Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4652470pxj; Wed, 12 May 2021 10:06:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw1VrgjN1T5XmtgMwPJPOTBse/0LPzIluBxbxLLkDGamYqG+RRG8tIo++780pOI5/IOpyaT X-Received: by 2002:a50:f396:: with SMTP id g22mr41691743edm.173.1620839188779; Wed, 12 May 2021 10:06:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620839188; cv=none; d=google.com; s=arc-20160816; b=S5YjquQ3lODNbxg6MhsWwuRm0aoPgnFSQTA4BSqQlEnKQHvpZwkNSOFfeo996XfbCu GWdp+sA2s4wLWCGo5WniUsp0iilAcSg6FZZqmHU35rXy0HBRvRBci0uH9GjryLbO67ay wA0MAo13ES4ivnWNvzlm7GxqV1TjcOT/oKAjaYlrAencCI7mhnvW9UFbi0mCNYzptpYB Jy9862ckZwQTFK51KFQf4qnzn9R9CCup2WzueY558goV7bspDYBEHEVV2HeBf2mkTzaK 0aOTd6TiM7peAFO1vP5W4WTAcSSWBOs2kjlyO4hRuCgHo2zPWbPgkFXt1kqPRNXZygEW O0iQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Y9K3TLuyI8j60pp/cIAXZX3FGamjEzVAJz4AgoKKjnI=; b=wSNQF2Ws6fsPbcIqn2cD+uEATmMIe0W3dk3LsZZeWaUgTgHrRLlP8q4i1dyqWTolfL puY12/RAQvA0yzq1m9rntpjA0qxmbCv6w1+4gg1qGSm5psaBg4mu1D0ietdz1EoqhlW5 K1A3xEWVdQYWvqSaaPQ6+yOEHJ+JYJkHjvEfVT2LSk435qX3cNd4epcVbOD6Fm7I01aY g0flFQoHoPU8G7aXoh2/ycol2/lRb/iUUkLNU93vSmGnjQitFBCWuwij3k1igOSAwwtw pqUZputFXwP1MDvUcGmpSWUbDtT+61Nb7IpmUki4uchpMsLZyMwROgTR+gAxD97lCO5H JIqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PK8nce24; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u28si247445eda.342.2021.05.12.10.06.04; Wed, 12 May 2021 10:06:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PK8nce24; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240774AbhELRFE (ORCPT + 99 others); Wed, 12 May 2021 13:05:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:35710 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238143AbhELP50 (ORCPT ); Wed, 12 May 2021 11:57:26 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CAE2C61C28; Wed, 12 May 2021 15:30:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620833429; bh=7BOrECecumwVI4LPQYkbiYqR4Eu7px9PCN1oDcFNZcM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PK8nce24KvNqVphT7AS9yl+y/mU0ZPa9/aZ83MeOdYttyDf6FIGBJUA1eAaulbKc/ x9puA2QVeX0kzXzb+wBfiWYrIJbAnyCasGIaAE7hzy+JbQJ5ayzZdQqEvANjKSv7wx bPk9wJe1JRKe81IVtb04yyS7OPuzrX+MrUctwyPg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Marc Zyngier Subject: [PATCH 5.11 111/601] KVM: arm64: Fully zero the vcpu state on reset Date: Wed, 12 May 2021 16:43:08 +0200 Message-Id: <20210512144831.495467452@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512144827.811958675@linuxfoundation.org> References: <20210512144827.811958675@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Marc Zyngier commit 85d703746154cdc6794b6654b587b0b0354c97e9 upstream. On vcpu reset, we expect all the registers to be brought back to their initial state, which happens to be a bunch of zeroes. However, some recent commit broke this, and is now leaving a bunch of registers (such as the FP state) with whatever was left by the guest. My bad. Zero the reset of the state (32bit SPSRs and FPSIMD state). Cc: stable@vger.kernel.org Fixes: e47c2055c68e ("KVM: arm64: Make struct kvm_regs userspace-only") Signed-off-by: Marc Zyngier Signed-off-by: Greg Kroah-Hartman --- arch/arm64/kvm/reset.c | 5 +++++ 1 file changed, 5 insertions(+) --- a/arch/arm64/kvm/reset.c +++ b/arch/arm64/kvm/reset.c @@ -242,6 +242,11 @@ int kvm_reset_vcpu(struct kvm_vcpu *vcpu /* Reset core registers */ memset(vcpu_gp_regs(vcpu), 0, sizeof(*vcpu_gp_regs(vcpu))); + memset(&vcpu->arch.ctxt.fp_regs, 0, sizeof(vcpu->arch.ctxt.fp_regs)); + vcpu->arch.ctxt.spsr_abt = 0; + vcpu->arch.ctxt.spsr_und = 0; + vcpu->arch.ctxt.spsr_irq = 0; + vcpu->arch.ctxt.spsr_fiq = 0; vcpu_gp_regs(vcpu)->pstate = pstate; /* Reset system registers */