Received: by 2002:ac2:464d:0:0:0:0:0 with SMTP id s13csp3672324lfo; Mon, 23 May 2022 11:00:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxsds0+vwf2RBT17rAa1FWopXR5fMz6JZyyrrFXvcIGN/kNuJG3aRK2RJn8TRoMxoEeUgsA X-Received: by 2002:a63:4545:0:b0:3fa:9d25:91b8 with SMTP id u5-20020a634545000000b003fa9d2591b8mr889909pgk.80.1653328826031; Mon, 23 May 2022 11:00:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653328826; cv=none; d=google.com; s=arc-20160816; b=BeH1OLEh+RZbpzXgSL72I3mtmQXZiQAfL6YGMzMCiZsnenvc4v/KBTf5kzWAPlzCVy 0+ZXBmOwZqtSREicesUOn+NPL4U1K2IErFrDc6zc+r9NwSCpclXXuUq8+JWd3AinZoXe Vnx5mtSa7WLctgdj0xsP3N5mS6HxV6YT0MKx7RHp3hxNxuZzg1eYzbLYojvk83DOlSrg 4RrvYj3x0J75v24HCsyhueDqiI0nZ9SJ+GTK6Z/aKkLh2KyzmebKn6XOsp/uydzkHwY2 mXhXvHJyioLbMEdCcToa5S7yryuOYGq8ti7Hwcwj9MA/BwOxSfCgNe+HOUNxHn4ULYk0 GV9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=atwkxfsELaCkr8SL444OWnuUWJSyFU3WKdVUcatxF9E=; b=x9lafLOwuH1r7RMX88fyM1hE1S7X8bNKCCTO7fdxAKCnq3IgD7ofcbcUC/cJrZjyKO IyNUtx8Or7twVMWbegC1JpuBoTF7lpt+/IRuoq87QC+/Tb5b7TaP5slTQdbMWuIUS8HF CP+MBgYvTzqZixZhF/QaxtVyRpJ27fNUbiXedhdUAPz4RIHcKmfLZx4kWZ4zW7aNeo90 AB3+5KVpF9IjWx8HcvfHRuTTSxSKIt+FWrN93stQTSBEnWUNMLV+zXyfhl3mfW85OsNM sOKJ17ed9HzzNFzqhpNLhflR3PKHjTHoj6D/XU+bHcKHLLR8ro6nq46OXTgNBLUM/fn3 TDrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tr13yZS+; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id r4-20020aa79884000000b005186df822dfsi13862955pfl.378.2022.05.23.11.00.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 May 2022 11:00:26 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tr13yZS+; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5FF2012B034; Mon, 23 May 2022 10:59:30 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243278AbiEWR4d (ORCPT + 99 others); Mon, 23 May 2022 13:56:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38726 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241594AbiEWRa6 (ORCPT ); Mon, 23 May 2022 13:30:58 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3BB453D4AA; Mon, 23 May 2022 10:26:49 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 0FEE7611E3; Mon, 23 May 2022 17:26:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E7E3BC385A9; Mon, 23 May 2022 17:26:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1653326777; bh=9Zc0Kphv2aqH1+IbNRUj/srjFNT98FwAZCJBJ81hjug=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tr13yZS+C/ZAva/zTTtphrpAv3rXq5HlgLzM8Pgn7lVEhWcufrhxGbCvvLgNq9QtE oI/p+y6L69jx8+B05FcSwzAwDdbyW2u8Lc9udRbGHCRie1vJGWUM3xvery8hcCTEit 6hQKYv2JT3pIR38bjoqC6De9/NRGzk6EA0NZH8aY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Marc Zyngier , Peter Maydell , Oliver Upton Subject: [PATCH 5.17 055/158] KVM: arm64: vgic-v3: Consistently populate ID_AA64PFR0_EL1.GIC Date: Mon, 23 May 2022 19:03:32 +0200 Message-Id: <20220523165839.913337649@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220523165830.581652127@linuxfoundation.org> References: <20220523165830.581652127@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Marc Zyngier commit 5163373af195f10e0d99a8de3465c4ed36bdc337 upstream. When adding support for the slightly wonky Apple M1, we had to populate ID_AA64PFR0_EL1.GIC==1 to present something to the guest, as the HW itself doesn't advertise the feature. However, we gated this on the in-kernel irqchip being created. This causes some trouble for QEMU, which snapshots the state of the registers before creating a virtual GIC, and then tries to restore these registers once the GIC has been created. Obviously, between the two stages, ID_AA64PFR0_EL1.GIC has changed value, and the write fails. The fix is to actually emulate the HW, and always populate the field if the HW is capable of it. Fixes: 562e530fd770 ("KVM: arm64: Force ID_AA64PFR0_EL1.GIC=1 when exposing a virtual GICv3") Cc: stable@vger.kernel.org Signed-off-by: Marc Zyngier Reported-by: Peter Maydell Reviewed-by: Oliver Upton Link: https://lore.kernel.org/r/20220503211424.3375263-1-maz@kernel.org Signed-off-by: Greg Kroah-Hartman --- arch/arm64/kvm/sys_regs.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) --- a/arch/arm64/kvm/sys_regs.c +++ b/arch/arm64/kvm/sys_regs.c @@ -1080,8 +1080,7 @@ static u64 read_id_reg(const struct kvm_ val |= FIELD_PREP(ARM64_FEATURE_MASK(ID_AA64PFR0_CSV2), (u64)vcpu->kvm->arch.pfr0_csv2); val &= ~ARM64_FEATURE_MASK(ID_AA64PFR0_CSV3); val |= FIELD_PREP(ARM64_FEATURE_MASK(ID_AA64PFR0_CSV3), (u64)vcpu->kvm->arch.pfr0_csv3); - if (irqchip_in_kernel(vcpu->kvm) && - vcpu->kvm->arch.vgic.vgic_model == KVM_DEV_TYPE_ARM_VGIC_V3) { + if (kvm_vgic_global_state.type == VGIC_V3) { val &= ~ARM64_FEATURE_MASK(ID_AA64PFR0_GIC); val |= FIELD_PREP(ARM64_FEATURE_MASK(ID_AA64PFR0_GIC), 1); }