[PATCH 24/37] KVM: arm64: Prepare to handle traps on deferred EL0 sysregs

Christoffer Dall cdall at linaro.org
Sun Dec 3 11:51:45 PST 2017


On Wed, Nov 15, 2017 at 09:25:08AM +0000, Julien Thierry wrote:
> 
> 
> On 12/10/17 11:41, Christoffer Dall wrote:
> >We can trap access to ACTLR_EL1 which we can later defer to only
> >save/restore during vcpu_load and vcpu_put, so let's read the value
> >directly from the CPU when necessary.
> >
> >Signed-off-by: Christoffer Dall <christoffer.dall at linaro.org>
> >---
> >  arch/arm64/kvm/sys_regs_generic_v8.c | 5 ++++-
> >  1 file changed, 4 insertions(+), 1 deletion(-)
> >
> >diff --git a/arch/arm64/kvm/sys_regs_generic_v8.c b/arch/arm64/kvm/sys_regs_generic_v8.c
> >index 969ade1..348f227 100644
> >--- a/arch/arm64/kvm/sys_regs_generic_v8.c
> >+++ b/arch/arm64/kvm/sys_regs_generic_v8.c
> >@@ -38,7 +38,10 @@ static bool access_actlr(struct kvm_vcpu *vcpu,
> >  	if (p->is_write)
> >  		return ignore_write(vcpu, p);
> >-	p->regval = vcpu_sys_reg(vcpu, ACTLR_EL1);
> >+	if (vcpu->arch.sysregs_loaded_on_cpu)
> >+		read_sysreg(actlr_el1);
> 
> Did you mean "p->regval = read_sysreg(actlr_el1);" ?
> 
> >+	else
> >+		p->regval = vcpu_sys_reg(vcpu, ACTLR_EL1);
> >  	return true;
> >  }
> >
> 

Yes, most certainly.  Nice catch.

Thanks,
-Christoffer



More information about the linux-arm-kernel mailing list