Received: by 2002:ab2:6c55:0:b0:1fd:c486:4f03 with SMTP id v21csp170788lqp; Tue, 11 Jun 2024 19:38:54 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXcoxKQolrtbXQQxQ/SsUmmNAlk/vHCp1jGV9Ne7m+s7ddt6aebKSdq5qLP4tI3PjGMQy/SNBJ2eXnphnO2TpHQNMhMa6zHKm6QUd6Y3g== X-Google-Smtp-Source: AGHT+IH9V+dxrUChxJS2StV2W2s0eMw6FmTXuw+Gcd89AhjMoCfoNlyDuab3dTZjZFvutBVIXBLJ X-Received: by 2002:a05:6871:2885:b0:24c:5bd5:1934 with SMTP id 586e51a60fabf-25514e106f6mr598426fac.39.1718159934069; Tue, 11 Jun 2024 19:38:54 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718159934; cv=pass; d=google.com; s=arc-20160816; b=toT67PAdbvwf3pHg1u/BI3x9vYjGeGH6vASD+wNa3AF9xDU6tzqZMBNNcsL2gUZmNh aUB2Hk3n1844Ea5OGBDNC059vWlViPjLJPV1T6rZuXHyjd26t5yp8mUStCBEx4yNZYxu C12POHb3DcWTFDh7zXuwEVGXCyaWHz9kiG45992rDJRTb97i3feJRD06NOyy9cu/l3Gi JmyOCaww3k1YjllUroDvlGffxlOZ81hweKHa+RZENLEru8AeYWu1Gt6t6Pg69EShORvp XyMlC0dnlNx1amOPEcGsuTuFK7xKWYVu83VZ7UE5bPujvBNa9dawJ+kjradfE/LrifmE rQTw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=Skhula7518PMXu1UZDnu+UyfH0UgWPzNpluBrfVr+JQ=; fh=LuS0jaXT3hvE1JOM4g5182yWpDsiOyXVXmtj58MGGXI=; b=qKJA06FpS9wHVx7rQJgVLtAcdrggeaD4QAylpl3E/YX7usmZsAp1WLOiigMfgslZ2H INPCUD4TloeEfuWNqJ/xFn3i2wYSBVX0JVT+stqnZU1qksh4qO7gectr5e1e7A7Tnjjs CJzliGGvIJguhnBXoUIS5yudLYPUM/JKpFv68B3zTKKRjaBJRJAmWO1XqMu66cyYZPK6 Y7RtiG36ZZ6uwLgbd7Bkyt7YZxJluNggb3htLuPa0UCHTJfYv21n7dEqJq+mmlOyfTZF Wjf3htobQWO0fMmtmu0JS2p2YvRf8MWyQKsdlTYmHEcVjpihrtVc5BSdJry8qMO58CcT Uzhw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=QLXnRXNw; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-210830-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-210830-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id 41be03b00d2f7-6eab5e174dcsi5625714a12.728.2024.06.11.19.38.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Jun 2024 19:38:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-210830-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=QLXnRXNw; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-210830-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-210830-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 57B91B2310A for ; Wed, 12 Jun 2024 02:36:51 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2EF9D20DF7; Wed, 12 Jun 2024 02:36:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="QLXnRXNw" Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DF26C14AB4 for ; Wed, 12 Jun 2024 02:36:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.129.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718159778; cv=none; b=OvXJf/cKmUCi5/IJEh4QvsElCNg1nBQdx4Mc6DfL8tZ47G0dANrCBGJPUoOj/QidalthLuGj6xVeviYywJUJx4qlt2i3HKfC0F28lHrCgxyesiJFKMfkhS2MsnwoBrgRfzqvsVplHktB0OuuJzIEKVaLk//TcGNvefWL5YlPct4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718159778; c=relaxed/simple; bh=clWISYVP+y4RIgSGIBJSTDnPvfKxZ6zB5K37+T0yH4s=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=KIkziR6sBk5FM7gAO3MQwVMgmZwlohYSqQ80DKy6BIqZhNgqg6oeVnDRghQUzHO7NM3Ai5zcExOa4UZO0lg1aljmJMspWXOi/tGA6/c+u/LvEJybx+RliQVYjVfjVc77PQLUDZydoeTpkyisWOUC0qqchOE3Bz/H03moBdoTp1g= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=QLXnRXNw; arc=none smtp.client-ip=170.10.129.