Received: by 2002:a05:7412:798b:b0:fc:a2b0:25d7 with SMTP id fb11csp801704rdb; Thu, 22 Feb 2024 23:29:07 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWC3CuIZIYDoJtjJRmtSSjxtxFlochfs9mg8IrLPvtpgSEKHrNGWtY2D6kdIMULSr5ryyxpeTiXbB9UOz6U5/TN3w44vyPrmGVQfXoj+Q== X-Google-Smtp-Source: AGHT+IGfegSIPKiizlRfoNz00G18/may2jekNU/EDw1mgrEoi6JIAAslkTAzXxuacg+dhj3kujSY X-Received: by 2002:a05:622a:c2:b0:42c:6b62:c2e0 with SMTP id p2-20020a05622a00c200b0042c6b62c2e0mr1741297qtw.32.1708673347352; Thu, 22 Feb 2024 23:29:07 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708673347; cv=pass; d=google.com; s=arc-20160816; b=P5ra/b8a5agcRWUMCBl6HEjYv70hzSstBC8/Uxo3B21BUpKDPMr/I7vclCdZWubCfN jVnPR1ktgsw+Shy3HWg0x6uTCZogIPc+ZX2GM8+foPdVyxKqihSvZY36oXBaeyY1zSvO MWfjySonDcEQ5Dh+2nlajmrhJrN+ChRe0mxas3B/78HXLW9Vpe9uNDMR8R20/bPdODCs wSaseD+leW18X079caB7ZFw5nP7T1EJBhbGGtz1m+OYpuV/KLzQ7uHvxb+LSUiW20vhK j266So7ze4SAbq5QbN036UJVU3UMxEn1sfrlBvI9j60OEMOj2VX/59luKijSUynIF4G7 34+Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id; bh=xkLqXJddiCVS85GlCLt+d3Mskhr6xCYqpuSQcLCBfII=; fh=19VwJGDelQDPD1fYAxGjlF2KRlqGeoJJv1eizt0Sv5E=; b=oFsZraLJOcGK4rQhwVZNv+bUj6p7SA081Mj9Aoy3EvPiL90ceFR+R/9PUjnRo7rp63 iV4hn25INBC4ratt3ZSOlqD7Jl4jmcV/p0MmKBs028St2wcmil6pLR+2kJIz/GBT+oW6 SkBrbhXbph2r5tiFLn7cTD+YfQ91dE4z1Yef/+Cmx9zaLveDB7PGcuDG0aSAS34BPOAd jzsZf3pDCvpKQt+4lCxqrBMmMDpsTv3fS4WkBquftVzZc2TQQ7fF1ulFstT6SslWUwdW T6TJ3cYUBjX/I4HzIXMQ6emlrFFazusyJiU13lo1PplvKtWlptzhDq7khjWPuCPgg6GV fufg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-77870-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-77870-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id o11-20020ac841cb000000b0042e1260d4efsi10473507qtm.521.2024.02.22.23.29.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 22 Feb 2024 23:29:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-77870-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-77870-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-77870-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 06EC21C219C9 for ; Fri, 23 Feb 2024 07:29:07 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DE53514A93; Fri, 23 Feb 2024 07:28:59 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E86C213AED; Fri, 23 Feb 2024 07:28:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708673339; cv=none; b=BQHeZXXFgjtYjuNIHkSmWS/fhhlKOWbKnYc+Y10cH5HlAQC96wfGZHiVNfBbRdbEfroPiK4I/YZnNvSO6c9UNRq+ioSxpiRbVkRBw5h+zvXMmEmvF2/6UhJr2HP+Z6zYvV2IqqyzvdAYYxwuW4kHt4i9CxmMMTXcwcl1ZTpxB68= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708673339; c=relaxed/simple; bh=1Yw4zzTDpL3qzqwnEAoUe0ALDjWjHg54HlZC8ZSIJRU=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=GpLErz8YxD8JOaIQPGgzNJI6WIjg9zzs7IVEQAp15d3WBLhLSH1X3T3rvnRRaXEHcUnzmui57ImjZR9AxgOExljrWwDnWMJdb/ReBEu2uLcVid0sx/NMqE3Wa29S4URI1GN8iUi3Lq0ffO4Ga2YN5nRa9H53Rf14p5Ii4Fi3J6s= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E77961650; Thu, 22 Feb 2024 23:29:34 -0800 (PST) Received: from [10.163.46.223] (unknown [10.163.46.223]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id F220A3F73F; Thu, 22 Feb 2024 23:28:50 -0800 (PST) Message-ID: Date: Fri, 23 Feb 2024 12:58:48 +0530 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH