Received: by 2002:ab2:2997:0:b0:1ec:cbc4:63fb with SMTP id n23csp372835lqb; Thu, 29 Feb 2024 03:45:56 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWviCx4HCJN2h4QMqs7/7XwINEsm5UffP+y7ZrHObOYw5Qhq+LnsDR47Jkdx4aOcVv/KMFopH0+4NAIqjD2k7smAqH99zrVtFPeb5LAkQ== X-Google-Smtp-Source: AGHT+IEOyHn681xBdcUaf3XjkckNv3q34/jAm5tiPJVoDKmpj1EC/+OZZa11O4VRipydp3QGoc4Q X-Received: by 2002:a05:6358:5428:b0:17b:db48:934a with SMTP id u40-20020a056358542800b0017bdb48934amr2140543rwe.28.1709207155821; Thu, 29 Feb 2024 03:45:55 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709207155; cv=pass; d=google.com; s=arc-20160816; b=H5jI25ENf6lMb9pMPyfN7SooB5Roe0DFzcKl3lj8VR/NYKBaG9UgIjAaFMgDir2AVt cfADtzu8I4cRqxHU4R2HFS3qU157JaZ4D9ZQhXTfsgyxRfAzUuCBImp7kHrsgKQnpdKV m+RawCAgVGd7cyf6icVT7WLpK+HtjPYA3xVi754hzxnCoCXQ/2j/d4fRrKMXdGrh3Q03 Eplp8j4tgSRP10Sq3b/kqx79q842/uhixaPzZVcHxfm7IxnObMUC0qjIfwH3v9owDOFe 0ZzZfb2KVXOM+unx1ctQOCShqMlBZA/+1MKFKLFqCt+Q891221eoISMGF9VNVzi5do9p m3Jg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id; bh=d7zN7wlEIfSHWriT9ujp89ye5d1cF9wdw/YsMYSj9FI=; fh=BsR2/1856Z3+2WD3sdf7OcvaZ87NuAEBpSkt11KjyvM=; b=ZxdAbjD9Qfj9MDuu6itxi97k81llt77GofklhGVAsAkqxYw+hmSe7vdA8hXeRwyDBk muvxRXBYHCg5itwiZmNFdtY256PEiehiCwm+mLXcGSxK9KMlEQo8/hFBRKRtESkzY/WK IDfnhAaLjqoOPBszZWrfCFjklS8EIqxQCkSv6dlWZJtxsqTcLTgqpkc2k0tCvWr4vcwA Kg8HtlOpLEEQIKyI+/LoTnuYRZ/8ID4cCgJ8pVznFUtn8o4tcTdYoW7VglshuZoKQpM9 V4YYD6aDqoQSHz7SDwhtHEnBtrSaZc5DYuyfwToVdPfU9pj1RB7VzmNcBR4h7JufQQB+ ptoA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-86648-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-86648-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id a8-20020a0562140c2800b0068f5c3cb247si1149479qvd.191.2024.02.29.03.45.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 29 Feb 2024 03:45:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-86648-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-86648-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-86648-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 706281C21CCC for ; Thu, 29 Feb 2024 11:45:45 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5657B7D06C; Thu, 29 Feb 2024 11:45:17 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5C29C7CF25; Thu, 29 Feb 2024 11:45:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709207116; cv=none; b=i0iLVfr672bHpI2WBLhrZ+pPB6vn3B03DfvaxM3gMBDSmw91fFYIJpnuX1M90u8lw9YUE3uCNhh29cpqlp6/Xxxfovmz9C64NI7iXo2Gn6O064DmQE2FUIpSqx9xebVZdfuxuIsMCz9dirpDDqrtCCR6xk+4I8ajke8hbRrfEXQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709207116; c=relaxed/simple; bh=nd/b2uYlCb8E5dfzti2/q6XqGYbwdWariXVO650ml4k=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=acJKjzf+ha6EeRk02y9gEkhctrK5njZxfcJJ9qzRTJhiZ4MqLcSWJyoIw74ySxdnM44Ooto8EntGUzFCAGhJ+iMoEGQSZFV6ndtMRUNjKWjXBdXWY76lxze1+iqoyyzU4O0MkuM/6T/HOLBL2nLXsT3chuHG7c1KooYWfbBTIfg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 77A24150C; Thu, 29 Feb 2024 03:45:51 -0800 (PST) Received: from [10.57.50.133] (unknown [10.57.50.133]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 19A5E3F762; Thu, 29 Feb 2024 03:45:09 -0800 (PST) Message-ID: <62e64ddd-266c-414e-b66a-8ca94f3c2bbf@arm.com> Date: Thu, 29 Feb 2024 11:45:08 +0000 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH V16 2/8] KVM: arm64: Prevent guest accesses into BRBE system registers/instructions Content-Language: en-GB To: Anshuman Khandual , Mark Rutland Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, will@kernel.org, catalin.marinas@arm.com, Mark Brown , James Clark , Rob Herring , Marc Zyngier , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , linux-perf-users@vger.kernel.org, Oliver Upton , James Morse , kvmarm@lists.linux.dev References: <20240125094119.2542332-1-anshuman.khandual@arm.com> <20240125094119.2542332-3-anshuman.khandual@arm.com> From: Suzuki K Poulose In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 27/02/2024 11:13, Anshuman Khandual wrote: > > > On 2/27/24 15:34, Mark Rutland wrote: >> On Fri, Feb 23, 2024 at 12:58:48PM +0530, Anshuman Khandual wrote: >>> >>> >>> On 2/21/24 19:31, Mark Rutland wrote: >>>> On Thu, Jan 25, 2024 at 03:11:13PM +0530, Anshuman Khandual wrote: >>>>> Currently BRBE feature is not supported in a guest environment. This hides >>>>> BRBE feature availability via masking ID_AA64DFR0_EL1.BRBE field. >>>> >>>> Does that means that a guest can currently see BRBE advertised in the >>>> ID_AA64DFR0_EL1.BRB field, or is that hidden by the regular cpufeature code >>>> today? >>> >>> IIRC it is hidden, but will have to double check. When experimenting for BRBE >>> guest support enablement earlier, following changes were need for the feature >>> to be visible in ID_AA64DFR0_EL1. >>> >>> diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c >>> index 646591c67e7a..f258568535a8 100644 >>> --- a/arch/arm64/kernel/cpufeature.c >>> +++ b/arch/arm64/kernel/cpufeature.c >>> @@ -445,6 +445,7 @@ static const struct arm64_ftr_bits ftr_id_mmfr0[] = { >>> }; >>> >>> static const struct arm64_ftr_bits ftr_id_aa64dfr0[] = { >>> + S_ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_BRBE_SHIFT, 4, ID_AA64DFR0_EL1_BRBE_IMP), >>> S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_DoubleLock_SHIFT, 4, 0), >>> ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_PMSVer_SHIFT, 4, 0), >>> ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_CTX_CMPs_SHIFT, 4, 0), >>> >>> Should we add the following entry - explicitly hiding BRBE from the guest >>> as a prerequisite patch ? This has nothing to do with the Guest visibility of the BRBE. This is specifically for host "userspace" (via MRS emulation). >>> >>> S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_EL1_BRBE_SHIFT, 4, ID_AA64DFR0_EL1_BRBE_NI) >> >> Is