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1718159775; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Skhula7518PMXu1UZDnu+UyfH0UgWPzNpluBrfVr+JQ=; b=QLXnRXNwDII0UirK0DmqQXRvljBxfTOHqkSmC9YEqJ0Lj/ll7lDqjmAozkwigZRfKPXUnt MCc81Rqfm/tnTXMUtOU0DF5Vu5UJ9T1MLDXn1UP2LbPV3kwoJ3m8xK0wLITRPzbpBFtG4a UsqNfRYvosHEQ082QSVpJ+TF/Wumopk= Received: from mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-149-5a8JObh9M8incYscAze6kQ-1; Tue, 11 Jun 2024 22:36:08 -0400 X-MC-Unique: 5a8JObh9M8incYscAze6kQ-1 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 0564C19560AB; Wed, 12 Jun 2024 02:36:06 +0000 (UTC) Received: from virt-mtcollins-01.lab.eng.rdu2.redhat.com (virt-mtcollins-01.lab.eng.rdu2.redhat.com [10.8.1.196]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 6E96719560AF; Wed, 12 Jun 2024 02:36:03 +0000 (UTC) From: Shaoqin Huang To: Oliver Upton , Marc Zyngier , kvmarm@lists.linux.dev Cc: Eric Auger , Sebastian Ott , Cornelia Huck , Shaoqin Huang , James Morse , Suzuki K Poulose , Zenghui Yu , Catalin Marinas , Will Deacon , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH v1 1/2] KVM: arm64: Allow BT field in ID_AA64PFR1_EL1 writable Date: Tue, 11 Jun 2024 22:35:51 -0400 Message-Id: <20240612023553.127813-2-shahuang@redhat.com> In-Reply-To: <20240612023553.127813-1-shahuang@redhat.com> References: <20240612023553.127813-1-shahuang@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 When migrating from MtCollins to AmpereOne, the BT field value in ID_AA64PFR1_EL1 register is different and not writable. This causes the migration to fail. The BT field means Branch Target Identification mechanism support in AArch64 state. The value 0 means BT is not implemented, the value 1 means BT is implemented. On MtCollins(Migration Src), the BT value is 0. On AmpereOne(Migration Dst), the BT value is 1. As it defined in the ftr_id_aa64dfr0, the samller value is safe. So if we make the BT field writable, on the AmpereOne(Migration Dst) the BT field will be overrided with value 0. Signed-off-by: Shaoqin Huang --- But there is a question, the ARM DDI mentions from Armv8.5, the only permitted value is 0b01. Do you guys know if there are any consequence if the userspace write value 0b0 into this field? Or we should restrict that at some level, like in VMM or kernel level? --- arch/arm64/kvm/sys_regs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c index c9f4f387155f..8e0ea62e14e1 100644 --- a/arch/arm64/kvm/sys_regs.c +++ b/arch/arm64/kvm/sys_regs.c @@ -2292,7 +2292,7 @@ static const struct sys_reg_desc sys_reg_descs[] = { ID_AA64PFR0_EL1_GIC | ID_AA64PFR0_EL1_AdvSIMD | ID_AA64PFR0_EL1_FP), }, - ID_SANITISED(ID_AA64PFR1_EL1), + ID_WRITABLE(SYS_ID_AA64PFR1_EL1, ID_AA64PFR1_EL1_BT), ID_UNALLOCATED(4,2), ID_UNALLOCATED(4,3), ID_WRITABLE(ID_AA64ZFR0_EL1, ~ID_AA64ZFR0_EL1_RES0), -- 2.40.1