We do not have to change the c15 trap setting on each switch to/from the guest on VHE systems, because this setting only affects EL0. The PMU and debug trap configuration can also be done on vcpu load/put instead, because they don't affect how the host kernel can access the debug registers while executing KVM kernel code and KVM doesn't use floating point itself. Signed-off-by: Christoffer Dall <christoffer.dall@xxxxxxxxxx> --- arch/arm64/kvm/hyp/switch.c | 37 +++++++++++++++++++++++++++---------- 1 file changed, 27 insertions(+), 10 deletions(-) diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c index d14ab9650f81..6ff9fab4233e 100644 --- a/arch/arm64/kvm/hyp/switch.c +++ b/arch/arm64/kvm/hyp/switch.c @@ -43,8 +43,6 @@ static void __hyp_text __activate_traps_fpsimd32(struct kvm_vcpu *vcpu) static void __hyp_text __activate_traps_common(struct kvm_vcpu *vcpu) { - write_sysreg(vcpu->arch.hcr_el2, hcr_el2); - /* Trap on AArch32 cp15 c15 (impdef sysregs) accesses (EL1 or EL0) */ write_sysreg(1 << 15, hstr_el2); /* @@ -64,12 +62,15 @@ static void __hyp_text __deactivate_traps_common(void) write_sysreg(0, pmuserenr_el0); } +/* Activate the traps we can during vcpu_load with VHE */ void activate_traps_vhe_load(struct kvm_vcpu *vcpu) { u64 val; + /* Make sure 32-bit guests trap VFP */ __activate_traps_fpsimd32(vcpu); + /* Trap VFP accesses on a VHE system */ val = read_sysreg(cpacr_el1); val |= CPACR_EL1_TTA; val &= ~CPACR_EL1_ZEN; @@ -78,11 +79,28 @@ void activate_traps_vhe_load(struct kvm_vcpu *vcpu) else val &= ~CPACR_EL1_FPEN; write_sysreg(val, cpacr_el1); + + /* Activate traps on impdef sysregs, PMU, and debug */ + __activate_traps_common(vcpu); } +/* Deactivate the traps we can during vcpu_put with VHE */ void deactivate_traps_vhe_put(void) { + u64 mdcr_el2; + + /* Re-enable host VFP and SVE access */ write_sysreg(CPACR_EL1_DEFAULT, cpacr_el1); + + /* Re-enable host access to impdef sysregs and the PMU */ + __deactivate_traps_common(); + + /* Re-enable host access to the debug regs */ + mdcr_el2 = read_sysreg(mdcr_el2); + mdcr_el2 &= MDCR_EL2_HPMN_MASK | + MDCR_EL2_E2PB_MASK << MDCR_EL2_E2PB_SHIFT | + MDCR_EL2_TPMS; + write_sysreg(mdcr_el2, mdcr_el2); } static void __hyp_text __activate_traps_vhe(struct kvm_vcpu *vcpu) @@ -96,8 +114,10 @@ void __hyp_text __activate_traps_nvhe_load(struct kvm_vcpu *vcpu) vcpu = kern_hyp_va(vcpu); + /* Make sure 32-bit guests trap VFP */ __activate_traps_fpsimd32(vcpu); + /* Trap VFP accesses on a non-VHE system */ val = CPTR_EL2_DEFAULT; val |= CPTR_EL2_TTA | CPTR_EL2_TZ; if (vcpu->arch.guest_vfp_loaded) @@ -114,6 +134,8 @@ void __hyp_text __deactivate_traps_nvhe_put(void) static void __hyp_text __activate_traps_nvhe(struct kvm_vcpu *vcpu) { + /* Activate traps on impdef sysregs, PMU, and debug */ + __activate_traps_common(vcpu); } static hyp_alternate_select(__activate_traps_arch, @@ -122,20 +144,14 @@ static hyp_alternate_select(__activate_traps_arch, static void __hyp_text __activate_traps(struct kvm_vcpu *vcpu) { - __activate_traps_common(vcpu); __activate_traps_arch()(vcpu); + write_sysreg(vcpu->arch.hcr_el2, hcr_el2); } static void __hyp_text __deactivate_traps_vhe(void) { extern char vectors[]; /* kernel exception vectors */ - u64 mdcr_el2 = read_sysreg(mdcr_el2); - - mdcr_el2 &= MDCR_EL2_HPMN_MASK | - MDCR_EL2_E2PB_MASK << MDCR_EL2_E2PB_SHIFT | - MDCR_EL2_TPMS; - write_sysreg(mdcr_el2, mdcr_el2); write_sysreg(HCR_HOST_VHE_FLAGS, hcr_el2); write_sysreg(vectors, vbar_el1); } @@ -143,6 +159,8 @@ static void __hyp_text __deactivate_traps_vhe(void) static void __hyp_text __deactivate_traps_nvhe(void) { u64 mdcr_el2 = read_sysreg(mdcr_el2); + __deactivate_traps_common(); + mdcr_el2 &= MDCR_EL2_HPMN_MASK; mdcr_el2 |= MDCR_EL2_E2PB_MASK << MDCR_EL2_E2PB_SHIFT; @@ -165,7 +183,6 @@ static void __hyp_text __deactivate_traps(struct kvm_vcpu *vcpu) if (vcpu->arch.hcr_el2 & HCR_VSE) vcpu->arch.hcr_el2 = read_sysreg(hcr_el2); - __deactivate_traps_common(); __deactivate_traps_arch()(); } -- 2.14.2 _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm