Hi,

On 12/20/19 3:05 PM, Mark Rutland wrote:
> When KVM injects an exception into a guest, it generates the PSTATE
> value from scratch, configuring PSTATE.{M[4:0],DAIF}, and setting all
> other bits to zero.
>
> This isn't correct, as the architecture specifies that some PSTATE bits
> are (conditionally) cleared or set upon an exception, and others are
> unchanged from the original context.
>
> This patch adds logic to match the architectural behaviour. To make this
> simple to follow/audit/extend, documentation references are provided,
> and bits are configured in order of their layout in SPSR_EL2. This
> layout can be seen in the diagram on ARM DDI 0487E.a page C5-429.
>
> Signed-off-by: Mark Rutland <[email protected]>
> Cc: Alexandru Elisei <[email protected]>
> Cc: Drew Jones <[email protected]>
> Cc: James Morse <[email protected]>
> Cc: Julien Thierry <[email protected]>
> Cc: Marc Zyngier <[email protected]>
> Cc: Peter Maydell <[email protected]>
> Cc: Suzuki K Poulose <[email protected]>
> Cc: Will Deacon <[email protected]>
> Cc: [email protected]
> ---
>  arch/arm64/include/uapi/asm/ptrace.h |  1 +
>  arch/arm64/kvm/inject_fault.c        | 69 
> +++++++++++++++++++++++++++++++++---
>  2 files changed, 65 insertions(+), 5 deletions(-)
>
> diff --git a/arch/arm64/include/uapi/asm/ptrace.h 
> b/arch/arm64/include/uapi/asm/ptrace.h
> index 7ed9294e2004..d1bb5b69f1ce 100644
> --- a/arch/arm64/include/uapi/asm/ptrace.h
> +++ b/arch/arm64/include/uapi/asm/ptrace.h
> @@ -49,6 +49,7 @@
>  #define PSR_SSBS_BIT 0x00001000
>  #define PSR_PAN_BIT  0x00400000
>  #define PSR_UAO_BIT  0x00800000
> +#define PSR_DIT_BIT  0x01000000
>  #define PSR_V_BIT    0x10000000
>  #define PSR_C_BIT    0x20000000
>  #define PSR_Z_BIT    0x40000000
> diff --git a/arch/arm64/kvm/inject_fault.c b/arch/arm64/kvm/inject_fault.c
> index a9d25a305af5..270d91c05246 100644
> --- a/arch/arm64/kvm/inject_fault.c
> +++ b/arch/arm64/kvm/inject_fault.c
> @@ -14,9 +14,6 @@
>  #include <asm/kvm_emulate.h>
>  #include <asm/esr.h>
>  
> -#define PSTATE_FAULT_BITS_64         (PSR_MODE_EL1h | PSR_A_BIT | PSR_F_BIT 
> | \
> -                              PSR_I_BIT | PSR_D_BIT)
> -
>  #define CURRENT_EL_SP_EL0_VECTOR     0x0
>  #define CURRENT_EL_SP_ELx_VECTOR     0x200
>  #define LOWER_EL_AArch64_VECTOR              0x400
> @@ -50,6 +47,68 @@ static u64 get_except_vector(struct kvm_vcpu *vcpu, enum 
> exception_type type)
>       return vcpu_read_sys_reg(vcpu, VBAR_EL1) + exc_offset + type;
>  }
>  
> +/*
> + * When an exception is taken, most PSTATE fields are left unchanged in the
> + * handler. However, some are explicitly overridden (e.g. M[4:0]). Luckily 
> all
> + * of the inherited bits have the same position in the AArch64/AArch32 
> SPSR_ELx
> + * layouts, so we don't need to shuffle these for exceptions from AArch32 
> EL0.
> + *
> + * For the SPSR_ELx layout for AArch64, see ARM DDI 0487E.a page C5-429.
> + * For the SPSR_ELx layout for AArch32, see ARM DDI 0487E.a page C5-426.

The commit message mentions only the SPSR_ELx layout for AArch64.

> + *
> + * Here we manipulate the fields in order of the AArch64 SPSR_ELx layout, 
> from
> + * MSB to LSB.
> + */
> +static unsigned long get_except64_pstate(struct kvm_vcpu *vcpu)
> +{
> +     unsigned long sctlr = vcpu_read_sys_reg(vcpu, SCTLR_EL1);
> +     unsigned long old, new;
> +
> +     old = *vcpu_cpsr(vcpu);
> +     new = 0;
> +
> +     new |= (old & PSR_N_BIT);
> +     new |= (old & PSR_Z_BIT);
> +     new |= (old & PSR_C_BIT);
> +     new |= (old & PSR_V_BIT);
> +
> +     // TODO: TCO (if/when ARMv8.5-MemTag is exposed to guests)
> +
> +     new |= (old & PSR_DIT_BIT);
> +
> +     // PSTATE.UAO is set to zero upon any exception to AArch64
> +     // See ARM DDI 0487E.a, page D5-2579.
> +
> +     // PSTATE.PAN is unchanged unless overridden by SCTLR_ELx.SPAN
> +     // See ARM DDI 0487E.a, page D5-2578.
> +     new |= (old & PSR_PAN_BIT);
> +     if (sctlr & SCTLR_EL1_SPAN)
> +             new |= PSR_PAN_BIT;

On page D13-3264, it is stated that the PAN bit is set unconditionally if
SCTLR_EL1.SPAN is clear, not set.

> +
> +     // PSTATE.SS is set to zero upon any exception to AArch64
> +     // See ARM DDI 0487E.a, page D2-2452.
> +
> +     // PSTATE.IL is set to zero upon any exception to AArch64
> +     // See ARM DDI 0487E.a, page D1-2306.
> +
> +     // PSTATE.SSBS is set to SCTLR_ELx.DSSBS upon any exception to AArch64
> +     // See ARM DDI 0487E.a, page D13-3258
> +     if (sctlr & SCTLR_ELx_DSSBS)
> +             new |= PSR_SSBS_BIT;
> +
> +     // PSTATE.BTYPE is set to zero upon any exception to AArch64
> +     // See ARM DDI 0487E.a, pages D1-2293 to D1-2294.
> +
> +     new |= PSR_D_BIT;
> +     new |= PSR_A_BIT;
> +     new |= PSR_I_BIT;
> +     new |= PSR_F_BIT;
> +
> +     new |= PSR_MODE_EL1h;
> +
> +     return new;
> +}
> +
>  static void inject_abt64(struct kvm_vcpu *vcpu, bool is_iabt, unsigned long 
> addr)
>  {
>       unsigned long cpsr = *vcpu_cpsr(vcpu);
> @@ -59,7 +118,7 @@ static void inject_abt64(struct kvm_vcpu *vcpu, bool 
> is_iabt, unsigned long addr
>       vcpu_write_elr_el1(vcpu, *vcpu_pc(vcpu));
>       *vcpu_pc(vcpu) = get_except_vector(vcpu, except_type_sync);
>  
> -     *vcpu_cpsr(vcpu) = PSTATE_FAULT_BITS_64;
> +     *vcpu_cpsr(vcpu) = get_except64_pstate(vcpu);
>       vcpu_write_spsr(vcpu, cpsr);
>  
>       vcpu_write_sys_reg(vcpu, addr, FAR_EL1);
> @@ -94,7 +153,7 @@ static void inject_undef64(struct kvm_vcpu *vcpu)
>       vcpu_write_elr_el1(vcpu, *vcpu_pc(vcpu));
>       *vcpu_pc(vcpu) = get_except_vector(vcpu, except_type_sync);
>  
> -     *vcpu_cpsr(vcpu) = PSTATE_FAULT_BITS_64;
> +     *vcpu_cpsr(vcpu) = get_except64_pstate(vcpu);
>       vcpu_write_spsr(vcpu, cpsr);
>  
>       /*

I've also checked the ARM ARM pages mentioned in the comments, and the
references are correct. The SPSR_EL2 layouts for exceptions taken from AArch64,
respectively AArch32, states are compatible with the way we create the SPSR_EL2
that will be used for eret'ing to the guest, just like the comment says.

I have a suggestion. I think that in ARM ARM, shuffling things between sections
happens a lot less often than adding/removing things from one particular
section, so the pages referenced are more likely to change in later versions.
How about referencing the section instead of the exact page? Something like:
"This layout can be seen in the diagram on ARM DDI 0487E.a, section C5.2.18,
when an exception is taken from AArch64 state"?

Thanks,
Alex
_______________________________________________
kvmarm mailing list
[email protected]
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm

Reply via email to