From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3B5C7C35254 for ; Mon, 10 Feb 2020 18:24:38 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 181052080C for ; Mon, 10 Feb 2020 18:24:38 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727437AbgBJSYh (ORCPT ); Mon, 10 Feb 2020 13:24:37 -0500 Received: from foss.arm.com ([217.140.110.172]:37330 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726809AbgBJSYh (ORCPT ); Mon, 10 Feb 2020 13:24:37 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7FF621FB; Mon, 10 Feb 2020 10:24:36 -0800 (PST) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 326BA3F68F; Mon, 10 Feb 2020 10:24:34 -0800 (PST) Date: Mon, 10 Feb 2020 18:24:32 +0000 From: Mark Rutland To: Will Deacon Cc: James Morse , Sami Tolvanen , Catalin Marinas , Steven Rostedt , Masami Hiramatsu , Ard Biesheuvel , Dave Martin , Kees Cook , Laura Abbott , Marc Zyngier , Nick Desaulniers , Jann Horn , Miguel Ojeda , Masahiro Yamada , clang-built-linux@googlegroups.com, kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code Message-ID: <20200210182431.GC20840@lakrids.cambridge.arm.com> References: <20191018161033.261971-1-samitolvanen@google.com> <20200128184934.77625-1-samitolvanen@google.com> <20200128184934.77625-10-samitolvanen@google.com> <6f62b3c0-e796-e91c-f53b-23bd80fcb065@arm.com> <20200210175214.GA23318@willie-the-truck> <20200210180327.GB20840@lakrids.cambridge.arm.com> <20200210180740.GA24354@willie-the-truck> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200210180740.GA24354@willie-the-truck> User-Agent: Mutt/1.11.1+11 (2f07cb52) (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 10, 2020 at 06:07:41PM +0000, Will Deacon wrote: > On Mon, Feb 10, 2020 at 06:03:28PM +0000, Mark Rutland wrote: > > On Mon, Feb 10, 2020 at 05:52:15PM +0000, Will Deacon wrote: > > > On Mon, Feb 10, 2020 at 05:18:58PM +0000, James Morse wrote: > > > > On 28/01/2020 18:49, Sami Tolvanen wrote: > > > > > Filter out CC_FLAGS_SCS and -ffixed-x18 for code that runs at a > > > > > different exception level. > > > > > > > > Hmmm, there are two things being disabled here. > > > > > > > > Stashing the lr in memory pointed to by VA won't work transparently at EL2 ... but > > > > shouldn't KVM's C code still treat x18 as a fixed register? > > > > > > My review of v6 suggested dropping the -ffixed-x18 as well, since it's only > > > introduced by SCS (in patch 5) and so isn't required by anything else. Why > > > do you think it's needed? > > > > When EL1 code calls up to hyp, it expects x18 to be preserved across the > > call, so hyp needs to either preserve it explicitly across a transitions > > from/to EL1 or always preserve it. > > I thought we explicitly saved/restored it across the call after > af12376814a5 ("arm64: kvm: stop treating register x18 as caller save"). Is > that not sufficient? That covers the hyp->guest->hyp round trip, but not the host->hyp->host portion surrounding that. Anywhere we use __call_hyp() expects x18 to be preserved across the call, and that's not only used to enter the guest. If we don't want to do that naturally at EL2, we'd probably have to add that to do_el2_call in arch/arm64/kvm/hyp/hyp-entry.S. Thanks, Mark.