From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 7755CC433EF for ; Mon, 6 Dec 2021 17:40:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:Cc:To:Subject:Message-ID:Date:From: In-Reply-To:References:MIME-Version:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=WrOWQz5EbuZG94gLPmNEshDU0Nx9qjDBWTtl+/quihI=; b=Y93x7sDNcn9Xw1 SycrZFE2vGOO6TeGoACiISFqxDnf0L+FMLnK4uO27yLskeqO6/D+p+ZBDsBbD8b0NJoew6Rvo9/6g i37j4ncrSkUiSjWcwzlky4Ks63mQKG4fDOvpGYTkxhl/32g/YDnzXo/5tq70GvzxJ0yGg4vYSIy/7 iKWSh6jCXiocX10fCb3afi7AC3G7aNDFnfvZayraRPR6JDNlBZTgCjtomPHRNVIpNIDi9NhZt/djq MMtMPv/hIDqoVmPT7JzipVZ0ar8eIRuCQWYs6Y6e+Y3sStaqwLgzpOBVxx3UDlH5QkkvBZgAUlccF vwTAsRargGmqcjjTZwag==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1muHxS-0056J0-OP; Mon, 06 Dec 2021 17:39:22 +0000 Received: from mail-lf1-x131.google.com ([2a00:1450:4864:20::131]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1muHxP-0056Hu-5N for linux-arm-kernel@lists.infradead.org; Mon, 06 Dec 2021 17:39:20 +0000 Received: by mail-lf1-x131.google.com with SMTP id bi37so27251952lfb.5 for ; Mon, 06 Dec 2021 09:39:18 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=V8ITWY1n7ElqH5jSN7uTqFl2PNx7VzHtpjwf2mxeU8M=; b=jJPpyokIq63kXOSFeG7lUivGCPniPsIubHsaWC0fMcY4BMBcRpAvIcJ2Rn6sw41+2i m4VFflr9mD+M2IFw+W8rk2V/ubDs7NbfsiaGx2B+jMORpvwzMWSF0I2sV8V5GCJv7d3e P5qvQvbWcnd7zmQstHfoXfQOHSGLO/zey1h5PFfnh5kJwCwtVTddMt/ZuEA7XF7KcPg/ t3eRtY1ibrnbRL/sQFa0Hc1muQ8idM96iHwksGXPz10sMfVqJ3dCRe+mt68Zjnw0O3Wj tWW8kGlt8SDRGONRj0TVSmjfzdIrPIrsnZyGxkWGVLtHibsydgE9GF+zW72NrDmMZfLH 4Zhw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=V8ITWY1n7ElqH5jSN7uTqFl2PNx7VzHtpjwf2mxeU8M=; b=sdeGT2af/9Ms7Ea6xdsREzEcCzi5cJACGsWMwnSRBD8566/i0eB/Wkqe3gA117v/tq L/VV4Bi+lNTiwvOtRBjjyr3/5LZZyB2byQLfLbzOjw2IuiayLun4jgWj6Mkf6Dr6UhoE JwftjmtuqUA0ImEZmCIE6m74HaDzlsD92jtoWaUBM88bYhkyocQm3h/eMiF0vimz2fIN mqq464UVsElf1t9rOY4brLB6X+N2hWUS0S9aeZc1SxmBmM4L7Hwuu0WTShG5zLjyhDqo NDJ39Sud55HFhRLUWR8sPfWU8XY9H0d5Sah7fNP+Zygk9h1mQ5dcpmc2U7+xqNrE3a5p qwjg== X-Gm-Message-State: AOAM532Ue7uzo3IG9QhARY261W/rHTFBpMbcUgKI4w7h2bldzf4VJhul uc5Oz/KEns95zL0kMpLz8wwtdA6Edlwe2jEg2IsenA== X-Google-Smtp-Source: ABdhPJwxe4ROo4pJKyCW8GvGf0UwCWi8Cc6Xt9Bo9sWnzPx9YXaV4yhm5kpG3LgnK36VFpltmyhSXL2oN+p0CXGrQYc= X-Received: by 2002:ac2:42c6:: with SMTP id n6mr35910253lfl.553.1638812356891; Mon, 06 Dec 2021 09:39:16 -0800 (PST) MIME-Version: 1.0 References: <20211123210109.1605642-1-oupton@google.com> <20211123210109.1605642-4-oupton@google.com> <87sfvfmb8d.wl-maz@kernel.org> In-Reply-To: <87sfvfmb8d.wl-maz@kernel.org> From: Oliver Upton Date: Mon, 6 Dec 2021 11:39:05 -0600 Message-ID: Subject: Re: [PATCH v3 3/6] KVM: arm64: Allow guest to set the OSLK bit To: Marc Zyngier Cc: kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, James Morse , Alexandru Elisei , Suzuki K Poulose , linux-arm-kernel@lists.infradead.org, Andrew Jones , Peter Shier , Ricardo Koller , Reiji Watanabe X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20211206_093919_229696_020AB34B X-CRM114-Status: GOOD ( 25.48 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Mon, Nov 29, 2021 at 5:51 AM Marc Zyngier wrote: > > On Tue, 23 Nov 2021 21:01:06 +0000, > Oliver Upton wrote: > > > > Allow