it visbile currently, or is it hidden currently? >> >> * If it is visible before this patch, that's a latent bug that we need to go >> fix first, and that'll require more coordination. >> >> * If it is not visible before this patch, there's no problem in the code, but >> the commit message needs to explicitly mention that's the case as the commit >> message currently implies it is visible by only mentioning hiding it. >> >> ... so can you please double check as you suggested above? We should be able to >> explain why it is or is not visible today. > > It is currently hidden i.e following code returns 1 in the host > but returns 0 inside the guest. > > aa64dfr0 = read_sysreg_s(SYS_ID_AA64DFR0_EL1); > brbe = cpuid_feature_extract_unsigned_field(aa64dfr0, ID_AA64DFR0_EL1_BRBE_SHIFT); > > Hence - will update the commit message here as suggested. This is by virtue of the masking we do in the kvm/sysreg.c below. > >> >> Mark. >> >>>>> This also blocks guest accesses into BRBE system registers and instructions >>>>> as if the underlying hardware never implemented FEAT_BRBE feature. >>>>> >>>>> Cc: Marc Zyngier >>>>> Cc: Oliver Upton >>>>> Cc: James Morse >>>>> Cc: Suzuki K Poulose >>>>> Cc: Catalin Marinas >>>>> Cc: Will Deacon >>>>> Cc: kvmarm@lists.linux.dev >>>>> Cc: linux-arm-kernel@lists.infradead.org >>>>> Cc: linux-kernel@vger.kernel.org >>>>> Signed-off-by: Anshuman Khandual >>>>> --- >>>>> Changes in V16: >>>>> >>>>> - Added BRB_INF_SRC_TGT_EL1 macro for corresponding BRB_[INF|SRC|TGT] expansion >>>>> >>>>> arch/arm64/kvm/sys_regs.c | 56 +++++++++++++++++++++++++++++++++++++++ >>>>> 1 file changed, 56 insertions(+) >>>>> >>>>> diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c >>>>> index 30253bd19917..6a06dc2f0c06 100644 >>>>> --- a/arch/arm64/kvm/sys_regs.c >>>>> +++ b/arch/arm64/kvm/sys_regs.c >>>>> @@ -1304,6 +1304,11 @@ static int set_pmcr(struct kvm_vcpu *vcpu, const struct sys_reg_desc *r, >>>>> return 0; >>>>> } >>>>> >>>>> +#define BRB_INF_SRC_TGT_EL1(n) \ >>>>> + { SYS_DESC(SYS_BRBINF##n##_EL1), undef_access }, \ >>>>> + { SYS_DESC(SYS_BRBSRC##n##_EL1), undef_access }, \ >>>>> + { SYS_DESC(SYS_BRBTGT##n##_EL1), undef_access } \ >>>> >>>> With the changes suggested on the previous patch, this would need to change to be: >>>> >>>> #define BRB_INF_SRC_TGT_EL1(n) \ >>>> { SYS_DESC(SYS_BRBINF_EL1(n)), undef_access }, \ >>>> { SYS_DESC(SYS_BRBSRC_EL1(n)), undef_access }, \ >>>> { SYS_DESC(SYS_BRBTGT_EL1(n)), undef_access } \ >>> >>> Sure, already folded back in these above changes. >>> >>>> >>>> >>>> ... which would also be easier for backporting (if necessary), since those >>>> definitions have existed for a while. >>>> >>>> Otherwise (modulo Suzuki's comment about rebasing), this looks good to me. >>> >>> Okay. >>> >>>> >>>> Mark. >>>> >>>>> /* Silly macro to expand the DBG{BCR,BVR,WVR,WCR}n_EL1 registers in one go */ >>>>> #define DBG_BCR_BVR_WCR_WVR_EL1(n) \ >>>>> { SYS_DESC(SYS_DBGBVRn_EL1(n)), \ >>>>> @@ -1707,6 +1712,9 @@ static u64 read_sanitised_id_aa64dfr0_el1(struct kvm_vcpu *vcpu, >>>>> /* Hide SPE from guests */ >>>>> val &= ~ID_AA64DFR0_EL1_PMSVer_MASK; >>>>> >>>>> + /* Hide BRBE from guests */ >>>>> + val &= ~ID_AA64DFR0_EL1_BRBE_MASK; >>>>> + This controls what the guest sees. Suzuki >>>>> return val; >>>>> } >>>>> >>>>> @@ -2195,6 +2203,8 @@ static const struct sys_reg_desc sys_reg_descs[] = { >>>>> { SYS_DESC(SYS_DC_CISW), access_dcsw }, >>>>> { SYS_DESC(SYS_DC_CIGSW), access_dcgsw }, >>>>> { SYS_DESC(SYS_DC_CIGDSW), access_dcgsw }, >>>>> + { SYS_DESC(OP_BRB_IALL), undef_access }, >>>>> + { SYS_DESC(OP_BRB_INJ), undef_access }, >>>>> >>>>> DBG_BCR_BVR_WCR_WVR_EL1(0), >>>>> DBG_BCR_BVR_WCR_WVR_EL1(1), >>>>> @@ -2225,6 +2235,52 @@ static const struct sys_reg_desc sys_reg_descs[] = { >>>>> { SYS_DESC(SYS_DBGCLAIMCLR_EL1), trap_raz_wi }, >>>>> { SYS_DESC(SYS_DBGAUTHSTATUS_EL1), trap_dbgauthstatus_el1 }, >>>>> >>>>> + /* >>>>> + * BRBE branch record sysreg address space is interleaved between >>>>> + * corresponding BRBINF_EL1, BRBSRC_EL1, and BRBTGT_EL1. >>>>> + */ >>>>> + BRB_INF_SRC_TGT_EL1(0), >>>>> + BRB_INF_SRC_TGT_EL1(16), >>>>> + BRB_INF_SRC_TGT_EL1(1), >>>>> + BRB_INF_SRC_TGT_EL1(17), >>>>> + BRB_INF_SRC_TGT_EL1(2), >>>>> + BRB_INF_SRC_TGT_EL1(18), >>>>> + BRB_INF_SRC_TGT_EL1(3), >>>>> + BRB_INF_SRC_TGT_EL1(19), >>>>> + BRB_INF_SRC_TGT_EL1(4), >>>>> + BRB_INF_SRC_TGT_EL1(20), >>>>> + BRB_INF_SRC_TGT_EL1(5), >>>>> + BRB_INF_SRC_TGT_EL1(21), >>>>> + BRB_INF_SRC_TGT_EL1(6), >>>>> + BRB_INF_SRC_TGT_EL1(22), >>>>> + BRB_INF_SRC_TGT_EL1(7), >>>>> + BRB_INF_SRC_TGT_EL1(23), >>>>> + BRB_INF_SRC_TGT_EL1(8), >>>>> + BRB_INF_SRC_TGT_EL1(24), >>>>> + BRB_INF_SRC_TGT_EL1(9), >>>>> + BRB_INF_SRC_TGT_EL1(25), >>>>> + BRB_INF_SRC_TGT_EL1(10), >>>>> + BRB_INF_SRC_TGT_EL1(26), >>>>> + BRB_INF_SRC_TGT_EL1(11), >>>>> + BRB_INF_SRC_TGT_EL1(27), >>>>> + BRB_INF_SRC_TGT_EL1(12), >>>>> + BRB_INF_SRC_TGT_EL1(28), >>>>> + BRB_INF_SRC_TGT_EL1(13), >>>>> + BRB_INF_SRC_TGT_EL1(29), >>>>> + BRB_INF_SRC_TGT_EL1(14), >>>>> + BRB_INF_SRC_TGT_EL1(30), >>>>> + BRB_INF_SRC_TGT_EL1(15), >>>>> + BRB_INF_SRC_TGT_EL1(31), >>>>> + >>>>> + /* Remaining BRBE sysreg addresses space */ >>>>> + { SYS_DESC(SYS_BRBCR_EL1), undef_access }, >>>>> + { SYS_DESC(SYS_BRBFCR_EL1), undef_access }, >>>>> + { SYS_DESC(SYS_BRBTS_EL1), undef_access }, >>>>> + { SYS_DESC(SYS_BRBINFINJ_EL1), undef_access }, >>>>> + { SYS_DESC(SYS_BRBSRCINJ_EL1), undef_access }, >>>>> + { SYS_DESC(SYS_BRBTGTINJ_EL1), undef_access }, >>>>> + { SYS_DESC(SYS_BRBIDR0_EL1), undef_access }, >>>>> + >>>>> { SYS_DESC(SYS_MDCCSR_EL0), trap_raz_wi }, >>>>> { SYS_DESC(SYS_DBGDTR_EL0), trap_raz_wi }, >>>>> // DBGDTR[TR]X_EL0 share the same encoding >>>>> -- >>>>> 2.25.1 >>>>> >