From nobody Mon Feb 9 10:38:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=linaro.org ARC-Seal: i=1; a=rsa-sha256; t=1649088445; cv=none; d=zohomail.com; s=zohoarc; b=D7OE7ygBH0KiZJWXyRyZSuHWIq5RbyWg3ON4U+pZF0B2swLnPlQslEefWTmWe/ct4wFgkrY7Z0BtrNHFkPASwgAPNo4cc/vBUiFGbS7HGIe8v2siEjwKfgXK9ZaFcgYSIMknUAMNxLONTM4yO7e/mCd/uTpp1Sm8gQDC0tSabCw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1649088445; h=Content-Transfer-Encoding:Date:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=FuDOYhuH9z3OYdG3JyUjI/cHbnZxsTHuxtWNAPPhFY4=; b=Ujw6wDWA5alpFAp4+IHyrcTqM6/hzHHzUz5rfSLPqLBUhsc3AqzMPSAvOh71Ruwrf3cNsMOF1gJCpf+b/hUvw7Pb6vq6ObLkdJaWGfsNm6Dw21RTORegwwLqJZtJCZOCfVbmP6RViTOj3DAQc7dn5rDRcvk5eX+iUwrV/ZG8vUk= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1649088445608540.696289885518; Mon, 4 Apr 2022 09:07:25 -0700 (PDT) Received: from localhost ([::1]:35190 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nbPEg-0006EV-Sq for importer@patchew.org; Mon, 04 Apr 2022 12:07:22 -0400 Received: from eggs.gnu.org ([209.51.188.92]:45908) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nbP10-00065d-8l for qemu-devel@nongnu.org; Mon, 04 Apr 2022 11:53:14 -0400 Received: from [2a00:1450:4864:20::42b] (port=35800 helo=mail-wr1-x42b.google.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1nbP0y-0001NG-Gx for qemu-devel@nongnu.org; Mon, 04 Apr 2022 11:53:13 -0400 Received: by mail-wr1-x42b.google.com with SMTP id w21so15208415wra.2 for ; Mon, 04 Apr 2022 08:53:04 -0700 (PDT) Received: from orth.archaic.org.uk (orth.archaic.org.uk. [2001:8b0:1d0::2]) by smtp.gmail.com with ESMTPSA id k11-20020a5d6d4b000000b0020599079f68sm9733858wri.106.2022.04.04.08.53.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Apr 2022 08:53:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=FuDOYhuH9z3OYdG3JyUjI/cHbnZxsTHuxtWNAPPhFY4=; b=KGzW5rXYjfqTTD+D9dbFPFCQjjj2KZOcbjOdyAp4ebkak8qtFThz7q1RgtF8mqnajL qQ3ZSNWpIRaA6nRbE0+9iavW1LuMibV7q6L7pylKB71OOxuEJppUEEN8fIsmz4ib7rzW OFzf5qaidzxngdc/g3dz1zi/Ygv/V+b0BGbOEa8Eyhhl5JV2GRD2sz7hYeueJTRy8zGd U5f9p1XRd1smTj8b7ERdSV7y/0e416gCMmF4B+z+3jwDzGJZLblZ8LdiGfcUR/idhvZ/ 5gIGn+y2xnSwq43vFX7bm+uk4a2E4C/bE/+kTTNM9O2ZzLAJ1bRPKteRAGy4ZgG1D+lQ 5hZA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=FuDOYhuH9z3OYdG3JyUjI/cHbnZxsTHuxtWNAPPhFY4=; b=L++RmiAS9IlFz7/Ygy2LWirJHRBdA3ILuutjl6EjjCj4OkvZUc+UeAzMgp4GKbRKhl WspDlo/iOcfjAQXU4E3t3hhvrhpI9NXavsEn8Kqatr+N2y7MyoyA+SA2rxY/mI7sgoKM w/TG5MvjMeVkjMbt6BIJTghoJ7roZGXtCrS5vH2+et5+C+lIFDNrgBNltsl55sfiS11/ F3E4tgS9o0Na/u/w6AowCLn3jFD0ZDaFhEMUhMoxBjmj7oXrwd5lmTIcVGJPWBSMuRsN 0oYd/yanpoDuTRpBaTiBzVRe63GKVoyAPJjSuPJc2rSmyTN4w5x/+EAwuRHRMXzxW9wd eJoA== X-Gm-Message-State: AOAM530VfrZ6G6hrkkXbqx1WxBvOxMkRq7GW65Ym6IECrYAEkWc0FTbX JdP9upfOBiy7luHutbTKOvfZK6Au6YL8NQ== X-Google-Smtp-Source: ABdhPJx/1Cq3NYUCo2ELdPgc9LjH1EKTz98/lH5u+N/+SKfFA/gTkjdaxbLZFqMraO63f341EuPFWw== X-Received: by 2002:a5d:58d7:0:b0:206:f0f:18d5 with SMTP id o23-20020a5d58d7000000b002060f0f18d5mr282727wrf.271.1649087583285; Mon, 04 Apr 2022 08:53:03 -0700 (PDT) From: Peter Maydell To: qemu-arm@nongnu.org, qemu-devel@nongnu.org Subject: [PATCH for-7.1] hw/arm/virt: Check for attempt to use TrustZone with KVM or HVF Date: Mon, 4 Apr 2022 16:53:01 +0100 Message-Id: <20220404155301.566542-1-peter.maydell@linaro.org> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Host-Lookup-Failed: Reverse DNS lookup failed for 2a00:1450:4864:20::42b (failed) Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2a00:1450:4864:20::42b; envelope-from=peter.maydell@linaro.org; helo=mail-wr1-x42b.google.com X-Spam_score_int: -6 X-Spam_score: -0.7 X-Spam_bar: / X-Spam_report: (-0.7 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, PDS_HP_HELO_NORDNS=0.659, RCVD_IN_DNSWL_NONE=-0.0001, RDNS_NONE=0.793, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @linaro.org) X-ZM-MESSAGEID: 1649088447652100001 Content-Type: text/plain; charset="utf-8" It's not possible to provide the guest with the Security extensions (TrustZone) when using KVM or HVF, because the hardware virtualization extensions don't permit running EL3 guest code. However, we weren't checking for this combination, with the result that QEMU would assert if you tried it: $ qemu-system-aarch64 -enable-kvm -machine virt,secure=3Don -cpu host -disp= lay none Unexpected error in object_property_find_err() at ../../qom/object.c:1304: qemu-system-aarch64: Property 'host-arm-cpu.secure-memory' not found Aborted Check for this combination of options and report an error, in the same way we already do for attempts to give a KVM or HVF guest the Virtualization or MTE extensions. Now we will report: qemu-system-aarch64: mach-virt: KVM does not support providing Security ext= ensions (TrustZone) to the guest CPU Signed-off-by: Peter Maydell Reviewed-by: Richard Henderson --- Not a regression, so not worth fixing in 7.0. --- hw/arm/virt.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/hw/arm/virt.c b/hw/arm/virt.c index d2e5ecd234a..8f94e2fde62 100644 --- a/hw/arm/virt.c +++ b/hw/arm/virt.c @@ -2048,6 +2048,13 @@ static void machvirt_init(MachineState *machine) exit(1); } =20 + if (vms->secure && (kvm_enabled() || hvf_enabled())) { + error_report("mach-virt: %s does not support providing " + "Security extensions (TrustZone) to the guest CPU", + kvm_enabled() ? "KVM" : "HVF"); + exit(1); + } + if (vms->virt && (kvm_enabled() || hvf_enabled())) { error_report("mach-virt: %s does not support providing " "Virtualization extensions to the guest CPU", --=20 2.25.1