Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp888519ybe; Fri, 13 Sep 2019 07:52:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqzIuo64qlLSMCYqfTaX+dYtghOcb5McIoXRRWMraakv1YB3HEtRC1g54bebQ1KMHwPp1LVd X-Received: by 2002:aa7:cd6f:: with SMTP id ca15mr21756413edb.172.1568386346966; Fri, 13 Sep 2019 07:52:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568386346; cv=none; d=google.com; s=arc-20160816; b=kTAWAjRvZ07ih/4Dd9DTiKnnspbjS5k7qUh7DTZzZxBXx/d4a4nGbbx0vYbGSKnRAk Bp0BX2dfP9w29NOcZdYky3H++E2MQsFN7624vJElCPsIgEEV6jK2oWKeQU5fYgKqEx3I IBuVWgOnQoAjZtwX4WgZgEQouj6Y8i9xMDoeMCFv9ANC4J6exW4NZDb1jV/0XlNAMkLh x82e/7d0hKdZYyW71o1MVTQIh47gtMQ0i7Iw7Gxq4ktfcebTTQjOyvdtQONUggPfnj/o z8FMmrpkBORlz61gzSI25sJ1ZzfSJcx5jUaimTkzS2tU/CMP2jgrio7FcFOZ31tnV9HE KlmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1qUIh8OjALgX2tfzcRt+TlJmy0CmMDQbV2Sm/A4mAM4=; b=WfOHETQrGT2RFFxAqA/mZvw0qDOtRHB1haO7Wcf0wW/HkE/MIRePVa6rW+lUUT+CdU LDbNnhAikRKT6K07EhaOIOEK7JZBzuJiq8/90VggzxW6RIHm3LSz8eT7vKU0jkKyDQV1 j7sWG+vbHINYR0beurbOo6D4r5SNzJzcYNyYK156oYMhvNhnmPQIMkRrw/nMKCcyqsqL 6oHh6Lk6NpuKhgduTeQdkJuF6XTQyW2WwUbO0D1ygp1RtBKNTEHhTDsPWFsCyXRGQTCa Mgxw3Xqpa32oVlwUEegkBTNAvmEDB+nk3W45IUISVeGB/zOMeB48PgvTe9zCI/DswXsl rsDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lOvrdosu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r26si2054893edx.61.2019.09.13.07.52.03; Fri, 13 Sep 2019 07:52:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lOvrdosu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389751AbfIMNSv (ORCPT + 99 others); Fri, 13 Sep 2019 09:18:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:46534 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390291AbfIMNSs (ORCPT ); Fri, 13 Sep 2019 09:18:48 -0400 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BD594214AE; Fri, 13 Sep 2019 13:18:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568380727; bh=Kv2/TiHMHLI5WUFbpnZnFe/F5UtlRvcvzYvsfGGuLw4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lOvrdosuPW44J1F9BlB6dLw7SytV0JG5e7Hs0tmVQZePa+iaRIGhqB/6yBCimMegk ZM9GFhxz7LIqTrBZcJCVoETnKxW8Gs/CoBas7QhgSlqEE3wjfVYAeqIwKTtdljAouM bGbv0rD9C6dTo8riHRIr61v7S3dvAOafbgm6JRsA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Suraj Jitindar Singh , Michael Neuling , Michael Ellerman , Sasha Levin Subject: [PATCH 4.19 157/190] KVM: PPC: Book3S HV: Fix CR0 setting in TM emulation Date: Fri, 13 Sep 2019 14:06:52 +0100 Message-Id: <20190913130612.468446329@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190913130559.669563815@linuxfoundation.org> References: <20190913130559.669563815@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 3fefd1cd95df04da67c83c1cb93b663f04b3324f ] When emulating tsr, treclaim and trechkpt, we incorrectly set CR0. The code currently sets: CR0 <- 00 || MSR[TS] but according to the ISA it should be: CR0 <- 0 || MSR[TS] || 0 This fixes the bit shift to put the bits in the correct location. This is a data integrity issue as CR0 is corrupted. Fixes: 4bb3c7a0208f ("KVM: PPC: Book3S HV: Work around transactional memory bugs in POWER9") Cc: stable@vger.kernel.org # v4.17+ Tested-by: Suraj Jitindar Singh Signed-off-by: Michael Neuling Signed-off-by: Michael Ellerman Signed-off-by: Sasha Levin --- arch/powerpc/kvm/book3s_hv_tm.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/powerpc/kvm/book3s_hv_tm.c b/arch/powerpc/kvm/book3s_hv_tm.c index 888e2609e3f15..31cd0f327c8a2 100644 --- a/arch/powerpc/kvm/book3s_hv_tm.c +++ b/arch/powerpc/kvm/book3s_hv_tm.c @@ -131,7 +131,7 @@ int kvmhv_p9_tm_emulation(struct kvm_vcpu *vcpu) } /* Set CR0 to indicate previous transactional state */ vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & 0x0fffffff) | - (((msr & MSR_TS_MASK) >> MSR_TS_S_LG) << 28); + (((msr & MSR_TS_MASK) >> MSR_TS_S_LG) << 29); /* L=1 => tresume, L=0 => tsuspend */ if (instr & (1 << 21)) { if (MSR_TM_SUSPENDED(msr)) @@ -175,7 +175,7 @@ int kvmhv_p9_tm_emulation(struct kvm_vcpu *vcpu) /* Set CR0 to indicate previous transactional state */ vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & 0x0fffffff) | - (((msr & MSR_TS_MASK) >> MSR_TS_S_LG) << 28); + (((msr & MSR_TS_MASK) >> MSR_TS_S_LG) << 29); vcpu->arch.shregs.msr &= ~MSR_TS_MASK; return RESUME_GUEST; @@ -205,7 +205,7 @@ int kvmhv_p9_tm_emulation(struct kvm_vcpu *vcpu) /* Set CR0 to indicate previous transactional state */ vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & 0x0fffffff) | - (((msr & MSR_TS_MASK) >> MSR_TS_S_LG) << 28); + (((msr & MSR_TS_MASK) >> MSR_TS_S_LG) << 29); vcpu->arch.shregs.msr = msr | MSR_TS_S; return RESUME_GUEST; } -- 2.20.1