From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 03588CF886F for ; Sat, 5 Oct 2024 12:37:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Type:MIME-Version: References:In-Reply-To:Subject:Cc:To:From:Message-ID:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=zy7c6sUyLwMHBkwGLY7VA65SK0yF58JSQw0QOoEf0Hw=; b=Wd4sCrDA6WacU+DoPtkXmEjsLW tusvmA5XWXz4x2hOqtlRUcEU6ng+bPrEdqJ/JkOXQuseqris0mCx9T1k7MCPhjmjf+5rpYx3gyY4f 82fOqMDdbtBGSzg14VVeCMN6dRphmMKcn1Hvgvu0qmJM5YVHDlJy9m4jmROW+uVcVR0JuNehCK+AV 1M3gl2wJ55byOPqnhxpr3DhEekSpe9QupMczjUaP2j5HEX7i+qVVgO5N/Q1FkXJBmR+18N3+Xx+kV OqeALSLzO5npaIHTdmr56asSHBu9ABHWk+JxRTqUzbIjnxQVxNMQcQ7g9A7CDo4I/bqRiifkp7sYY t8CnLKaw==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98 #2 (Red Hat Linux)) id 1sx42O-0000000FLKs-3sTk; Sat, 05 Oct 2024 12:37:33 +0000 Received: from dfw.source.kernel.org ([2604:1380:4641:c500::1]) by bombadil.infradead.org with esmtps (Exim 4.98 #2 (Red Hat Linux)) id 1sx417-0000000FLF4-49Kz for linux-arm-kernel@lists.infradead.org; Sat, 05 Oct 2024 12:36:15 +0000 Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id 9F2A85C008A; Sat, 5 Oct 2024 12:36:08 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2D9FAC4CEC2; Sat, 5 Oct 2024 12:36:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1728131772; bh=anOh4F7gNSzxko+OyM2NPOf1gcoYvFAGA4IXXYgPM9I=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=ksZ99L7558xn1xd5cBUQFIK78d80OfgwZn+FQ9j0/XgNJqScS72Va7VGSAzZ0pJRB /RI6dBgMx9lQqdItsJph2P5tj+Y21mwu+IZZ4uG0clSeI6EzIGSCt/Dv4A+/hH4mnH pDvUe70RrhWE8Fns1GyXQE8cuC0a2nlKhod7vJeC7ZVpK7p1n+po5RIVch2RqbVQJW 6QaAv8Dfl1QwTCcTkRCvhFPlKlDT+17/NDTu62O8/VmpDufTSVrNzBJPc0eo3b1per qemu9ky9ul5sXHul+VdFWA7h1sHo7Kj+Kn1myE1JyBpNjN22gBLQop9B0ps937NVwv fgYC1CI3th14Q== Received: from sofa.misterjones.org ([185.219.108.64] helo=wait-a-minute.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1sx414-000bEl-8D; Sat, 05 Oct 2024 13:36:10 +0100 Date: Sat, 05 Oct 2024 13:36:09 +0100 Message-ID: <87h69qvi9y.wl-maz@kernel.org> From: Marc Zyngier To: Mark Brown Cc: Catalin Marinas , Will Deacon , Oliver Upton , Joey Gouly , Suzuki K Poulose , Shuah Khan , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, kvmarm@lists.linux.dev, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v14 4/5] KVM: arm64: Set PSTATE.EXLOCK when entering an exception In-Reply-To: <20241005-arm64-gcs-v14-4-59060cd6092b@kernel.org> References: <20241005-arm64-gcs-v14-0-59060cd6092b@kernel.org> <20241005-arm64-gcs-v14-4-59060cd6092b@kernel.org> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/29.4 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: broonie@kernel.org, catalin.marinas@arm.com, will@kernel.org, oliver.upton@linux.dev, joey.gouly@arm.com, suzuki.poulose@arm.com, shuah@kernel.org, linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, kvmarm@lists.linux.dev, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20241005_053614_145006_B215434F X-CRM114-Status: GOOD ( 22.80 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Sat, 05 Oct 2024 11:37:31 +0100, Mark Brown wrote: > > As per DDI 0487 RWTXBY we need to manage PSTATE.EXLOCK when entering an > exception, when the exception is entered from a lower EL the bit is cleared > while if entering from the same EL it is set to GCSCR_ELx.EXLOCKEN. > Implement this behaviour in enter_exception64(). > > Signed-off-by: Mark Brown > --- > arch/arm64/include/uapi/asm/ptrace.h | 2 ++ > arch/arm64/kvm/hyp/exception.c | 10 ++++++++++ > 2 files changed, 12 insertions(+) > > diff --git a/arch/arm64/include/uapi/asm/ptrace.h b/arch/arm64/include/uapi/asm/ptrace.h > index 0f39ba4f3efd4a8760f0fca0fbf1a2563b191c7d..9987957f4f7137bf107653b817885bb976853a83 100644 > --- a/arch/arm64/include/uapi/asm/ptrace.h > +++ b/arch/arm64/include/uapi/asm/ptrace.h > @@ -37,6 +37,7 @@ > #define PSR_MODE_EL3t 0x0000000c > #define PSR_MODE_EL3h 0x0000000d > #define PSR_MODE_MASK 0x0000000f > +#define PSR_EL_MASK 0x0000000c > > /* AArch32 CPSR bits */ > #define PSR_MODE32_BIT 0x00000010 > @@ -56,6 +57,7 @@ > #define PSR_C_BIT 0x20000000 > #define PSR_Z_BIT 0x40000000 > #define PSR_N_BIT 0x80000000 > +#define PSR_EXLOCK_BIT 0x400000000 > > #define PSR_BTYPE_SHIFT 10 > > diff --git a/arch/arm64/kvm/hyp/exception.c b/arch/arm64/kvm/hyp/exception.c > index 424a5107cddb5e1cdd75ef3581adef03aaadabb7..0d41b9b75cf83250b2c0d20cd82c153869efb0e4 100644 > --- a/arch/arm64/kvm/hyp/exception.c > +++ b/arch/arm64/kvm/hyp/exception.c > @@ -160,6 +160,16 @@ static void enter_exception64(struct kvm_vcpu *vcpu, unsigned long target_mode, > // PSTATE.BTYPE is set to zero upon any exception to AArch64 > // See ARM DDI 0487E.a, pages D1-2293 to D1-2294. > > + // PSTATE.EXLOCK is set to 0 upon any exception to a higher > + // EL, or to GCSCR_ELx.EXLOCKEN for an exception to the same > + // exception level. See ARM DDI 0487 RWTXBY, D.1.3.2 in K.a. > + if (kvm_has_gcs(vcpu->kvm) && > + (target_mode & PSR_EL_MASK) == (mode & PSR_EL_MASK)) { > + u64 gcscr = __vcpu_read_sys_reg(vcpu, GCSCR_EL1); No, please. This only works by luck when a guest has AArch32 EL0, and creates more havoc on a NV guest. In general, this PSR_EL_MASK creates more problem than anything else, and doesn't fit the rest of the code. So this needs to: - explicitly only apply to exceptions from AArch64 - handle exception from EL2, since this helper already deals with that The latter point of course means introducing GCSCR_EL2 (and everything that depends on it, such as the trap handling). M. -- Without deviation from the norm, progress is not possible.