From patchwork Tue Aug 1 15:19:56 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jing Zhang X-Patchwork-Id: 13336929 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 48A85C0015E for ; Tue, 1 Aug 2023 15:20:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:Cc:To:From:Subject:Message-ID: Mime-Version:Date:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Owner; bh=5jZWVHQFbXXTC515SVz/tgXnOLc8OppI1Blkwhmu4sI=; b=Zuo Q0SNNBR74/spYk+RV9VDzTXP8r50qVhyXI6rm+fak625G6CnM02klAw3QxHldbWa/VqpjiEbuRDpr Tp5I7zck3YBFJSGS49I7S8biSLKlmWw3JcV/j0LD/GkB4LWEcE1vV8iUR8PE4d+h0saNbOkLt/V8p hIbwl1mEcAWqjglj6/FAsyEI9fLJi5tDHAutYsT9x4hAI3wbppCHcmE2kgFEt+KN6vOdKp7yr6GgX XmVHdjUYQ3azbGEeQKNu3IkTyEfDNk3f7T9uWRJ0/sDDyICanlPyPSTEmHNKfugTYtjLcy+XzUvpc AJNzHf8gdvP0Rw1G+4zxKVOos09ftZg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1qQrAg-002hcq-02; Tue, 01 Aug 2023 15:20:26 +0000 Received: from mail-yb1-xb49.google.com ([2607:f8b0:4864:20::b49]) by bombadil.infradead.org with esmtps (Exim 4.96 #2 (Red Hat Linux)) id 1qQrAc-002haP-2I for linux-arm-kernel@lists.infradead.org; Tue, 01 Aug 2023 15:20:24 +0000 Received: by mail-yb1-xb49.google.com with SMTP id 3f1490d57ef6-d11f35a0d5cso6563553276.1 for ; Tue, 01 Aug 2023 08:20:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1690903211; x=1691508011; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=9bccqF6ZETP6L8iCBAyZklNgWPnV99usCe2NbK3B7qU=; b=ni12vwrh4WCyCOzKlXXO+IyaWmPJIcRzAgoQsvsnGMs2wj7MJfruA43KZbkSsda12h GR1ZwNeGk0z7aWVT9P/e8VvlOTyYaGRKSJP8dDLq2m/jMoMLJalDZXftU2oUL7s98ws4 BdSxyKpKgIsO1MnuRdqXsW2naV/FmLSbL+gtr7GIcmVZI1xHKg9L96WSEpBEEhax/pUh Q71yVF65mgCp9lMt5f+0hvoCCc2ilGayVZGBiBPofVEN+jYqcoSQ4mm2W+5dmEOC3qaX 3yj0jm4eumJBnSio/SvZ2R86AZoJkSTVJNgLMYi7nWXKKDaP+vWMwDG3GoH+XdIrwBWw 5m2A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1690903211; x=1691508011; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=9bccqF6ZETP6L8iCBAyZklNgWPnV99usCe2NbK3B7qU=; b=fsIg6ubFeQdrI525kzsQVeEwq32RIiDPy44BplZDNlh6avit0h4OTuPjx595MM0Lxz j5cMRf+Ozl2qJu3DDDdGXuF4jJqHaw+Atr7z6IhpSbHNpj7Y3OxTcZbpDYDy1qRrxVYp BYZFIc4pXiLJXQRTVSOWpiWBxWi47nScYHkxU4zOfY2AHG80CxjuVJ9KgGA5dj2+Hv/U dp85PEhne0WihxQswdCfpmrg8EFGYEjLruh22lPqDQ2UfBlxbBj9jzTmV13xtJIxGIHt fYbljsGlkEiKAiL36srofBfRqBv4WQxaVabnBBBrBMvnDIT2yRSnEh8/enpHyhK3bESr V4XA== X-Gm-Message-State: ABy/qLbgGV9PWaZdSN8jslogoc/AKRJ0i+aOGx8UWPb70GUSEKYFM5IQ zrmPlJpRRBNCuAO3abwg3ijsnTkAahlMqWLiCQ== X-Google-Smtp-Source: APBJJlE0Wc30ZjJoWXKkO+YDWTlvYE845ycMEBcUTKdlvCemAbv8pSUYmrcxJ54JJWoniJy4wnFQXWxFzyQzHR5teg== X-Received: from jgzg.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:1acf]) (user=jingzhangos job=sendgmr) by 2002:a05:6902:70b:b0:c6c:6122:5b69 with SMTP id k11-20020a056902070b00b00c6c61225b69mr106675ybt.8.1690903211311; Tue, 01 Aug 2023 08:20:11 -0700 (PDT) Date: Tue, 1 Aug 2023 08:19:56 -0700 Mime-Version: 1.0 X-Mailer: git-send-email 2.41.0.585.gd2178a4bd4-goog Message-ID: <20230801152007.337272-1-jingzhangos@google.com> Subject: [PATCH v7 00/10] Enable writable for idregs DFR0,PFR0, MMFR{0,1,2,3} From: Jing Zhang To: KVM , KVMARM , ARMLinux , Marc Zyngier , Oliver Upton Cc: Will Deacon , Paolo Bonzini , James Morse , Alexandru Elisei , Suzuki K Poulose , Fuad Tabba , Reiji Watanabe , Raghavendra Rao Ananta , Suraj Jitindar Singh , Cornelia Huck , Jing Zhang X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20230801_082022_748412_507C6B3A X-CRM114-Status: GOOD ( 12.68 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org This patch series enable userspace writable for below idregs: ID_AA64DFR0_EL1, ID_DFR0_EL1, ID_AA64PFR0_EL1, ID_AA64MMFR{0, 1, 2, 3}_EL1. A vm ioctl is added to get feature ID register writable masks from userspace. A selftest is added to verify that KVM handles the writings from user space correctly. A relevant patch from Oliver is picked from [3]. It is based on v6.5-rc4 which contains infrastructure for writable idregs. --- * v6 -> v7 - Rebase on v6.5-rc4. - Add a vm ioctl to get feature ID register writable masks from userspace. - Split the change for debug version in ID_{AA64}DFR0_EL1. - Addressed some bugs in selftest. * v5 -> v6 - Override the type of field AA64DFR0_EL1_DebugVer to be FTR_LOWER_SAFE by the discussion of Oliver and Suraj. * v4 -> v5 - Rebase on v6.5-rc1 which contains infrastructure for writable idregs. - Use guest ID registers values for the sake of emulation. - Added a selftest to verify idreg userspace writing. * v3 -> v4 - Rebase on v11 of writable idregs series at [2]. * v2 -> v3 - Rebase on v6 of writable idregs series. - Enable writable for ID_AA64PFR0_EL1 and ID_AA64MMFR{0, 1, 2}_EL1. * v1 -> v2 - Rebase on latest patch series [1] of enabling writable ID register. [1] https://lore.kernel.org/all/20230402183735.3011540-1-jingzhangos@google.com [2] https://lore.kernel.org/all/20230602005118.2899664-1-jingzhangos@google.com [3] https://lore.kernel.org/kvmarm/20230623205232.2837077-1-oliver.upton@linux.dev [v1] https://lore.kernel.org/all/20230326011950.405749-1-jingzhangos@google.com [v2] https://lore.kernel.org/all/20230403003723.3199828-1-jingzhangos@google.com [v3] https://lore.kernel.org/all/20230405172146.297208-1-jingzhangos@google.com [v4] https://lore.kernel.org/all/20230607194554.87359-1-jingzhangos@google.com [v5] https://lore.kernel.org/all/20230710192430.1992246-1-jingzhangos@google.com [v6] https://lore.kernel.org/all/20230718164522.3498236-1-jingzhangos@google.com --- Jing Zhang (8): KVM: arm64: Allow userspace to get the writable masks for feature ID registers KVM: arm64: Document KVM_ARM_GET_FEATURE_ID_WRITABLE_MASKS KVM: arm64: Use guest ID register values for the sake of emulation KVM: arm64: Enable writable for ID_AA64DFR0_EL1 and ID_DFR0_EL1 KVM: arm64: Enable writable for ID_AA64PFR0_EL1 KVM: arm64: Refactor helper Macros for idreg desc KVM: arm64: Enable writable for ID_AA64MMFR{0, 1, 2, 3}_EL1 KVM: arm64: selftests: Test for setting ID register from usersapce Oliver Upton (2): KVM: arm64: Reject attempts to set invalid debug arch version KVM: arm64: Bump up the default KVM sanitised debug version to v8p8 Documentation/virt/kvm/api.rst | 26 +++ arch/arm64/include/asm/kvm_host.h | 2 + arch/arm64/include/uapi/asm/kvm.h | 25 +++ arch/arm64/kvm/arm.c | 3 + arch/arm64/kvm/sys_regs.c | 191 ++++++++++++------ include/uapi/linux/kvm.h | 2 + tools/arch/arm64/include/uapi/asm/kvm.h | 25 +++ tools/include/uapi/linux/kvm.h | 2 + tools/testing/selftests/kvm/Makefile | 1 + .../selftests/kvm/aarch64/set_id_regs.c | 191 ++++++++++++++++++ 10 files changed, 408 insertions(+), 60 deletions(-) create mode 100644 tools/testing/selftests/kvm/aarch64/set_id_regs.c base-commit: 5d0c230f1de8c7515b6567d9afba1f196fb4e2f4