Skip to content

Commit 0fcb4ee

Browse files
broonieoupton
authored andcommitted
KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests
When the guest does not support FEAT_TCR2 we should not allow any access to it in order to ensure that we do not create spurious issues with guest migration. Add a visibility operation for it. Fixes: fbff560 ("KVM: arm64: Save/restore TCR2_EL1") Signed-off-by: Mark Brown <[email protected]> Link: https://lore.kernel.org/r/[email protected] [maz: simplify by using __el2_visibility(), kvm_has_tcr2() throughout] Signed-off-by: Marc Zyngier <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Oliver Upton <[email protected]>
1 parent 997eeec commit 0fcb4ee

File tree

5 files changed

+28
-8
lines changed

5 files changed

+28
-8
lines changed

arch/arm64/include/asm/kvm_host.h

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1519,4 +1519,7 @@ void kvm_set_vm_id_reg(struct kvm *kvm, u32 reg, u64 val);
15191519
(system_supports_fpmr() && \
15201520
kvm_has_feat((k), ID_AA64PFR2_EL1, FPMR, IMP))
15211521

1522+
#define kvm_has_tcr2(k) \
1523+
(kvm_has_feat((k), ID_AA64MMFR3_EL1, TCRX, IMP))
1524+
15221525
#endif /* __ARM64_KVM_HOST_H__ */

arch/arm64/kvm/at.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1099,7 +1099,7 @@ static u64 __kvm_at_s1e01_fast(struct kvm_vcpu *vcpu, u32 op, u64 vaddr)
10991099
write_sysreg_el1(vcpu_read_sys_reg(vcpu, TTBR1_EL1), SYS_TTBR1);
11001100
write_sysreg_el1(vcpu_read_sys_reg(vcpu, TCR_EL1), SYS_TCR);
11011101
write_sysreg_el1(vcpu_read_sys_reg(vcpu, MAIR_EL1), SYS_MAIR);
1102-
if (kvm_has_feat(vcpu->kvm, ID_AA64MMFR3_EL1, TCRX, IMP)) {
1102+
if (kvm_has_tcr2(vcpu->kvm)) {
11031103
write_sysreg_el1(vcpu_read_sys_reg(vcpu, TCR2_EL1), SYS_TCR2);
11041104
if (kvm_has_feat(vcpu->kvm, ID_AA64MMFR3_EL1, S1PIE, IMP)) {
11051105
write_sysreg_el1(vcpu_read_sys_reg(vcpu, PIR_EL1), SYS_PIR);

arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ static inline bool ctxt_has_tcrx(struct kvm_cpu_context *ctxt)
6969
return false;
7070

7171
vcpu = ctxt_to_vcpu(ctxt);
72-
return kvm_has_feat(kern_hyp_va(vcpu->kvm), ID_AA64MMFR3_EL1, TCRX, IMP);
72+
return kvm_has_tcr2(kern_hyp_va(vcpu->kvm));
7373
}
7474

7575
static inline bool ctxt_has_s1poe(struct kvm_cpu_context *ctxt)

arch/arm64/kvm/nested.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1054,7 +1054,7 @@ int kvm_init_nv_sysregs(struct kvm *kvm)
10541054
res0 |= HCRX_EL2_PTTWI;
10551055
if (!kvm_has_feat(kvm, ID_AA64MMFR3_EL1, SCTLRX, IMP))
10561056
res0 |= HCRX_EL2_SCTLR2En;
1057-
if (!kvm_has_feat(kvm, ID_AA64MMFR3_EL1, TCRX, IMP))
1057+
if (!kvm_has_tcr2(kvm))
10581058
res0 |= HCRX_EL2_TCR2En;
10591059
if (!kvm_has_feat(kvm, ID_AA64ISAR2_EL1, MOPS, IMP))
10601060
res0 |= (HCRX_EL2_MSCEn | HCRX_EL2_MCE2);

arch/arm64/kvm/sys_regs.c

Lines changed: 22 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -446,7 +446,7 @@ static bool access_vm_reg(struct kvm_vcpu *vcpu,
446446
u64 val, mask, shift;
447447

448448
if (reg_to_encoding(r) == SYS_TCR2_EL1 &&
449-
!kvm_has_feat(vcpu->kvm, ID_AA64MMFR3_EL1, TCRX, IMP))
449+
!kvm_has_tcr2(vcpu->kvm))
450450
return undef_access(vcpu, p, r);
451451

452452
BUG_ON(!p->is_write);
@@ -471,7 +471,7 @@ static bool access_tcr2_el2(struct kvm_vcpu *vcpu,
471471
struct sys_reg_params *p,
472472
const struct sys_reg_desc *r)
473473
{
474-
if (!kvm_has_feat(vcpu->kvm, ID_AA64MMFR3_EL1, TCRX, IMP)) {
474+
if (!kvm_has_tcr2(vcpu->kvm)) {
475475
kvm_inject_undefined(vcpu);
476476
return false;
477477
}
@@ -2357,6 +2357,21 @@ static unsigned int s1poe_visibility(const struct kvm_vcpu *vcpu,
23572357
return REG_HIDDEN;
23582358
}
23592359

2360+
static unsigned int tcr2_visibility(const struct kvm_vcpu *vcpu,
2361+
const struct sys_reg_desc *rd)
2362+
{
2363+
if (kvm_has_tcr2(vcpu->kvm))
2364+
return 0;
2365+
2366+
return REG_HIDDEN;
2367+
}
2368+
2369+
static unsigned int tcr2_el2_visibility(const struct kvm_vcpu *vcpu,
2370+
const struct sys_reg_desc *rd)
2371+
{
2372+
return __el2_visibility(vcpu, rd, tcr2_visibility);
2373+
}
2374+
23602375
/*
23612376
* Architected system registers.
23622377
* Important: Must be sorted ascending by Op0, Op1, CRn, CRm, Op2
@@ -2567,7 +2582,8 @@ static const struct sys_reg_desc sys_reg_descs[] = {
25672582
{ SYS_DESC(SYS_TTBR0_EL1), access_vm_reg, reset_unknown, TTBR0_EL1 },
25682583
{ SYS_DESC(SYS_TTBR1_EL1), access_vm_reg, reset_unknown, TTBR1_EL1 },
25692584
{ SYS_DESC(SYS_TCR_EL1), access_vm_reg, reset_val, TCR_EL1, 0 },
2570-
{ SYS_DESC(SYS_TCR2_EL1), access_vm_reg, reset_val, TCR2_EL1, 0 },
2585+
{ SYS_DESC(SYS_TCR2_EL1), access_vm_reg, reset_val, TCR2_EL1, 0,
2586+
.visibility = tcr2_visibility },
25712587

25722588
PTRAUTH_KEY(APIA),
25732589
PTRAUTH_KEY(APIB),
@@ -2904,7 +2920,8 @@ static const struct sys_reg_desc sys_reg_descs[] = {
29042920
EL2_REG(TTBR0_EL2, access_rw, reset_val, 0),
29052921
EL2_REG(TTBR1_EL2, access_rw, reset_val, 0),
29062922
EL2_REG(TCR_EL2, access_rw, reset_val, TCR_EL2_RES1),
2907-
EL2_REG(TCR2_EL2, access_tcr2_el2, reset_val, TCR2_EL2_RES1),
2923+
EL2_REG_FILTERED(TCR2_EL2, access_tcr2_el2, reset_val, TCR2_EL2_RES1,
2924+
tcr2_el2_visibility),
29082925
EL2_REG_VNCR(VTTBR_EL2, reset_val, 0),
29092926
EL2_REG_VNCR(VTCR_EL2, reset_val, 0),
29102927

@@ -4800,7 +4817,7 @@ void kvm_calculate_traps(struct kvm_vcpu *vcpu)
48004817
if (kvm_has_feat(kvm, ID_AA64ISAR2_EL1, MOPS, IMP))
48014818
vcpu->arch.hcrx_el2 |= (HCRX_EL2_MSCEn | HCRX_EL2_MCE2);
48024819

4803-
if (kvm_has_feat(kvm, ID_AA64MMFR3_EL1, TCRX, IMP))
4820+
if (kvm_has_tcr2(kvm))
48044821
vcpu->arch.hcrx_el2 |= HCRX_EL2_TCR2En;
48054822

48064823
if (kvm_has_fpmr(kvm))

0 commit comments

Comments
 (0)