Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3662178pxf; Mon, 5 Apr 2021 19:06:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwsOILSf92tYp0+LEwK7qLb7V2O+zqciP8Od4tIv0hmjv+cRAlwNzFiNyQAKE3WDbxKa6sv X-Received: by 2002:a17:906:234b:: with SMTP id m11mr9637202eja.404.1617674783974; Mon, 05 Apr 2021 19:06:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617674783; cv=none; d=google.com; s=arc-20160816; b=gCZ7pejqBWTnctPFEx3pD/+dBbvIjh/Q6Eo0423O8ueQmVGmD8z3um+9Dv7Vh4Uy4Q YzsZTBvSF33yDj55VhF8NOnJ4ZfwgBf2xwCwqSBqV0uNx3q37mMTpwqCyOPwL7lN0jVW QPA3RV2iV8tJ11BOgC3Dk2ELekv3REjgql4I6W0oZnnHT/MjyAYJaw6lZrFd28KTCu2P KivX8qV7FR/21CQAvnNFC8q2EesZCQeG2cjgo2U8Eo3QMxEwUiq4RquJuXBRLI6+ZWeX p1LkB5Wu0Ycq8xnQlyJo+obLJLuJ918E1JxQM+MxJhdDrdBqrIw6ohKPqUrNT9C8Czxy yrdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=LuVY+i328oXxR5h76T0AuRUHD3yYloty7TCTmbMLXak=; b=a4vEgt7rudkK/9rOvu5sW5e3X/38xvLIqc235a3cNM4iTEjh317pA1VeIgluqeTJ2E Xj8AqzAM5Z9NvgDT4qD5u799MaNdGNS8+sHZnysUytY8Z/HEiH+H1behCEWpbNTxfB5I 5n3KnpgZifwWjWLAcdIxdL3Dfwqbxu7u7l8L0jTaGoR7sxQdDV5ZbJCxs0K7VW8gEC5Q VY+EfIEPDbfYqK+qfu/Ya+WwKh6S1o/GOk0dyn2LI6GyOPt9AnqcypeQcD/dztQvjAru tAgL16pZc557w6XnWbNN7I43I8b872PZ2DrU2ZNTs2QkITYWrpA0ixZj8E2+E9fPJzLL qjjQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=sqcdWKJe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id nb32si16215306ejc.369.2021.04.05.19.05.59; Mon, 05 Apr 2021 19:06:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=sqcdWKJe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239425AbhDEQGb (ORCPT + 99 others); Mon, 5 Apr 2021 12:06:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:56730 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242214AbhDEQFI (ORCPT ); Mon, 5 Apr 2021 12:05:08 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 30CEF613D5; Mon, 5 Apr 2021 16:05:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1617638702; bh=mIpMHbgtarwGrt6vg+yVjTI4jWbgZVAP5Q+APwJgb44=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sqcdWKJegYtVLOhrH4XKG5WcJsTc5x2+9zHZFXBjHBS/3w0uBKDvg5jsVrZCIm7Ak rVspe6C9hd9toI7O/I6SOtJTSsdDe10YTJj+lny7+9KaHr3SO7bzr0Krnv4+8b5WAt qcpGtxW0iBUhSsPtO9HkANCvHvbxp9M27SP446D3fnTPRNqwl2YSbd0TVNf3WtHXCl SPWWQpqekderuY/BRw59wodplpeohBkCbf6ST6prDTe67WpYi8dSRo3kGmiY2Oncxr g3fOqZOCBuHgIMnGZBzSiHv0Oi/k71ez+CJAHbTI8KCDa7MLjBZOcqv3HEFYqeBLM8 aIOlAbb5BA+OQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Suzuki K Poulose , Will Deacon , Catalin Marinas , Mark Rutland , Marc Zyngier , Sasha Levin , linux-arm-kernel@lists.infradead.org Subject: [PATCH AUTOSEL 5.4 02/13] KVM: arm64: Hide system instruction access to Trace registers Date: Mon, 5 Apr 2021 12:04:47 -0400 Message-Id: <20210405160459.268794-2-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210405160459.268794-1-sashal@kernel.org> References: <20210405160459.268794-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Suzuki K Poulose [ Upstream commit 1d676673d665fd2162e7e466dcfbe5373bfdb73e ] Currently we advertise the ID_AA6DFR0_EL1.TRACEVER for the guest, when the trace register accesses are trapped (CPTR_EL2.TTA == 1). So, the guest will get an undefined instruction, if trusts the ID registers and access one of the trace registers. Lets be nice to the guest and hide the feature to avoid unexpected behavior. Even though this can be done at KVM sysreg emulation layer, we do this by removing the TRACEVER from the sanitised feature register field. This is fine as long as the ETM drivers can handle the individual trace units separately, even when there are differences among the CPUs. Cc: Will Deacon Cc: Catalin Marinas Cc: Mark Rutland Signed-off-by: Suzuki K Poulose Signed-off-by: Marc Zyngier Link: https://lore.kernel.org/r/20210323120647.454211-2-suzuki.poulose@arm.com Signed-off-by: Sasha Levin --- arch/arm64/kernel/cpufeature.c | 1 - 1 file changed, 1 deletion(-) diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c index 79caab15ccbf..acdef8d76c64 100644 --- a/arch/arm64/kernel/cpufeature.c +++ b/arch/arm64/kernel/cpufeature.c @@ -277,7 +277,6 @@ static const struct arm64_ftr_bits ftr_id_aa64dfr0[] = { * of support. */ S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_EXACT, ID_AA64DFR0_PMUVER_SHIFT, 4, 0), - ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_TRACEVER_SHIFT, 4, 0), ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_DEBUGVER_SHIFT, 4, 0x6), ARM64_FTR_END, }; -- 2.30.2