* [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit
@ 2017-07-31 0:06 Paul Mackerras
2017-07-31 0:07 ` [PATCH 2/3 v3.18.y] KVM: PPC: Book3S HV: Reload HTM registers explicitly Paul Mackerras
` (2 more replies)
0 siblings, 3 replies; 6+ messages in thread
From: Paul Mackerras @ 2017-07-31 0:06 UTC (permalink / raw)
To: stable
commit 4c3bb4ccd074e1a0552078c0bf94c662367a1658 upstream.
This restores several special-purpose registers (SPRs) to sane values
on guest exit that were missed before.
TAR and VRSAVE are readable and writable by userspace, and we need to
save and restore them to prevent the guest from potentially affecting
userspace execution (not that TAR or VRSAVE are used by any known
program that run uses the KVM_RUN ioctl). We save/restore these
in kvmppc_vcpu_run_hv() rather than on every guest entry/exit.
FSCR affects userspace execution in that it can prohibit access to
certain facilities by userspace. We save/restore it like we do
for TAR and VRSAVE.
PSPB is normally 0. We restore it to 0 on guest exit to prevent
userspace taking advantage of the guest having set it non-zero
(which would allow userspace to set its SMT priority to high).
UAMOR is normally 0. We restore it to 0 on guest exit to prevent
the AMR from being used as a covert channel between userspace
processes, since the AMR is not context-switched at present.
[paulus@ozlabs.org - removed IAMR bits that are only needed on POWER9;
adjusted FSCR save/restore for lack of fscr field in thread_struct.]
Fixes: b005255e12a3 ("KVM: PPC: Book3S HV: Context-switch new POWER8 SPRs", 2014-01-08)
Cc: stable@vger.kernel.org # v3.14+
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
---
arch/powerpc/kvm/book3s_hv.c | 13 +++++++++++--
arch/powerpc/kvm/book3s_hv_rmhandlers.S | 2 ++
2 files changed, 13 insertions(+), 2 deletions(-)
diff --git a/arch/powerpc/kvm/book3s_hv.c b/arch/powerpc/kvm/book3s_hv.c
index a3021e6ee14d..658f97794595 100644
--- a/arch/powerpc/kvm/book3s_hv.c
+++ b/arch/powerpc/kvm/book3s_hv.c
@@ -1951,6 +1951,9 @@ static int kvmppc_vcpu_run_hv(struct kvm_run *run, struct kvm_vcpu *vcpu)
int r;
int srcu_idx;
unsigned long ebb_regs[3] = {}; /* shut up GCC */
+ unsigned long user_tar = 0;
+ unsigned long proc_fscr = 0;
+ unsigned int user_vrsave;
if (!vcpu->arch.sane) {
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
@@ -2001,12 +2004,15 @@ static int kvmppc_vcpu_run_hv(struct kvm_run *run, struct kvm_vcpu *vcpu)
flush_altivec_to_thread(current);
flush_vsx_to_thread(current);
- /* Save userspace EBB register values */
+ /* Save userspace EBB and other register values */
if (cpu_has_feature(CPU_FTR_ARCH_207S)) {
ebb_regs[0] = mfspr(SPRN_EBBHR);
ebb_regs[1] = mfspr(SPRN_EBBRR);
ebb_regs[2] = mfspr(SPRN_BESCR);
+ user_tar = mfspr(SPRN_TAR);
+ proc_fscr = mfspr(SPRN_FSCR);
}
+ user_vrsave = mfspr(SPRN_VRSAVE);
vcpu->arch.wqp = &vcpu->arch.vcore->wq;
vcpu->arch.pgdir = current->mm->pgd;
@@ -2027,12 +2033,15 @@ static int kvmppc_vcpu_run_hv(struct kvm_run *run, struct kvm_vcpu *vcpu)
}
} while (is_kvmppc_resume_guest(r));
- /* Restore userspace EBB register values */
+ /* Restore userspace EBB and other register values */
if (cpu_has_feature(CPU_FTR_ARCH_207S)) {
mtspr(SPRN_EBBHR, ebb_regs[0]);
mtspr(SPRN_EBBRR, ebb_regs[1]);
mtspr(SPRN_BESCR, ebb_regs[2]);
+ mtspr(SPRN_TAR, user_tar);
+ mtspr(SPRN_FSCR, proc_fscr);
}
+ mtspr(SPRN_VRSAVE, user_vrsave);
out:
vcpu->arch.state = KVMPPC_VCPU_NOTREADY;