writes to OSLAR and forward the OSLK bit to OSLSR. Do nothing with > > the value for now. > > > > Reviewed-by: Reiji Watanabe > > Signed-off-by: Oliver Upton > > --- > > arch/arm64/include/asm/sysreg.h | 6 ++++++ > > arch/arm64/kvm/sys_regs.c | 33 ++++++++++++++++++++++++++------- > > 2 files changed, 32 insertions(+), 7 deletions(-) > > > > diff --git a/arch/arm64/include/asm/sysreg.h b/arch/arm64/include/asm/sysreg.h > > index 16b3f1a1d468..9fad61a82047 100644 > > --- a/arch/arm64/include/asm/sysreg.h > > +++ b/arch/arm64/include/asm/sysreg.h > > @@ -129,7 +129,13 @@ > > #define SYS_DBGWCRn_EL1(n) sys_reg(2, 0, 0, n, 7) > > #define SYS_MDRAR_EL1 sys_reg(2, 0, 1, 0, 0) > > #define SYS_OSLAR_EL1 sys_reg(2, 0, 1, 0, 4) > > + > > +#define SYS_OSLAR_OSLK BIT(0) > > + > > #define SYS_OSLSR_EL1 sys_reg(2, 0, 1, 1, 4) > > + > > +#define SYS_OSLSR_OSLK BIT(1) > > + > > #define SYS_OSDLR_EL1 sys_reg(2, 0, 1, 3, 4) > > #define SYS_DBGPRCR_EL1 sys_reg(2, 0, 1, 4, 4) > > #define SYS_DBGCLAIMSET_EL1 sys_reg(2, 0, 7, 8, 6) > > diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c > > index 7bf350b3d9cd..5dbdb45d6d44 100644 > > --- a/arch/arm64/kvm/sys_regs.c > > +++ b/arch/arm64/kvm/sys_regs.c > > @@ -44,6 +44,10 @@ > > * 64bit interface. > > */ > > > > +static int reg_from_user(u64 *val, const void __user *uaddr, u64 id); > > +static int reg_to_user(void __user *uaddr, const u64 *val, u64 id); > > +static u64 sys_reg_to_index(const struct sys_reg_desc *reg); > > + > > static bool read_from_write_only(struct kvm_vcpu *vcpu, > > struct sys_reg_params *params, > > const struct sys_reg_desc *r) > > @@ -287,6 +291,24 @@ static bool trap_loregion(struct kvm_vcpu *vcpu, > > return trap_raz_wi(vcpu, p, r); > > } > > > > +static bool trap_oslar_el1(struct kvm_vcpu *vcpu, > > + struct sys_reg_params *p, > > + const struct sys_reg_desc *r) > > +{ > > + u64 oslsr; > > + > > + if (!p->is_write) > > + return read_from_write_only(vcpu, p, r); > > + > > + /* Forward the OSLK bit to OSLSR */ > > + oslsr = __vcpu_sys_reg(vcpu, OSLSR_EL1) & ~SYS_OSLSR_OSLK; > > + if (p->regval & SYS_OSLAR_OSLK) > > + oslsr |= SYS_OSLSR_OSLK; > > + > > + __vcpu_sys_reg(vcpu, OSLSR_EL1) = oslsr; > > + return true; > > +} > > + > > static bool trap_oslsr_el1(struct kvm_vcpu *vcpu, > > struct sys_reg_params *p, > > const struct sys_reg_desc *r) > > @@ -309,9 +331,10 @@ static int set_oslsr_el1(struct kvm_vcpu *vcpu, const struct sys_reg_desc *rd, > > if (err) > > return err; > > > > - if (val != rd->val) > > + if ((val & ~SYS_OSLSR_OSLK) != rd->val) > > return -EINVAL; > > This looks odd. It means that once I have set the lock from userspace, > I can't clear it? This does read weird, but I believe it makes sense still. rd->val is the value of the register after warm reset, and does not store the current value of the actual register. The true value is stashed in kvm_cpu_context. Really, what I'm asserting here is that the only RW bit is the OSLK bit. If any of the other bits are changed it should return an error. I can either add a comment or make a macro for the expected register value (or both) to make this more clear. -- Thanks, Oliver _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel