Hi Marc, On 19/10/2019 10:55, Marc Zyngier wrote: > When handling erratum 1319367, we must ensure that the page table > walker cannot parse the S1 page tables while the guest is in an > inconsistent state. This is done as follows: > > On guest entry: > - TCR_EL1.EPD{0,1} are set, ensuring that no PTW can occur > - all system registers are restored, except for TCR_EL1 and SCTLR_EL1 > - stage-2 is restored > - SCTLR_EL1 and TCR_EL1 are restored > > On guest exit: > - SCTLR_EL1.M and TCR_EL1.EPD{0,1} are set, ensuring that no PTW can occur > - stage-2 is disabled > - All host system registers are restored Reviewed-by: James Morse <james.morse@xxxxxxx> (whitespace nit below) > diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c > index 69e10b29cbd0..5765b17c38c7 100644 > --- a/arch/arm64/kvm/hyp/switch.c > +++ b/arch/arm64/kvm/hyp/switch.c > @@ -118,6 +118,20 @@ static void __hyp_text __activate_traps_nvhe(struct kvm_vcpu *vcpu) > } > > write_sysreg(val, cptr_el2); > + > + if (cpus_have_const_cap(ARM64_WORKAROUND_1319367)) { > + struct kvm_cpu_context *ctxt = &vcpu->arch.ctxt; > + > + isb(); > + /* > + * At this stage, and thanks to the above isb(), S2 is > + * configured and enabled. We can now restore the guest's S1 > + * configuration: SCTLR, and only then TCR. > + */ (note for my future self: because the guest may have had M=0 and rubbish in the TTBRs) > + write_sysreg_el1(ctxt->sys_regs[SCTLR_EL1], SYS_SCTLR); > + isb(); > + write_sysreg_el1(ctxt->sys_regs[TCR_EL1], SYS_TCR); > + } > } > > diff --git a/arch/arm64/kvm/hyp/sysreg-sr.c b/arch/arm64/kvm/hyp/sysreg-sr.c > index 7ddbc849b580..fb97547bfa79 100644 > --- a/arch/arm64/kvm/hyp/sysreg-sr.c > +++ b/arch/arm64/kvm/hyp/sysreg-sr.c > @@ -117,12 +117,26 @@ static void __hyp_text __sysreg_restore_el1_state(struct kvm_cpu_context *ctxt) > { > write_sysreg(ctxt->sys_regs[MPIDR_EL1], vmpidr_el2); > write_sysreg(ctxt->sys_regs[CSSELR_EL1], csselr_el1); > - write_sysreg_el1(ctxt->sys_regs[SCTLR_EL1], SYS_SCTLR); > + > + if (!cpus_have_const_cap(ARM64_WORKAROUND_1319367)) { > + write_sysreg_el1(ctxt->sys_regs[SCTLR_EL1], SYS_SCTLR); > + write_sysreg_el1(ctxt->sys_regs[TCR_EL1], SYS_TCR); > + } else if (!ctxt->__hyp_running_vcpu) { > + /* > + * Must only be done for guest registers, hence the context > + * test. We'recoming from the host, so SCTLR.M is already (Nit: We'recoming?) > + * set. Pairs with __activate_traps_nvhe(). > + */ > + write_sysreg_el1((ctxt->sys_regs[TCR_EL1] | > + TCR_EPD1_MASK | TCR_EPD0_MASK), > + SYS_TCR); > + isb(); > + } Thanks, James _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm