokensPropCommitsCommitProp
Marc Zyngier43282.76%640.00%
Christoffer Dall356.70%533.33%
James Morse305.75%16.67%
Andrew Jones132.49%16.67%
Mark Rutland101.92%16.67%
Matt Evans20.38%16.67%
Total522100.00%15100.00%
Directory: arch/arm64/kvm
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with cregit.