V16 2/8] KVM: arm64: Prevent guest accesses into BRBE system registers/instructions Content-Language: en-US To: Mark Rutland Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, will@kernel.org, catalin.marinas@arm.com, Mark Brown , James Clark , Rob Herring , Marc Zyngier , Suzuki Poulose , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , linux-perf-users@vger.kernel.org, Oliver Upton , James Morse , kvmarm@lists.linux.dev References: <20240125094119.2542332-1-anshuman.khandual@arm.com> <20240125094119.2542332-3-anshuman.khandual@arm.com> From: Anshuman Khandual In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit On 2/21/24 19:31, Mark Rutland wrote: > On Thu, Jan 25, 2024 at 03:11:13PM +0530, Anshuman Khandual wrote: >> Currently BRBE feature is not supported in a guest environment. This hides >> BRBE feature availability via masking ID_AA64DFR0_EL1.BRBE field. > > Does that means that a guest can currently see BRBE advertised in the > ID_AA64DFR0_EL1.BRB field, or is that hidden by the regular cpufeature code > today? IIRC it is hidden, but will have to double check. When experimenting for BRBE guest support enablement earlier, following changes were need for the feature to be visible in ID_AA64DFR0_EL1. diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c index 646591c67e7a..f258568535a8 100644 --- a/arch/arm64/kernel/cpufeature.c +++ b/arch/arm64/kernel/cpufeature.c @@ -445,6 +445,7 @@ static const struct arm64_ftr_bits ftr_id_mmfr0[] = { }; static const struct arm64_ftr_bits ftr_id_aa64dfr0[] = { + S_ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_BRBE_SHIFT, 4, ID_AA64DFR0_EL1_BRBE_IMP), S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_DoubleLock_SHIFT, 4, 0), ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_PMSVer_SHIFT, 4, 0), ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_CTX_CMPs_SHIFT, 4, 0), Should we add the following entry - explicitly hiding BRBE from the guest as a prerequisite patch ? S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_BRBE_SHIFT, 4, ID_AA64DFR0_EL1_BRBE_NI) > >> This also blocks guest accesses into BRBE system registers and instructions >> as if the underlying hardware never implemented FEAT_BRBE feature. >> >> Cc: Marc Zyngier >> Cc: Oliver Upton >> Cc: James Morse >> Cc: Suzuki K Poulose >> Cc: Catalin Marinas >> Cc: Will Deacon >> Cc: kvmarm@lists.linux.dev >> Cc: linux-arm-kernel@lists.infradead.org >> Cc: linux-kernel@vger.kernel.org >> Signed-off-by: Anshuman Khandual >> --- >> Changes in V16: >> >> - Added BRB_INF_SRC_TGT_EL1 macro for corresponding BRB_[INF|SRC|TGT] expansion >> >> arch/arm64/kvm/sys_regs.c | 56 +++++++++++++++++++++++++++++++++++++++ >> 1 file changed, 56 insertions(+) >> >> diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c >> index 30253bd19917..6a06dc2f0c06 100644 >> --- a/arch/arm64/kvm/sys_regs.c >> +++ b/arch/arm64/kvm/sys_regs.c >> @@ -1304,6 +1304,11 @@ static int set_pmcr(struct kvm_vcpu *vcpu, const struct sys_reg_desc *r, >> return 0; >> } >> >> +#define BRB_INF_SRC_TGT_EL1(n) \ >> + { SYS_DESC(SYS_BRBINF##n##_EL1), undef_access }, \ >> + { SYS_DESC(SYS_BRBSRC##n##_EL1), undef_access }, \ >> + { SYS_DESC(SYS_BRBTGT##n##_EL1), undef_access } \ > > With the changes suggested on the previous patch, this would need to change to be: > > #define BRB_INF_SRC_TGT_EL1(n) \ > { SYS_DESC(SYS_BRBINF_EL1(n)), undef_access }, \ > { SYS_DESC(SYS_BRBSRC_EL1(n)), undef_access }, \ > { SYS_DESC(SYS_BRBTGT_EL1(n)), undef_access } \ Sure, already folded back in these above changes. > > > ... which would also be easier for backporting (if necessary), since those > definitions have existed for a while. > > Otherwise (modulo Suzuki's comment about rebasing), this looks good to me. Okay. > > Mark. > >> /* Silly macro to expand the DBG{BCR,BVR,WVR,WCR}n_EL1 registers in one go */ >> #define DBG_BCR_BVR_WCR_WVR_EL1(n) \ >> { SYS_DESC(SYS_DBGBVRn_EL1(n)), \ >> @@ -1707,6 +1712,9 @@ static u64 read_sanitised_id_aa64dfr0_el1(struct kvm_vcpu *vcpu, >> /* Hide SPE from guests */ >> val &= ~ID_AA64DFR0_EL1_PMSVer_MASK; >> >> + /* Hide BRBE from guests */ >> + val &= ~ID_AA64DFR0_EL1_BRBE_MASK; >> + >> return val; >> } >> >> @@ -2195,6 +2203,8 @@ static const struct sys_reg_desc sys_reg_descs[] = { >> { SYS_DESC(SYS_DC_CISW), access_dcsw }, >> { SYS_DESC(SYS_DC_CIGSW), access_dcgsw }, >> { SYS_DESC(SYS_DC_CIGDSW), access_dcgsw }, >> + { SYS_DESC(OP_BRB_IALL), undef_access }, >> + { SYS_DESC(OP_BRB_INJ), undef_access }, >> >> DBG_BCR_BVR_WCR_WVR_EL1(0), >> DBG_BCR_BVR_WCR_WVR_EL1(1), >> @@ -2225,6 +2235,52 @@ static const struct sys_reg_desc sys_reg_descs[] = { >> { SYS_DESC(SYS_DBGCLAIMCLR_EL1), trap_raz_wi }, >> { SYS_DESC(SYS_DBGAUTHSTATUS_EL1), trap_dbgauthstatus_el1 }, >> >> + /* >> + * BRBE branch record sysreg address space is interleaved between >> + * corresponding BRBINF_EL1, BRBSRC_EL1, and BRBTGT_EL1. >> + */ >> + BRB_INF_SRC_TGT_EL1(0), >> + BRB_INF_SRC_TGT_EL1(16), >> + BRB_INF_SRC_TGT_EL1(1), >> + BRB_INF_SRC_TGT_EL1(17), >> + BRB_INF_SRC_TGT_EL1(2), >> + BRB_INF_SRC_TGT_EL1(18), >> + BRB_INF_SRC_TGT_EL1(3), >> + BRB_INF_SRC_TGT_EL1(19), >> + BRB_INF_SRC_TGT_EL1(4), >> + BRB_INF_SRC_TGT_EL1(20), >> + BRB_INF_SRC_TGT_EL1(5), >> + BRB_INF_SRC_TGT_EL1(21), >> + BRB_INF_SRC_TGT_EL1(6), >> + BRB_INF_SRC_TGT_EL1(22), >> + BRB_INF_SRC_TGT_EL1(7), >> + BRB_INF_SRC_TGT_EL1(23), >> + BRB_INF_SRC_TGT_EL1(8), >> + BRB_INF_SRC_TGT_EL1(24), >> + BRB_INF_SRC_TGT_EL1(9), >> + BRB_INF_SRC_TGT_EL1(25), >> + BRB_INF_SRC_TGT_EL1(10), >> + BRB_INF_SRC_TGT_EL1(26), >> + BRB_INF_SRC_TGT_EL1(11), >> + BRB_INF_SRC_TGT_EL1(27), >> + BRB_INF_SRC_TGT_EL1(12), >> + BRB_INF_SRC_TGT_EL1(28), >> + BRB_INF_SRC_TGT_EL1(13), >> + BRB_INF_SRC_TGT_EL1(29), >> + BRB_INF_SRC_TGT_EL1(14), >> + BRB_INF_SRC_TGT_EL1(30), >> + BRB_INF_SRC_TGT_EL1(15), >> + BRB_INF_SRC_TGT_EL1(31), >> + >> + /* Remaining BRBE sysreg addresses space */ >> + { SYS_DESC(SYS_BRBCR_EL1), undef_access }, >> + { SYS_DESC(SYS_BRBFCR_EL1), undef_access }, >> + { SYS_DESC(SYS_BRBTS_EL1), undef_access }, >> + { SYS_DESC(SYS_BRBINFINJ_EL1), undef_access }, >> + { SYS_DESC(SYS_BRBSRCINJ_EL1), undef_access }, >> + { SYS_DESC(SYS_BRBTGTINJ_EL1), undef_access }, >> + { SYS_DESC(SYS_BRBIDR0_EL1), undef_access }, >> + >> { SYS_DESC(SYS_MDCCSR_EL0), trap_raz_wi }, >> { SYS_DESC(SYS_DBGDTR_EL0), trap_raz_wi }, >> // DBGDTR[TR]X_EL0 share the same encoding >> -- >> 2.25.1 >>