Skip to content

Commit f1ca81f

Browse files
author
Sebastian Ott
committed
KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests
JIRA: https://issues.redhat.com/browse/RHEL-82297 When the guest does not support FEAT_TCR2 we should not allow any access to it in order to ensure that we do not create spurious issues with guest migration. Add a visibility operation for it. Fixes: fbff560 ("KVM: arm64: Save/restore TCR2_EL1") Signed-off-by: Mark Brown <broonie@kernel.org> Link: https://lore.kernel.org/r/20240822-kvm-arm64-hide-pie-regs-v2-2-376624fa829c@kernel.org [maz: simplify by using __el2_visibility(), kvm_has_tcr2() throughout] Signed-off-by: Marc Zyngier <maz@kernel.org> Link: https://lore.kernel.org/r/20241023145345.1613824-25-maz@kernel.org Signed-off-by: Oliver Upton <oliver.upton@linux.dev> (cherry picked from commit 0fcb4ee) Signed-off-by: Sebastian Ott <sebott@redhat.com>
1 parent 77c333c commit f1ca81f

File tree

5 files changed

+28
-8
lines changed

5 files changed

+28
-8
lines changed

arch/arm64/include/asm/kvm_host.h

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1517,4 +1517,7 @@ void kvm_set_vm_id_reg(struct kvm *kvm, u32 reg, u64 val);
15171517
(system_supports_fpmr() && \
15181518
kvm_has_feat((k), ID_AA64PFR2_EL1, FPMR, IMP))
15191519

1520+
#define kvm_has_tcr2(k) \
1521+
(kvm_has_feat((k), ID_AA64MMFR3_EL1, TCRX, IMP))
1522+
15201523
#endif /* __ARM64_KVM_HOST_H__ */

arch/arm64/kvm/at.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1106,7 +1106,7 @@ static u64 __kvm_at_s1e01_fast(struct kvm_vcpu *vcpu, u32 op, u64 vaddr)
11061106
write_sysreg_el1(vcpu_read_sys_reg(vcpu, TTBR1_EL1), SYS_TTBR1);
11071107
write_sysreg_el1(vcpu_read_sys_reg(vcpu, TCR_EL1), SYS_TCR);
11081108
write_sysreg_el1(vcpu_read_sys_reg(vcpu, MAIR_EL1), SYS_MAIR);
1109-
if (kvm_has_feat(vcpu->kvm, ID_AA64MMFR3_EL1, TCRX, IMP)) {
1109+
if (kvm_has_tcr2(vcpu->kvm)) {
11101110
write_sysreg_el1(vcpu_read_sys_reg(vcpu, TCR2_EL1), SYS_TCR2);
11111111
if (kvm_has_feat(vcpu->kvm, ID_AA64MMFR3_EL1, S1PIE, IMP)) {
11121112
write_sysreg_el1(vcpu_read_sys_reg(vcpu, PIR_EL1), SYS_PIR);

arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ static inline bool ctxt_has_tcrx(struct kvm_cpu_context *ctxt)
6969
return false;
7070

7171
vcpu = ctxt_to_vcpu(ctxt);
72-
return kvm_has_feat(kern_hyp_va(vcpu->kvm), ID_AA64MMFR3_EL1, TCRX, IMP);
72+
return kvm_has_tcr2(kern_hyp_va(vcpu->kvm));
7373
}
7474

7575
static inline bool ctxt_has_s1poe(struct kvm_cpu_context *ctxt)

arch/arm64/kvm/nested.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1054,7 +1054,7 @@ int kvm_init_nv_sysregs(struct kvm *kvm)
10541054
res0 |= HCRX_EL2_PTTWI;
10551055
if (!kvm_has_feat(kvm, ID_AA64MMFR3_EL1, SCTLRX, IMP))
10561056
res0 |= HCRX_EL2_SCTLR2En;
1057-
if (!kvm_has_feat(kvm, ID_AA64MMFR3_EL1, TCRX, IMP))
1057+
if (!kvm_has_tcr2(kvm))
10581058
res0 |= HCRX_EL2_TCR2En;
10591059
if (!kvm_has_feat(kvm, ID_AA64ISAR2_EL1, MOPS, IMP))
10601060
res0 |= (HCRX_EL2_MSCEn | HCRX_EL2_MCE2);

arch/arm64/kvm/sys_regs.c

Lines changed: 22 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -446,7 +446,7 @@ static bool access_vm_reg(struct kvm_vcpu *vcpu,
446446
u64 val, mask, shift;
447447

448448
if (reg_to_encoding(r) == SYS_TCR2_EL1 &&
449-
!kvm_has_feat(vcpu->kvm, ID_AA64MMFR3_EL1, TCRX, IMP))
449+
!kvm_has_tcr2(vcpu->kvm))
450450
return undef_access(vcpu, p, r);
451451

452452
BUG_ON(!p->is_write);
@@ -471,7 +471,7 @@ static bool access_tcr2_el2(struct kvm_vcpu *vcpu,
471471
struct sys_reg_params *p,
472472
const struct sys_reg_desc *r)
473473
{
474-
if (!kvm_has_feat(vcpu->kvm, ID_AA64MMFR3_EL1, TCRX, IMP)) {
474+
if (!kvm_has_tcr2(vcpu->kvm)) {
475475
kvm_inject_undefined(vcpu);
476476
return false;
477477
}
@@ -2357,6 +2357,21 @@ static unsigned int s1poe_visibility(const struct kvm_vcpu *vcpu,
23572357
return REG_HIDDEN;
23582358
}
23592359

2360+
static unsigned int tcr2_visibility(const struct kvm_vcpu *vcpu,
2361+
const struct sys_reg_desc *rd)
2362+
{
2363+
if (kvm_has_tcr2(vcpu->kvm))
2364+
return 0;
2365+
2366+
return REG_HIDDEN;
2367+
}
2368+
2369+
static unsigned int tcr2_el2_visibility(const struct kvm_vcpu *vcpu,
2370+
const struct sys_reg_desc *rd)
2371+
{
2372+
return __el2_visibility(vcpu, rd, tcr2_visibility);
2373+
}
2374+
23602375
/*
23612376
* Architected system registers.
23622377
* Important: Must be sorted ascending by Op0, Op1, CRn, CRm, Op2
@@ -2568,7 +2583,8 @@ static const struct sys_reg_desc sys_reg_descs[] = {
25682583
{ SYS_DESC(SYS_TTBR0_EL1), access_vm_reg, reset_unknown, TTBR0_EL1 },
25692584
{ SYS_DESC(SYS_TTBR1_EL1), access_vm_reg, reset_unknown, TTBR1_EL1 },
25702585
{ SYS_DESC(SYS_TCR_EL1), access_vm_reg, reset_val, TCR_EL1, 0 },
2571-
{ SYS_DESC(SYS_TCR2_EL1), access_vm_reg, reset_val, TCR2_EL1, 0 },
2586+
{ SYS_DESC(SYS_TCR2_EL1), access_vm_reg, reset_val, TCR2_EL1, 0,
2587+
.visibility = tcr2_visibility },
25722588

25732589
PTRAUTH_KEY(APIA),
25742590
PTRAUTH_KEY(APIB),
@@ -2905,7 +2921,8 @@ static const struct sys_reg_desc sys_reg_descs[] = {
29052921
EL2_REG(TTBR0_EL2, access_rw, reset_val, 0),
29062922
EL2_REG(TTBR1_EL2, access_rw, reset_val, 0),
29072923
EL2_REG(TCR_EL2, access_rw, reset_val, TCR_EL2_RES1),
2908-
EL2_REG(TCR2_EL2, access_tcr2_el2, reset_val, TCR2_EL2_RES1),
2924+
EL2_REG_FILTERED(TCR2_EL2, access_tcr2_el2, reset_val, TCR2_EL2_RES1,
2925+
tcr2_el2_visibility),
29092926
EL2_REG_VNCR(VTTBR_EL2, reset_val, 0),
29102927
EL2_REG_VNCR(VTCR_EL2, reset_val, 0),
29112928

@@ -4801,7 +4818,7 @@ void kvm_calculate_traps(struct kvm_vcpu *vcpu)
48014818
if (kvm_has_feat(kvm, ID_AA64ISAR2_EL1, MOPS, IMP))
48024819
vcpu->arch.hcrx_el2 |= (HCRX_EL2_MSCEn | HCRX_EL2_MCE2);
48034820

4804-
if (kvm_has_feat(kvm, ID_AA64MMFR3_EL1, TCRX, IMP))
4821+
if (kvm_has_tcr2(kvm))
48054822
vcpu->arch.hcrx_el2 |= HCRX_EL2_TCR2En;
48064823

48074824
if (kvm_has_fpmr(kvm))

0 commit comments

Comments
 (0)