Commit 9a3bfb27 authored by Marc Zyngier's avatar Marc Zyngier Committed by Oliver Upton

KVM: arm64: Fix TRFCR_EL1/PMSCR_EL1 access in hVHE mode

When running in hVHE mode, EL1 accesses are performed with the EL12
accessor, as we run with HCR_EL2.E2H=1.

Unfortunately, both PMSCR_EL1 and TRFCR_EL1 are used with the
EL1 accessor, meaning that we actually affect the EL2 state. Duh.

Switch to using the {read,write}_sysreg_el1() helpers that will do
the right thing in all circumstances.

Note that the 'Fixes:' tag doesn't represent the point where the bug
was introduced (there is no such point), but the first practical point
where the hVHE feature is usable.

Cc: James Clark <james.clark@arm.com>
Cc: Anshuman Khandual <anshuman.khandual@arm.com>
Fixes: 38cba550 ("KVM: arm64: Force HCR_E2H in guest context when ARM64_KVM_HVHE is set")
Signed-off-by: default avatarMarc Zyngier <maz@kernel.org>
Reviewed-by: default avatarOliver Upton <oliver.upton@linux.dev>
Link: https://lore.kernel.org/r/20240229145417.3606279-1-maz@kernel.orgSigned-off-by: default avatarOliver Upton <oliver.upton@linux.dev>
parent 43b3bedb
...@@ -31,8 +31,8 @@ static void __debug_save_spe(u64 *pmscr_el1) ...@@ -31,8 +31,8 @@ static void __debug_save_spe(u64 *pmscr_el1)
return; return;
/* Yes; save the control register and disable data generation */ /* Yes; save the control register and disable data generation */
*pmscr_el1 = read_sysreg_s(SYS_PMSCR_EL1); *pmscr_el1 = read_sysreg_el1(SYS_PMSCR);
write_sysreg_s(0, SYS_PMSCR_EL1); write_sysreg_el1(0, SYS_PMSCR);
isb(); isb();
/* Now drain all buffered data to memory */ /* Now drain all buffered data to memory */
...@@ -48,7 +48,7 @@ static void __debug_restore_spe(u64 pmscr_el1) ...@@ -48,7 +48,7 @@ static void __debug_restore_spe(u64 pmscr_el1)
isb(); isb();
/* Re-enable data generation */ /* Re-enable data generation */
write_sysreg_s(pmscr_el1, SYS_PMSCR_EL1); write_sysreg_el1(pmscr_el1, SYS_PMSCR);
} }
static void __debug_save_trace(u64 *trfcr_el1) static void __debug_save_trace(u64 *trfcr_el1)
...@@ -63,8 +63,8 @@ static void __debug_save_trace(u64 *trfcr_el1) ...@@ -63,8 +63,8 @@ static void __debug_save_trace(u64 *trfcr_el1)
* Since access to TRFCR_EL1 is trapped, the guest can't * Since access to TRFCR_EL1 is trapped, the guest can't
* modify the filtering set by the host. * modify the filtering set by the host.
*/ */
*trfcr_el1 = read_sysreg_s(SYS_TRFCR_EL1); *trfcr_el1 = read_sysreg_el1(SYS_TRFCR);
write_sysreg_s(0, SYS_TRFCR_EL1); write_sysreg_el1(0, SYS_TRFCR);
isb(); isb();
/* Drain the trace buffer to memory */ /* Drain the trace buffer to memory */
tsb_csync(); tsb_csync();
...@@ -76,7 +76,7 @@ static void __debug_restore_trace(u64 trfcr_el1) ...@@ -76,7 +76,7 @@ static void __debug_restore_trace(u64 trfcr_el1)
return; return;
/* Restore trace filter controls */ /* Restore trace filter controls */
write_sysreg_s(trfcr_el1, SYS_TRFCR_EL1); write_sysreg_el1(trfcr_el1, SYS_TRFCR);
} }
void __debug_save_host_buffers_nvhe(struct kvm_vcpu *vcpu) void __debug_save_host_buffers_nvhe(struct kvm_vcpu *vcpu)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment