From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.3 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 30D69C433ED for ; Mon, 12 Apr 2021 16:53:20 +0000 (UTC) Received: from desiato.infradead.org (desiato.infradead.org [90.155.92.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B20F661074 for ; Mon, 12 Apr 2021 16:53:19 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B20F661074 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=desiato.20200630; h=Sender:Content-Transfer-Encoding :Content-Type:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:Date:Message-ID:From: References:Cc:To:Subject:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=YVa9gpVCdWgDJ7G91yRMK6BlQOej31uoNwGLcbgN0Q0=; b=NiE8g7JdOIBNvz9pif131TUS+ JTbothfN9XM0cSvLuyfx6S9M584h8nfCY548T+zOpFrm/vgugO9h1F4bcy1AkHaotv9np/nh+zlcw 320z9el0wnY4U8B6pjkRkis0Al9LEpKCropZh9VTZVEg+V791m4pq01DgQDAZnx9ZT6wr8DRbVI6x Wku3NVTHu5jA0IZVrFiad2k4++D5soKw3rJHtCQ9Npiw9FtQqm3KlDHapr3MkslOO1nkCUZRcLv6t NjSqzVfsYUjuUGGYmSIO4V51/wIN/vMCEV9ALrCGLQVUJkFHJWbODH4MgWUGfs2ae3hA1NaSwuK0c o3q8ltMiQ==; Received: from localhost ([::1] helo=desiato.infradead.org) by desiato.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lVzmy-007JDr-Fd; Mon, 12 Apr 2021 16:51:53 +0000 Received: from bombadil.infradead.org ([2607:7c80:54:e::133]) by desiato.infradead.org with esmtps (Exim 4.94 #2 (Red Hat Linux)) id 1lVzmu-007JDf-Rk for linux-arm-kernel@desiato.infradead.org; Mon, 12 Apr 2021 16:51:49 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding: Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To: Subject:Sender:Reply-To:Content-ID:Content-Description; bh=ZVze+6N4a57VfkZSpbN+dnwig70pvFEX17WtEIePeHE=; b=numGg7wKEhmvrNuXZE6fXDXcao +ng/13hS9cLJCOzUKNJnGZnrMY6jHuLO00KMDlhh3aQvV7iihNnpvaWUcCOLx65LoV2wu8xdwSeYl zFWUOfVEtwnwJ2w+5HOD0wtFrg6drkVJdVHs3GqJnp2/H0RBdL3qVQ4KMYCZ3MPb+N+JCEPsWF/QU 7ESeHKx8MJSsEj083Q/wQPZOqsY+x76qq4kKplsWvxusS8iyYLFSpMgtP4tF3gM1zI5O58Y3IkI/L ez2VU/Lp/K0hdLBfhaPnir8ga25gdWEUOzzjI3nRLtfeo97sVADl4BejjWD5hLJLpzjFMgZe+Ng9k 4hqMXbqw==; Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lVzms-006R0I-24 for linux-arm-kernel@lists.infradead.org; Mon, 12 Apr 2021 16:51:47 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id AF20512FC; Mon, 12 Apr 2021 09:51:40 -0700 (PDT) Received: from [192.168.0.110] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4CB453F73B; Mon, 12 Apr 2021 09:51:38 -0700 (PDT) Subject: Re: [PATCH v2] KVM: arm64: Fully zero the vcpu state on reset To: Marc Zyngier , linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu Cc: James Morse , Suzuki K Poulose , Will Deacon , kernel-team@android.com, stable@vger.kernel.org References: <20210409173257.3031729-1-maz@kernel.org> From: Alexandru Elisei Message-ID: <977338ef-9b06-1fec-9075-5e9cbdb89bc2@arm.com> Date: Mon, 12 Apr 2021 17:51:53 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: <20210409173257.3031729-1-maz@kernel.org> Content-Language: en-US X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210412_095146_187167_12C39104 X-CRM114-Status: GOOD ( 24.21 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi Marc, On 4/9/21 6:32 PM, Marc Zyngier wrote: > On vcpu reset, we expect all the registers to be brought back > to their initial state, which happens to be a bunch of zeroes. > > However, some recent commit broke this, and is now leaving a bunch > of registers (such as the FP state) with whatever was left by the > guest. My bad. > > Zero the reset of the state (32bit SPSRs and FPSIMD state). > > Cc: stable@vger.kernel.org > Fixes: e47c2055c68e ("KVM: arm64: Make struct kvm_regs userspace-only") > Signed-off-by: Marc Zyngier > --- > > Notes: > v2: Only reset the FPSIMD state and the AArch32 SPSRs to avoid > corrupting CNTVOFF in creative ways. I missed that last time, sorry. > > arch/arm64/kvm/reset.c | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/arch/arm64/kvm/reset.c b/arch/arm64/kvm/reset.c > index bd354cd45d28..4b5acd84b8c8 100644 > --- a/arch/arm64/kvm/reset.c > +++ b/arch/arm64/kvm/reset.c > @@ -242,6 +242,11 @@ int kvm_reset_vcpu(struct kvm_vcpu *vcpu) > > /* Reset core registers */ > memset(vcpu_gp_regs(vcpu), 0, sizeof(*vcpu_gp_regs(vcpu))); > + memset(&vcpu->arch.ctxt.fp_regs, 0, sizeof(vcpu->arch.ctxt.fp_regs)); > + vcpu->arch.ctxt.spsr_abt = 0; > + vcpu->arch.ctxt.spsr_und = 0; > + vcpu->arch.ctxt.spsr_irq = 0; > + vcpu->arch.ctxt.spsr_fiq = 0; Checked, and the only fields not touched by the change from struct kvm_cpu_context are sys_regs and __hyp_running_cpu. __hyp_running_cpu is assumed to be NULL for a guest and it doesn't change during the lifetime of a VCPU; it is set to NULL when struct kvm_vcpu is allocated. CNTVOFF_EL2 is not accessible to userspace (it's not in the sys_reg_descs and in the invariant_sys_regs arrays), so it's not necessary to reset it in case userspace changed it. Same for the other registers that are part of the VCPU context, but are not in sys_reg_descs. I think it's a good choice to skip zeroing the system registers. I compared vcpu->arch.ctxt.sys_regs with sys_regs_descs, there were quite a few registers that were part of the vcpu context (pointer authentication registers, virtual timer registers, and others) and not part of sys_regs_descs. If someone adds a register to the VCPU context, but not to sys_regs_descs, I think it would have been easy to miss the fact that KVM_ARM_VCPU_INIT zeroes it. Hopefully I haven't missed anything: Reviewed-by: Alexandru Elisei Thanks, Alex > vcpu_gp_regs(vcpu)->pstate = pstate; > > /* Reset system registers */ _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel