Received: by 10.223.176.5 with SMTP id f5csp948621wra; Tue, 6 Feb 2018 09:57:59 -0800 (PST) X-Google-Smtp-Source: AH8x225nYBHRL3INkPR1M5rvL1hLqtnLp6Nh9A1egWdoD9l/pQyzS8bWp7nVjdMiF8GxBCN28qFa X-Received: by 2002:a17:902:28c3:: with SMTP id f61-v6mr3271975plb.264.1517939879081; Tue, 06 Feb 2018 09:57:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517939879; cv=none; d=google.com; s=arc-20160816; b=AFwPmSh5ln0JoF0EQA782TM4t5exBjZr4zZzk9MkGz6vKRojPBbXA4uJ7EgxtT3/G7 nqvHxPTtrF6n/DGwt0Qa3TU9AooS/6JMp7AM9AtiMYK1sr50M2aUbIkBp0sV7QRHgOAR aPugiJx2DUuyNADfYGdVHkaDJiKVmTSwNzMLf69hp86VC7K3mXdVoiJKAzjOaI5ptmED /IaovjUiU5U7QxAG2wS/FtO/fuZiYAM9hDYH/Fh0tUN01LgxEAT1fPrIvfTw0pnz1LMe tf/lHR6/QMwzZlcET9mKf9T71ZxArWUoql/9qgtZKPDsHy7put75D6MKL4iMUfHBDgnY vCtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=+aABuo8zDcAQU4E8mIjh1iN/FXv+WBEHnTrETVf6B4s=; b=jR4IB9+yZxO0vwALOTmcGmGUCR4vzc3FptvAehkDLf+flp9NIpCnzBiEJ94kKj068r 0XHf40jgDwE9zzTHQU+qAPxNXfnWW23EirkPZ2wvaOw4UfqYTdDoldvpMniaSR4ev6bb RXFvVo/Ss2iI/wnDLno20vdnZ0FmkgSRBWDJbFUc8WlG+ymGZ9UhZNB4zJrsLPoYwhbF im8iCDS2taGvYGs8/eR87JrRGeyGvSY6O7gS+hyWWhaqt+XdelDSZWi5JstMl0WNwg+l JlIyayxRRDBuujhmTDV9SCY2SeIpdetQ8lwR6eR8gxrsyJtMPbZoV+oVow5RTybgkKSb XZag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a35-v6si1981066pli.173.2018.02.06.09.57.43; Tue, 06 Feb 2018 09:57:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752688AbeBFR4x (ORCPT + 99 others); Tue, 6 Feb 2018 12:56:53 -0500 Received: from foss.arm.com ([217.140.101.70]:40912 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752439AbeBFR4r (ORCPT ); Tue, 6 Feb 2018 12:56:47 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9F0031435; Tue, 6 Feb 2018 09:56:46 -0800 (PST) Received: from approximate.cambridge.arm.com (approximate.cambridge.arm.com [10.1.207.62]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id EE9EB3F25C; Tue, 6 Feb 2018 09:56:43 -0800 (PST) From: Marc Zyngier To: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu Cc: Catalin Marinas , Will Deacon , Peter Maydell , Christoffer Dall , Lorenzo Pieralisi , Mark Rutland , Robin Murphy , Ard Biesheuvel , Andrew Jones , Hanjun Guo , Jayachandran C , Jon Masters , Russell King - ARM Linux Subject: [PATCH v4 00/17] arm64: Add SMCCC v1.1 support and CVE-2017-5715 (Spectre variant 2) mitigation Date: Tue, 6 Feb 2018 17:56:04 +0000 Message-Id: <20180206175621.929-1-marc.zyngier@arm.com> X-Mailer: git-send-email 2.14.2 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ARM has recently published a SMC Calling Convention (SMCCC) specification update[1] that provides an optimised calling convention and optional, discoverable support for mitigating CVE-2017-5715. ARM Trusted Firmware (ATF) has already gained such an implementation[2]. This series addresses a few things: - It provides a KVM implementation of PSCI v1.0, which is a prerequisite for being able to discover SMCCC v1.1. - It allows KVM to advertise SMCCC v1.1, which is de-facto supported already (it never corrupts any of the guest registers). - It implements KVM support for the ARCH_WORKAROUND_1 function that is used to mitigate CVE-2017-5715 in a guest (if such mitigation is available on the host). - It implements SMCCC v1.1 and ARCH_WORKAROUND_1 discovery support in the kernel itself. - It finally provides firmware callbacks for CVE-2017-5715 for both kernel and KVM and drop the initial PSCI_GET_VERSION based mitigation. Patch 1 is already merged, and included here for reference. Patches on top of arm64/for-next/core. Tested on Seattle and Juno, the latter with ATF implementing SMCCC v1.1. [1]: https://developer.arm.com/support/security-update/downloads/ [2]: https://github.com/ARM-software/arm-trusted-firmware/pull/1240 * From v3: - Dropped KVM PSCI version selection API for the time being, planning to resend it after -rc1 - Some minor cleanups - Collected Acks, TBs and RBs. * From v2: - Fixed SMC handling in KVM - PSCI fixes and tidying up - SMCCC primitive rework for better code generation (both efficiency and correctness) - Remove PSCI_GET_VERSION as a mitigation vector * From v1: - Fixed 32bit build - Fix function number sign extension (Ard) - Inline SMCCC v1.1 primitives (cpp soup) - Prevent SMCCC spamming on feature probing - Random fixes and tidying up Marc Zyngier (17): arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls arm: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls arm64: KVM: Increment PC after handling an SMC trap arm/arm64: KVM: Consolidate the PSCI include files arm/arm64: KVM: Add PSCI_VERSION helper arm/arm64: KVM: Add smccc accessors to PSCI code arm/arm64: KVM: Implement PSCI 1.0 support arm/arm64: KVM: Advertise SMCCC v1.1 arm/arm64: KVM: Turn kvm_psci_version into a static inline arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling firmware/psci: Expose PSCI conduit firmware/psci: Expose SMCCC version through psci_ops arm/arm64: smccc: Make function identifiers an unsigned quantity arm/arm64: smccc: Implement SMCCC v1.1 inline primitive arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support arm64: Kill PSCI_GET_VERSION as a variant-2 workaround arch/arm/include/asm/kvm_host.h | 7 ++ arch/arm/include/asm/kvm_psci.h | 27 ------- arch/arm/kvm/handle_exit.c | 17 +++- arch/arm64/include/asm/kvm_host.h | 6 ++ arch/arm64/include/asm/kvm_psci.h | 27 ------- arch/arm64/kernel/bpi.S | 44 +++++----- arch/arm64/kernel/cpu_errata.c | 77 ++++++++++++++---- arch/arm64/kvm/handle_exit.c | 18 ++++- arch/arm64/kvm/hyp/hyp-entry.S | 20 ++++- arch/arm64/kvm/hyp/switch.c | 14 +--- drivers/firmware/psci.c | 55 +++++++++++-- include/kvm/arm_psci.h | 51 ++++++++++++ include/linux/arm-smccc.h | 165 +++++++++++++++++++++++++++++++++++++- include/linux/psci.h | 13 +++ include/uapi/linux/psci.h | 3 + virt/kvm/arm/arm.c | 2 +- virt/kvm/arm/psci.c | 143 +++++++++++++++++++++++++++------ 17 files changed, 542 insertions(+), 147 deletions(-) delete mode 100644 arch/arm/include/asm/kvm_psci.h delete mode 100644 arch/arm64/include/asm/kvm_psci.h create mode 100644 include/kvm/arm_psci.h -- 2.14.2