Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3670650pxf; Mon, 5 Apr 2021 19:24:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqkCWGEOlQfa5NDBQiOeQNDhEINCrxGGe9l01LGEhJYyIv8r3BujV7UajTiR0g3wksYi/y X-Received: by 2002:a17:906:5689:: with SMTP id am9mr30419746ejc.298.1617675889858; Mon, 05 Apr 2021 19:24:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617675889; cv=none; d=google.com; s=arc-20160816; b=RInuH9wSLwnpx/J3kF/IAMwrU48ub4EmRkA9jpwwc9l/pxJc7y7CZQeyWZyehoD6BY XLr2P4pmxdB4RFE46yaj9M0Yo/inKgXudtiaKp4apzs3EjXyf5WGyQZtxQVxCOLg71MI MP5lmfi4aXRV+eAKwn81D0/90PLrTwiyESJROqaTbaT1fzAWUi4EmS/Fax89VZRO+9dw KQPf0W9xCftCDQxsC4+beiomksGx3orjXbGCQDnzm3P7WRsdLc0l3JOhrnXghCTanqvI BaIvDHDE7PFDbCU+JhuLpAz7fke1lOVMDDwDOQV2wQ+nKN5Mcu2uZ4OL2WIpHI209PvH c8RA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=kVJO/L06XAkhJI1r1VfHw+laOcpGWQ9PjyuXoYpXbxo=; b=l8hBWNKmsy4Qsc51ltgDrdMPpkG1bq6P/rdtRII65r3yVRK9chO/OFvvQL2M93wFel ZNGRQ2VNQWWL9bYl3YcjYVlDy6CBbVpYnLEivLxg2RVwenZhaB8tOJPIb/J04KO02x+G NwrdMKORAHVbJSDO2SHQeTOSX2NroCv/fKkD78SIchiDKquAUi6pMEe0fn27XjKInZRv tlcJefsYRjUgBE6erns+YDGrQJn1FoJXX8g+1LufzDM2I5KdRI1k32Okf5evcuLWMtKL nQQo4eaUiaskRol10zkEYtXGRRAFfUeLCJysCcaQU0cJpRcjD9VnVykty0GZXH5RKVgI MYtA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="B/bw4J89"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hd19si15759118ejc.62.2021.04.05.19.24.17; Mon, 05 Apr 2021 19:24:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="B/bw4J89"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239261AbhDEQGr (ORCPT + 99 others); Mon, 5 Apr 2021 12:06:47 -0400 Received: from mail.kernel.org ([198.145.29.99]:58184 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238731AbhDEQFX (ORCPT ); Mon, 5 Apr 2021 12:05:23 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B46A0613C3; Mon, 5 Apr 2021 16:05:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1617638717; bh=XRLwauBjsFty1c92SC3fTmJm4Yvrr7casJYIy7PUltw=; h=From:To:Cc:Subject:Date:From; b=B/bw4J89nBgTk6Up+60FOO3IcUmnubVhBdfOg13CLGG14QUB1YW81+VTYgg3Ue6Kd 6WXgmF1JmasgV87/8giUDxQ6oG+lvcmHYj5VoxAnvBV4ek7yQrgPfQaNnMenFPPEvt GEnhaMlVpACANztTFexBF3WK6SQz9i4ahGSN5hk9DiNIIekSYdxLfUsKwW3E9UjufK rsCldxT+relV8iJ3kEr/CUmoQJ/epf8eWM0AFzWk8rg4D+W1zmeVCTr+MvrXMvWtNu ZldGnvYT/GSyOOE+QzMqS8eRUkLdB/FYJA/Px5IssecTQjNdt1e1JbM2tX/aOSNHEX kS8uoZ+J9lzFQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Suzuki K Poulose , Will Deacon , Catalin Marinas , Mark Rutland , Marc Zyngier , Sasha Levin , linux-arm-kernel@lists.infradead.org Subject: [PATCH AUTOSEL 4.19 1/8] KVM: arm64: Hide system instruction access to Trace registers Date: Mon, 5 Apr 2021 12:05:08 -0400 Message-Id: <20210405160515.269020-1-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Suzuki K Poulose [ Upstream commit 1d676673d665fd2162e7e466dcfbe5373bfdb73e ] Currently we advertise the ID_AA6DFR0_EL1.TRACEVER for the guest, when the trace register accesses are trapped (CPTR_EL2.TTA == 1). So, the guest will get an undefined instruction, if trusts the ID registers and access one of the trace registers. Lets be nice to the guest and hide the feature to avoid unexpected behavior. Even though this can be done at KVM sysreg emulation layer, we do this by removing the TRACEVER from the sanitised feature register field. This is fine as long as the ETM drivers can handle the individual trace units separately, even when there are differences among the CPUs. Cc: Will Deacon Cc: Catalin Marinas Cc: Mark Rutland Signed-off-by: Suzuki K Poulose Signed-off-by: Marc Zyngier Link: https://lore.kernel.org/r/20210323120647.454211-2-suzuki.poulose@arm.com Signed-off-by: Sasha Levin --- arch/arm64/kernel/cpufeature.c | 1 - 1 file changed, 1 deletion(-) diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c index 1719d21a171a..122d5e843ab6 100644 --- a/arch/arm64/kernel/cpufeature.c +++ b/arch/arm64/kernel/cpufeature.c @@ -258,7 +258,6 @@ static const struct arm64_ftr_bits ftr_id_aa64dfr0[] = { * of support. */ S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_EXACT, ID_AA64DFR0_PMUVER_SHIFT, 4, 0), - ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_TRACEVER_SHIFT, 4, 0), ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_DEBUGVER_SHIFT, 4, 0x6), ARM64_FTR_END, }; -- 2.30.2