Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp582003rdb; Tue, 19 Sep 2023 04:38:51 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEy45KYW2rpBsmhNKXABx0wKJ62sv8jqjBh5pqbJDKawqB8nolz/l781b8HUh0yPsrMAeaE X-Received: by 2002:a05:6a00:1819:b0:68b:a137:372b with SMTP id y25-20020a056a00181900b0068ba137372bmr15252110pfa.19.1695123531637; Tue, 19 Sep 2023 04:38:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695123531; cv=none; d=google.com; s=arc-20160816; b=zOCrt5909gaaUjgpHmUy9itwwDtgVCQFZp1Lr9+YuMoIEr5MdirekrYAB4A2mbLuxQ KB5g7F5jr9PHxPN7j9rOBG0he9csx5ro6jhHBT4w6KplIESUV13Q/PjiTGjtHRmOryn5 kCGybqy8Lck7M71lpxxeElh8RDMI3I1tX+ud+I/0gRkt7zXhjxiA3LBYncBw6bg4+Ox5 DqppqNUPQrdRkXlXBFJg3alXF9JejbpNpbcX2dZe4K8hgPdqlIRIrO4te3LUvA/PMCac l0+sBDn2CBNaf84c7zzDEtKNnDa8gqjBkFLMQhJLxxEN8XWvcrcvVCCb3ku4s73Dvyvo 2g5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=Zhjn/740hPHp0WwVfXqByxUbBwNiWHoCSsY3H2xXKeg=; fh=xGT0L07ZRqOubRnjOcwGv0K2z3trOFJMqoFnxmAInVc=; b=SsBgWqV17JbQQJndDjvUHoQTkqqpRcSGDu3JOtfSJPEktWG0RNZFxq7QWMpY97li1a ap2bzrnzBRMUTr+b/6X/j8gxMO1XiDgFKhfxb446MliN8kxUaGxE+VkQCXBjAEbIOSZ8 y8jtgPnBb+S5yoQ8YO29/99tq1dAmljvBC1H03ZNvu6McA8cgv8ajG2miY7stlHweoNB 551bG6pZg12yIzG1uhkpSbOPpo8XHfzFs0Jl8BMJVsRyFOzQ/9aAXpOUczGDyYDjUFLz nsBDWayHfPPWZySCV3wV4rWgL6hbgyY1BglLBU35AhgCKP+1TRRxiSRLVJi2Trs/Rxpk 7+vA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id r131-20020a632b89000000b00573f837821fsi9384284pgr.689.2023.09.19.04.38.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Sep 2023 04:38:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 51F538053617; Tue, 19 Sep 2023 04:26:32 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230010AbjISL0Z (ORCPT + 99 others); Tue, 19 Sep 2023 07:26:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43736 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229497AbjISL0X (ORCPT ); Tue, 19 Sep 2023 07:26:23 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id C62B9ED for ; Tue, 19 Sep 2023 04:26:17 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id CECA51FB; Tue, 19 Sep 2023 04:26:54 -0700 (PDT) Received: from [10.1.36.155] (e126864.cambridge.arm.com [10.1.36.155]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E62923F67D; Tue, 19 Sep 2023 04:26:14 -0700 (PDT) Message-ID: Date: Tue, 19 Sep 2023 12:26:06 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.15.0 Subject: Re: [PATCH 1/3] KVM: arm64: Configure HCRX_EL2 dynamically Content-Language: en-US To: Marc Zyngier Cc: kvmarm@lists.linux.dev, linux-arm-kernel@lists.infradead.org, Oliver Upton , James Morse , Suzuki K Poulose , Zenghui Yu , Catalin Marinas , Will Deacon , Vladimir Murzin , Colton Lewis , linux-kernel@vger.kernel.org References: <20230915124840.474888-1-kristina.martsenko@arm.com> <20230915124840.474888-2-kristina.martsenko@arm.com> <865y47enz2.wl-maz@kernel.org> From: Kristina Martsenko In-Reply-To: <865y47enz2.wl-maz@kernel.org> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.2 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Tue, 19 Sep 2023 04:26:32 -0700 (PDT) On 18/09/2023 12:10, Marc Zyngier wrote: > Hi Kristina, Hi Marc, > On Fri, 15 Sep 2023 13:48:38 +0100, > Kristina Martsenko wrote: >> >> At the moment the HCRX_EL2 system register is always initialized to >> HCRX_GUEST_FLAGS when running a guest. Instead, choose the configuration >> at vcpu reset time and save it in the vcpu struct, similarly to how >> HCR_EL2 is set up. This will be needed in a subsequent change to >> configure the register based on CPU features detected at runtime. >> >> Signed-off-by: Kristina Martsenko >> --- >> arch/arm64/include/asm/kvm_emulate.h | 5 +++++ >> arch/arm64/include/asm/kvm_host.h | 1 + >> arch/arm64/kvm/arm.c | 1 + >> arch/arm64/kvm/hyp/include/hyp/switch.h | 2 +- >> arch/arm64/kvm/hyp/nvhe/hyp-main.c | 1 + >> arch/arm64/kvm/hyp/nvhe/pkvm.c | 1 + >> 6 files changed, 10 insertions(+), 1 deletion(-) >> >> diff --git a/arch/arm64/include/asm/kvm_emulate.h b/arch/arm64/include/asm/kvm_emulate.h >> index 3d6725ff0bf6..64ea27e6deb1 100644 >> --- a/arch/arm64/include/asm/kvm_emulate.h >> +++ b/arch/arm64/include/asm/kvm_emulate.h >> @@ -134,6 +134,11 @@ static inline void vcpu_ptrauth_disable(struct kvm_vcpu *vcpu) >> vcpu->arch.hcr_el2 &= ~(HCR_API | HCR_APK); >> } >> >> +static inline void vcpu_reset_hcrx(struct kvm_vcpu *vcpu) >> +{ >> + vcpu->arch.hcrx_el2 = HCRX_GUEST_FLAGS; >> +} >> + >> static inline unsigned long vcpu_get_vsesr(struct kvm_vcpu *vcpu) >> { >> return vcpu->arch.vsesr_el2; >> diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h >> index af06ccb7ee34..2764748756a7 100644 >> --- a/arch/arm64/include/asm/kvm_host.h >> +++ b/arch/arm64/include/asm/kvm_host.h >> @@ -487,6 +487,7 @@ struct kvm_vcpu_arch { >> >> /* Values of trap registers for the guest. */ >> u64 hcr_el2; >> + u64 hcrx_el2; > > Do we really need this extra field? Yes, this is only an extra 64bit, > but they tend to accumulate... > > Looking at patch #3, the change is related to this: > > vcpu->arch.hcrx_el2 = HCRX_GUEST_FLAGS; > + > + if (cpus_have_final_cap(ARM64_HAS_MOPS)) { > + vcpu->arch.hcrx_el2 |= HCRX_EL2_MSCEn; > + vcpu->arch.hcrx_el2 |= HCRX_EL2_MCE2; > + } > > meaning that this is a constant value for a given boot of the host. > > At this stage, I'd rather you define HCRX_GUEST_FLAGS as: > > #define HCRX_GUEST_FLAGS \ > (HCRX_EL2_SMPME | HCRX_EL2_TCR2En | \ > cpus_have_final_cap(ARM64_HAS_MOPS) ? \ > (HCRX_EL2_MSCEn | HCRX_EL2_MCE2) : 0) > > and drop the new field altogether, until we have something that > requires dynamic flipping of an HCRX_EL2 field. Makes sense, the field isn't strictly required yet, I'll drop it in v2. Thanks, Kristina