diff --git a/arch/powerpc/kvm/book3s_hv_rmhandlers.S b/arch/powerpc/kvm/book3s_hv_rmhandlers.S
index 791ad037749c..96ee02a8be28 100644
--- a/arch/powerpc/kvm/book3s_hv_rmhandlers.S
+++ b/arch/powerpc/kvm/book3s_hv_rmhandlers.S
@@ -1182,6 +1182,7 @@ END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S)
mtspr SPRN_IAMR, r0
mtspr SPRN_CIABR, r0
mtspr SPRN_DAWRX, r0
+ mtspr SPRN_PSPB, r0
mtspr SPRN_TCSCR, r0
mtspr SPRN_WORT, r0
/* Set MMCRS to 1<<31 to freeze and disable the SPMC counters */
@@ -1198,6 +1199,7 @@ BEGIN_FTR_SECTION
std r6,VCPU_UAMOR(r9)
li r6,0
mtspr SPRN_AMR,r6
+ mtspr SPRN_UAMOR, r6
END_FTR_SECTION_IFSET(CPU_FTR_ARCH_206)
/* Switch DSCR back to host value */
--
2.11.0
^ permalink raw reply related [flat|nested] 6+ messages in thread* [PATCH 2/3 v3.18.y] KVM: PPC: Book3S HV: Reload HTM registers explicitly 2017-07-31 0:06 [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit Paul Mackerras @ 2017-07-31 0:07 ` Paul Mackerras 2017-08-03 19:18 ` Patch "KVM: PPC: Book3S HV: Reload HTM registers explicitly" has been added to the 3.18-stable tree gregkh 2017-07-31 0:08 ` [PATCH 3/3 v3.18.y] KVM: PPC: Book3S HV: Save/restore host values of debug registers Paul Mackerras 2017-08-03 19:17 ` [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit Greg KH 2 siblings, 1 reply; 6+ messages in thread From: Paul Mackerras @ 2017-07-31 0:07 UTC (permalink / raw) To: stable Commit 46a704f8409f ("KVM: PPC: Book3S HV: Preserve userspace HTM state properly", 2017-06-15) added code which assumes that the kernel is able to handle a TM (transactional memory) unavailable interrupt from userspace by reloading the TM-related registers and enabling TM for the process. That ability was added in the 4.9 kernel; earlier kernel versions simply panic on getting the TM unavailable interrupt. Since commit 46a704f8409f has been backported to the 3.18 stable tree as commit 0b423daba180, 3.18.59 and subsequent versions are vulnerable to a userspace-triggerable panic. This patch fixes the problem by explicitly reloading the TM-related registers before returning to userspace, rather than disabling TM for the process. Commit 46a704f8409f also failed to enable TM for the kernel, leading to a TM unavailable interrupt in the kernel, causing an oops. This fixes that problem too, by enabling TM before accessing the TM registers. That problem is fixed upstream by the patch "KVM: PPC: Book3S HV: Enable TM before accessing TM registers". Fixes: 0b423daba180 ("KVM: PPC: Book3S HV: Preserve userspace HTM state properly") Signed-off-by: Paul Mackerras <paulus@ozlabs.org> --- arch/powerpc/kvm/book3s_hv.c | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/arch/powerpc/kvm/book3s_hv.c b/arch/powerpc/kvm/book3s_hv.c index 658f97794595..060880ac7826 100644 --- a/arch/powerpc/kvm/book3s_hv.c +++ b/arch/powerpc/kvm/book3s_hv.c @@ -1974,10 +1974,11 @@ static int kvmppc_vcpu_run_hv(struct kvm_run *run, struct kvm_vcpu *vcpu) run->fail_entry.hardware_entry_failure_reason = 0; return -EINVAL; } + /* Enable TM so we can read the TM SPRs */ + mtmsr(mfmsr() | MSR_TM); current->thread.tm_tfhar = mfspr(SPRN_TFHAR); current->thread.tm_tfiar = mfspr(SPRN_TFIAR); current->thread.tm_texasr = mfspr(SPRN_TEXASR); - current->thread.regs->msr &= ~MSR_TM; } #endif @@ -2043,6 +2044,19 @@ static int kvmppc_vcpu_run_hv(struct kvm_run *run, struct kvm_vcpu *vcpu) } mtspr(SPRN_VRSAVE, user_vrsave); + /* + * Since we