[PATCH v6 3/7] KVM: arm64: Handle DABT caused by LS64* instructions on unsupported memory

Zhou Wang wangzhou1 at hisilicon.com
Sat Oct 25 03:11:37 PDT 2025


On 2025/10/25 3:54, Oliver Upton wrote:
> Hi Zhou,
> 
> On Fri, Oct 24, 2025 at 05:08:15PM +0800, Zhou Wang wrote:
>> +/**
>> + * kvm_inject_dabt_excl_atomic - inject a data abort for unsupported exclusive
>> + *				 or atomic access
>> + * @vcpu: The VCPU to receive the data abort
>> + * @addr: The address to report in the DFAR
>> + *
>> + * It is assumed that this code is called from the VCPU thread and that the
>> + * VCPU therefore is not currently executing guest code.
>> + */
>> +void kvm_inject_dabt_excl_atomic(struct kvm_vcpu *vcpu, u64 addr)
>> +{
>> +	u64 esr;
>> +
>> +	/* Reuse the general DABT injection routine and modify the DFSC */
>> +	kvm_inject_sea(vcpu, false, addr);
> 
> This potentially injects a nested SEA which I'm not sure you want. There
> still is an interaction with nested, from DDI0487L.a B2.2.6:
> 
>   For the EL1&0 translation regime, if the atomic instruction is not
>   supported because of the memory type that is defined in the first
>   stage of translation, or the second stage of translation is not
>   enabled, then this exception is a first stage abort and is taken to
>   EL1. Otherwise, the exception is a second stage abort and is taken to EL2.
> 
> We don't need to worry about the S1 memory type since hardware will
> handle that for us. But we do need to consider whether the guest
> hypervisor enabled stage-2 translation or not and route accordingly.
> 
> int kvm_inject_nested_excl_atomic(struct kvm_vcpu *vcpu, u64 addr)
> {
> 	u64 esr = FIELD_PREP(ESR_ELx_EC_MASK, ESR_ELx_EC_DABT_LOW) |
> 		  FIELD_PREP(ESR_ELx_FSC, ESR_ELx_FSC_EXCL_ATOMIC) |
> 		  ESR_ELx_IL;
> 
> 	vcpu_write_sys_reg(vcpu, addr, FAR_EL2);
> 	return kvm_inject_nested_sync(vcpu, esr);
> }
> 
> int kvm_inject_excl_atomic(struct kvm_vcpu *vcpu, u64 addr)
> {
> 	if (is_nested_ctxt(vcpu) && (vcpu_read_sys_reg(vcpu, HCR_EL2) & HCR_VM))
> 		return kvm_inject_nested_excl_atomic(vcpu, addr);
> 
> 	__kvm_inject_sea(vcpu, false, addr);
> 	esr = vcpu_read_sys_reg(vcpu, exception_esr_elx(vcpu));
> 	esr &= ~ESR_ELx_FSC;
> 	esr |= ESR_ELx_FSC_EXCL_ATOMIC;
> 	vcpu_write_sys_reg(vcpu, esr, exception_esr_elx(vcpu));
> 	return 1;
> }

Hi Oliver,

Thanks for pointing this, will modify exception injection with
above code.

Best,
Zhou

> 
> Thanks,
> Oliver
> .



More information about the linux-arm-kernel mailing list