From patchwork Sat Feb 15 17:38:02 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 13976182 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BD723D531; Sat, 15 Feb 2025 17:38:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739641102; cv=none; b=gcImpDEyHqDBeRcrx9UAs43llLr3B6jfM65Mgw9OZ/Ky6CmDotSJXlZ6aOoQ9SzgKnSNo+9081qFv5kXEUvQMsZmf/7Rp2PiB7J1nz2S0oiWIP6XDItzH2Nh6SeAZ/dP2SKrtzmgMpK7Cd1SszelbDagMD9DcsHuL7DKh3BYVUQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739641102; c=relaxed/simple; bh=AJT8qxgsg2wv2xaOJePXhd+BAHpS30iXL1eJZnfSyzc=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=dEezNlWHbPnXsP8gf3QgMROVzfTKsctMND6gftuIs995/i3zBFc9mVgX1TpR1PfhvCR0k42vT3nv2VYUmRZgF+OiA08zzXeafRzRkpJMzjBdwnFG0XG5xpy+bHX/PvtH5AwcanpsouFBrxkMUItX4i7hlR+xL/CKk4r9LHuMovM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=jbUZ26Pc; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="jbUZ26Pc" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 349C9C4CEDF; Sat, 15 Feb 2025 17:38:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1739641102; bh=AJT8qxgsg2wv2xaOJePXhd+BAHpS30iXL1eJZnfSyzc=; h=From:To:Cc:Subject:Date:From; b=jbUZ26PcqxSK5rCoxyV5ZorVcqDHolmwDLQ1earciXtzvt8t4DFtx4/u22plQap4Z D1/WnLCXkTFiIT2qSit37mxR+dgQ9F0Kxrgluzi7i/XdTjAJfERrnMBizpboCwv7OZ 3oekOQnKOpRITxTAhHuj2H0oaQ4Wyro0JSxoP8h4aJnvx5z6D3NIKmRPtcS1exQJeR DuR3XkSW5fp0aqr1YTPoOT+eriJWzqZdXzZTZhkFzcCnXSEWdp9wjEImHXNmcgGi7O pcuefQ4aYnmpD2w1eftyQ1IGBDgokj1Y71v1WN5XAmd0lYmB6T660haEC1Ub04qRds qzBI4N5IQt+zg== Received: from sofa.misterjones.org ([185.219.108.64] helo=valley-girl.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1tjM7Q-004Pqp-66; Sat, 15 Feb 2025 17:38:20 +0000 From: Marc Zyngier To: kvmarm@lists.linux.dev, kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: Joey Gouly , Suzuki K Poulose , Oliver Upton , Zenghui Yu , Eric Auger Subject: [PATCH 00/14] KVM: arm64: NV userspace ABI Date: Sat, 15 Feb 2025 17:38:02 +0000 Message-Id: <20250215173816.3767330-1-maz@kernel.org> X-Mailer: git-send-email 2.39.2 Precedence: bulk X-Mailing-List: kvm@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: kvmarm@lists.linux.dev, kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, joey.gouly@arm.com, suzuki.poulose@arm.com, oliver.upton@linux.dev, yuzenghui@huawei.com, eric.auger@redhat.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false Since the previous incarnation of the ABI was proved to be subtly wrong, I have reworked it to be more in line with the current way KVM operates. No more late NV-specific adjustment nor writable ID_AA64MMFR0_EL1.VH. The NV configuration is now entirely selected from the vcpu flags. I've preserved the KVM_ARM_VCPU_EL2 flag which enables NV with VHE, and added KVM_ARM_VCPU_EL2_E2H0 which alters the NV behaviour to only allow nVHE guests without recursive NV support. This series is actually very little new code. The bulk of it is converting the feature downgrade to be per-idreg, essentially going back to the state before 44241f34fac96 ("KVM: arm64: nv: Use accessors for modifying ID registers"), only slightly modernised. This then becomes part of the reset value computing. The rest is simply what you'd expect in terms of being able to write the ID_AA64MMFR4_EL1.NV_frac field, making the correct bits RES0 when needed, probing for capabilities and handling the init flags. Patches on top of -rc2, with the integration branch at the usual location. Marc Zyngier (14): arm64: cpufeature: Handle NV_frac as a synonym of NV2 KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH is zero KVM: arm64: Mark HCR.EL2.{NV*,AT} RES0 when ID_AA64MMFR4_EL1.NV_frac is 0 KVM: arm64: Advertise NV2 in the boot messages KVM: arm64: Consolidate idreg reset method KVM: arm64: Make ID_REG_LIMIT_FIELD_ENUM() more widely available KVM: arm64: Enforce NV limits on a per-idregs basis KVM: arm64: Move NV-specific capping to idreg sanitisation KVM: arm64: Allow userspace to limit NV support to nVHE KVM: arm64: Make ID_AA64MMFR4_EL1.NV_frac writable KVM: arm64: Advertise FEAT_ECV when possible KVM: arm64: Allow userspace to request KVM_ARM_VCPU_EL2* KVM: arm64: Document NV caps and vcpu flags Documentation/virt/kvm/api.rst | 14 +- arch/arm64/include/asm/kvm_host.h | 2 +- arch/arm64/include/asm/kvm_nested.h | 1 + arch/arm64/include/uapi/asm/kvm.h | 1 + arch/arm64/kernel/cpufeature.c | 15 +- arch/arm64/kvm/arm.c | 11 +- arch/arm64/kvm/nested.c | 285 +++++++++++++++------------- arch/arm64/kvm/sys_regs.c | 25 +-- arch/arm64/kvm/sys_regs.h | 10 + include/uapi/linux/kvm.h | 2 + 10 files changed, 209 insertions(+), 157 deletions(-)