This patch series enable userspace writable for below idregs: ID_AA64DFR0_EL1, ID_DFR0_EL1, ID_AA64PFR0_EL1, ID_AA64MMFR{0, 1, 2, 3}_EL1. A vm ioctl is added to get feature ID register writable masks from userspace. A selftest is added to verify that KVM handles the writings from user space correctly. A relevant patch from Oliver is picked from [3]. It is based on v6.5-rc4 which contains infrastructure for writable idregs. --- * v6 -> v7 - Rebase on v6.5-rc4. - Add a vm ioctl to get feature ID register writable masks from userspace. - Split the change for debug version in ID_{AA64}DFR0_EL1. - Addressed some bugs in selftest. * v5 -> v6 - Override the type of field AA64DFR0_EL1_DebugVer to be FTR_LOWER_SAFE by the discussion of Oliver and Suraj. * v4 -> v5 - Rebase on v6.5-rc1 which contains infrastructure for writable idregs. - Use guest ID registers values for the sake of emulation. - Added a selftest to verify idreg userspace writing. * v3 -> v4 - Rebase on v11 of writable idregs series at [2]. * v2 -> v3 - Rebase on v6 of writable idregs series. - Enable writable for ID_AA64PFR0_EL1 and ID_AA64MMFR{0, 1, 2}_EL1. * v1 -> v2 - Rebase on latest patch series [1] of enabling writable ID register. [1] https://lore.kernel.org/all/20230402183735.3011540-1-jingzhangos@xxxxxxxxxx [2] https://lore.kernel.org/all/20230602005118.2899664-1-jingzhangos@xxxxxxxxxx [3] https://lore.kernel.org/kvmarm/20230623205232.2837077-1-oliver.upton@xxxxxxxxx [v1] https://lore.kernel.org/all/20230326011950.405749-1-jingzhangos@xxxxxxxxxx [v2] https://lore.kernel.org/all/20230403003723.3199828-1-jingzhangos@xxxxxxxxxx [v3] https://lore.kernel.org/all/20230405172146.297208-1-jingzhangos@xxxxxxxxxx [v4] https://lore.kernel.org/all/20230607194554.87359-1-jingzhangos@xxxxxxxxxx [v5] https://lore.kernel.org/all/20230710192430.1992246-1-jingzhangos@xxxxxxxxxx [v6] https://lore.kernel.org/all/20230718164522.3498236-1-jingzhangos@xxxxxxxxxx --- Jing Zhang (8): KVM: arm64: Allow userspace to get the writable masks for feature ID registers KVM: arm64: Document KVM_ARM_GET_FEATURE_ID_WRITABLE_MASKS KVM: arm64: Use guest ID register values for the sake of emulation KVM: arm64: Enable writable for ID_AA64DFR0_EL1 and ID_DFR0_EL1 KVM: arm64: Enable writable for ID_AA64PFR0_EL1 KVM: arm64: Refactor helper Macros for idreg desc KVM: arm64: Enable writable for ID_AA64MMFR{0, 1, 2, 3}_EL1 KVM: arm64: selftests: Test for setting ID register from usersapce Oliver Upton (2): KVM: arm64: Reject attempts to set invalid debug arch version KVM: arm64: Bump up the default KVM sanitised debug version to v8p8 Documentation/virt/kvm/api.rst | 26 +++ arch/arm64/include/asm/kvm_host.h | 2 + arch/arm64/include/uapi/asm/kvm.h | 25 +++ arch/arm64/kvm/arm.c | 3 + arch/arm64/kvm/sys_regs.c | 191 ++++++++++++------ include/uapi/linux/kvm.h | 2 + tools/arch/arm64/include/uapi/asm/kvm.h | 25 +++ tools/include/uapi/linux/kvm.h | 2 + tools/testing/selftests/kvm/Makefile | 1 + .../selftests/kvm/aarch64/set_id_regs.c | 191 ++++++++++++++++++ 10 files changed, 408 insertions(+), 60 deletions(-) create mode 100644 tools/testing/selftests/kvm/aarch64/set_id_regs.c base-commit: 5d0c230f1de8c7515b6567d9afba1f196fb4e2f4 -- 2.41.0.585.gd2178a4bd4-goog