linux_dsm_epyc7002/arch/arm64/kvm/hyp
Marc Zyngier bd227553ad arm64: KVM: Prevent speculative S1 PTW when restoring vcpu context
When handling erratum 1319367, we must ensure that the page table
walker cannot parse the S1 page tables while the guest is in an
inconsistent state. This is done as follows:

On guest entry:
- TCR_EL1.EPD{0,1} are set, ensuring that no PTW can occur
- all system registers are restored, except for TCR_EL1 and SCTLR_EL1
- stage-2 is restored
- SCTLR_EL1 and TCR_EL1 are restored

On guest exit:
- SCTLR_EL1.M and TCR_EL1.EPD{0,1} are set, ensuring that no PTW can occur
- stage-2 is disabled
- All host system registers are restored

Reviewed-by: James Morse <james.morse@arm.com>
Signed-off-by: Marc Zyngier <maz@kernel.org>
2019-10-26 10:44:49 +01:00
..
debug-sr.c arm64: KVM: hyp: debug-sr: Mark expected switch fall-through 2019-07-29 11:01:37 +01:00
entry.S KVM: arm64: Skip more of the SError vaxorcism 2019-07-05 13:03:34 +01:00
fpsimd.S treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 234 2019-06-19 17:09:07 +02:00
hyp-entry.S KVM: arm64: Consume pending SError as early as possible 2019-07-05 13:03:29 +01:00
Makefile KVM: arm/arm64: Move cc/it checks under hyp's Makefile to avoid instrumentation 2019-05-24 14:53:20 +01:00
switch.c arm64: KVM: Prevent speculative S1 PTW when restoring vcpu context 2019-10-26 10:44:49 +01:00
sysreg-sr.c arm64: KVM: Prevent speculative S1 PTW when restoring vcpu context 2019-10-26 10:44:49 +01:00
tlb.c arm64: KVM: Disable EL1 PTW when invalidating S2 TLBs 2019-10-26 10:43:53 +01:00
vgic-v2-cpuif-proxy.c KVM: arm64: Migrate _elx sysreg accessors to msr_s/mrs_s 2019-07-05 13:57:25 +01:00