don't do lazy TM reload, we need to reload + * the TM registers here. + */ +#ifdef CONFIG_PPC_TRANSACTIONAL_MEM + if (cpu_has_feature(CPU_FTR_TM) && current->thread.regs && + (current->thread.regs->msr & MSR_TM)) { + mtspr(SPRN_TFHAR, current->thread.tm_tfhar); + mtspr(SPRN_TFIAR, current->thread.tm_tfiar); + mtspr(SPRN_TEXASR, current->thread.tm_texasr); + } +#endif + out: vcpu->arch.state = KVMPPC_VCPU_NOTREADY; atomic_dec(&vcpu->kvm->arch.vcpus_running); -- 2.11.0 ^ permalink raw reply related [flat|nested] 6+ messages in thread
* Patch "KVM: PPC: Book3S HV: Reload HTM registers explicitly" has been added to the 3.18-stable tree 2017-07-31 0:07 ` [PATCH 2/3 v3.18.y] KVM: PPC: Book3S HV: Reload HTM registers explicitly Paul Mackerras @ 2017-08-03 19:18 ` gregkh 0 siblings, 0 replies; 6+ messages in thread From: gregkh @ 2017-08-03 19:18 UTC (permalink / raw) To: paulus, gregkh; +Cc: stable, stable-commits This is a note to let you know that I've just added the patch titled KVM: PPC: Book3S HV: Reload HTM registers explicitly to the 3.18-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: kvm-ppc-book3s-hv-reload-htm-registers-explicitly.patch and it can be found in the queue-3.18 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let <stable@vger.kernel.org> know about it. >From paulus@ozlabs.org Thu Aug 3 12:17:47 2017 From: Paul Mackerras <paulus@ozlabs.org> Date: Mon, 31 Jul 2017 10:07:43 +1000 Subject: KVM: PPC: Book3S HV: Reload HTM registers explicitly To: stable@vger.kernel.org Message-ID: <20170731000743.q7hx3bnrssggtgtl@oak.ozlabs.ibm.com> Content-Disposition: inline From: Paul Mackerras <paulus@ozlabs.org> Commit 46a704f8409f ("KVM: PPC: Book3S HV: Preserve userspace HTM state properly", 2017-06-15) added code which assumes that the kernel is able to handle a TM (transactional memory) unavailable interrupt from userspace by reloading the TM-related registers and enabling TM for the process. That ability was added in the 4.9 kernel; earlier kernel versions simply panic on getting the TM unavailable interrupt. Since commit 46a704f8409f has been backported to the 3.18 stable tree as commit 0b423daba180, 3.18.59 and subsequent versions are vulnerable to a userspace-triggerable panic. This patch fixes the problem by explicitly reloading the TM-related registers before returning to userspace, rather than disabling TM for the process. Commit 46a704f8409f also failed to enable TM for the kernel, leading to a TM unavailable interrupt in the kernel, causing an oops. This fixes that problem too, by enabling TM before accessing the TM registers. That problem is fixed upstream by the patch "KVM: PPC: Book3S HV: Enable TM before accessing TM registers". Fixes: 0b423daba180 ("KVM: PPC: Book3S HV: Preserve userspace HTM state properly") Signed-off-by: Paul Mackerras <paulus@ozlabs.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> --- arch/powerpc/kvm/book3s_hv.c | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) --- a/arch/powerpc/kvm/book3s_hv.c +++ b/arch/powerpc/kvm/book3s_hv.c @@ -1974,10 +1974,11 @@ static int kvmppc_vcpu_run_hv(struct kvm run->fail_entry.hardware_entry_failure_reason = 0; return -EINVAL; } + /* Enable TM so we can read the TM SPRs */ + mtmsr(mfmsr() | MSR_TM); current->thread.tm_tfhar = mfspr(SPRN_TFHAR); current->thread.tm_tfiar = mfspr(SPRN_TFIAR); current->thread.tm_texasr = mfspr(SPRN_TEXASR); - current->thread.regs->msr &= ~MSR_TM; } #endif @@ -2043,6 +2044,19 @@ static int kvmppc_vcpu_run_hv(struct kvm } mtspr(SPRN_VRSAVE, user_vrsave); + /* + * Since we don't do lazy TM reload, we need to reload + * the TM registers here. + */ +#ifdef CONFIG_PPC_TRANSACTIONAL_MEM + if (cpu_has_feature(CPU_FTR_TM) && current->thread.regs && + (current->thread.regs->msr & MSR_TM)) { + mtspr(SPRN_TFHAR, current->thread.tm_tfhar); + mtspr(SPRN_TFIAR, current->thread.tm_tfiar); + mtspr(SPRN_TEXASR, current->thread.tm_texasr); + } +#endif + out: vcpu->arch.state = KVMPPC_VCPU_NOTREADY; atomic_dec(&vcpu->kvm->arch.vcpus_running); Patches currently in stable-queue which might be from paulus@ozlabs.org are queue-3.18/kvm-ppc-book3s-hv-save-restore-host-values-of-debug-registers.patch queue-3.18/kvm-ppc-book3s-hv-restore-critical-sprs-to-host-values-on-guest-exit.patch queue-3.18/kvm-ppc-book3s-hv-reload-htm-registers-explicitly.patch ^ permalink raw reply [flat|nested] 6+ messages in thread
* [PATCH 3/3 v3.18.y] KVM: PPC: Book3S HV: Save/restore host values of debug registers 2017-07-31 0:06 [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit Paul Mackerras 2017-07-31 0:07 ` [PATCH 2/3 v3.18.y] KVM: PPC: Book3S HV: Reload HTM registers explicitly Paul Mackerras @ 2017-07-31 0:08 ` Paul Mackerras 2017-08-03 19:17 ` [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit Greg KH 2 siblings, 0 replies; 6+ messages in thread From: Paul Mackerras @ 2017-07-31 0:08 UTC (permalink / raw) To: stable commit 7ceaa6dcd8c6f59588428cec37f3c8093dd1011f upstream. At present, HV KVM on POWER8 and POWER9 machines loses any instruction or data breakpoint set in the host whenever a guest is run. Instruction breakpoints are currently only used by xmon, but ptrace and the perf_event subsystem can set data breakpoints as well as xmon. To fix this, we save the host values of the debug registers (CIABR, DAWR and DAWRX) before entering the guest and restore them on exit. [paulus@ozlabs.org - Adjusted stack offsets since we aren't saving POWER9-specific registers.] Fixes: b005255e12a3 ("KVM: PPC: Book3S HV: Context-switch new POWER8 SPRs", 2014-01-08) Cc: stable@vger.kernel.org # v3.14+ Signed-off-by: Paul Mackerras <paulus@ozlabs.org> --- arch/powerpc/kvm/book3s_hv_rmhandlers.S | 35 ++++++++++++++++++++++++++++----- 1 file changed, 30 insertions(+), 5 deletions(-) diff --git a/arch/powerpc/kvm/book3s_hv_rmhandlers.S b/arch/powerpc/kvm/book3s_hv_rmhandlers.S index 96ee02a8be28..c9aae3988d64 100644 --- a/arch/powerpc/kvm/book3s_hv_rmhandlers.S +++ b/arch/powerpc/kvm/book3s_hv_rmhandlers.S @@ -36,6 +36,12 @@ #define NAPPING_CEDE 1 #define NAPPING_NOVCPU 2 +/* Stack frame offsets for kvmppc_hv_entry */ +#define SFS 112 +#define STACK_SLOT_CIABR (SFS-16) +#define STACK_SLOT_DAWR (SFS-24) +#define STACK_SLOT_DAWRX (SFS-32) + /* * Call kvmppc_hv_entry in real mode. * Must be called with interrupts hard-disabled. @@ -360,7 +366,7 @@ kvmppc_hv_entry: */ mflr r0 std r0, PPC_LR_STKOFF(r1) - stdu r1, -112(r1) + stdu r1, -SFS(r1) /* Save R1 in the PACA */ std r1, HSTATE_HOST_R1(r13) @@ -618,6 +624,16 @@ BEGIN_FTR_SECTION mtspr SPRN_SPURR,r8 END_FTR_SECTION_IFSET(CPU_FTR_ARCH_206) + /* Save host values of some registers */ +BEGIN_FTR_SECTION + mfspr r5, SPRN_CIABR + mfspr r6, SPRN_DAWR + mfspr r7, SPRN_DAWRX + std r5, STACK_SLOT_CIABR(r1) + std r6, STACK_SLOT_DAWR(r1) + std r7, STACK_SLOT_DAWRX(r1) +END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) + BEGIN_FTR_SECTION /* Set partition DABR */ /* Do this before re-enabling PMU to avoid P7 DABR corruption bug */ @@ -1180,8 +1196,6 @@ END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S) */ li r0, 0 mtspr SPRN_IAMR, r0 - mtspr SPRN_CIABR, r0 - mtspr SPRN_DAWRX, r0 mtspr SPRN_PSPB, r0 mtspr SPRN_TCSCR, r0 mtspr SPRN_WORT, r0 @@ -1358,6 +1372,17 @@ hdec_soon: /* r12 = trap, r13 = paca */ BEGIN_FTR_SECTION b 32f END_FTR_SECTION_IFSET(CPU_FTR_ARCH_201) + + /* Restore host values of some registers */ +BEGIN_FTR_SECTION + ld r5, STACK_SLOT_CIABR(r1) + ld r6, STACK_SLOT_DAWR(r1) + ld r7, STACK_SLOT_DAWRX(r1) + mtspr SPRN_CIABR, r5 + mtspr SPRN_DAWR, r6 + mtspr SPRN_DAWRX, r7 +END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) + /* * POWER7 guest -> host partition switch code. * We don't have to lock against tlbies but we do @@ -1584,8 +1609,8 @@ END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) li r0, KVM_GUEST_MODE_NONE stb r0, HSTATE_IN_GUEST(r13) - ld r0, 112+PPC_LR_STKOFF(r1) - addi r1, r1, 112 + ld r0, SFS+PPC_LR_STKOFF(r1) + addi r1, r1, SFS mtlr r0 blr -- 2.11.0 ^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit 2017-07-31 0:06 [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit Paul Mackerras 2017-07-31 0:07 ` [PATCH 2/3 v3.18.y] KVM: PPC: Book3S HV: Reload HTM registers explicitly Paul Mackerras 2017-07-31 0:08 ` [PATCH 3/3 v3.18.y] KVM: PPC: Book3S HV: Save/restore host values of debug registers Paul Mackerras @ 2017-08-03 19:17 ` Greg KH 2017-08-04 4:26 ` Paul Mackerras 2 siblings, 1 reply; 6+ messages in thread From: Greg KH @ 2017-08-03 19:17 UTC (permalink / raw) To: Paul Mackerras; +Cc: stable On Mon, Jul 31, 2017 at 10:06:44AM +1000, Paul Mackerras wrote: > commit 4c3bb4ccd074e1a0552078c0bf94c662367a1658 upstream. > > This restores several special-purpose registers (SPRs) to sane values > on guest exit that were missed before. I already took this patch, right? confused, greg k-h ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit 2017-08-03 19:17 ` [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit Greg KH @ 2017-08-04 4:26 ` Paul Mackerras 0 siblings, 0 replies; 6+ messages in thread From: Paul Mackerras @ 2017-08-04 4:26 UTC (permalink / raw) To: Greg KH; +Cc: stable On Thu, Aug 03, 2017 at 12:17:24PM -0700, Greg KH wrote: > On Mon, Jul 31, 2017 at 10:06:44AM +1000, Paul Mackerras wrote: > > commit 4c3bb4ccd074e1a0552078c0bf94c662367a1658 upstream. > > > > This restores several special-purpose registers (SPRs) to sane values > > on guest exit that were missed before. > > I already took this patch, right? Yes you did. Thanks. Paul. ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2017-08-04 4:31 UTC | newest] Thread overview: 6+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2017-07-31 0:06 [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit Paul Mackerras 2017-07-31 0:07 ` [PATCH 2/3 v3.18.y] KVM: PPC: Book3S HV: Reload HTM registers explicitly Paul Mackerras 2017-08-03 19:18 ` Patch "KVM: PPC: Book3S HV: Reload HTM registers explicitly" has been added to the 3.18-stable tree gregkh 2017-07-31 0:08 ` [PATCH 3/3 v3.18.y] KVM: PPC: Book3S HV: Save/restore host values of debug registers Paul Mackerras 2017-08-03 19:17 ` [PATCH 1/3 v3.18.y] KVM: PPC: Book3S HV: Restore critical SPRs to host values on guest exit Greg KH 2017-08-04 4:26 ` Paul Mackerras
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).