From patchwork Thu Dec 12 17:28:16 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 1208692 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=198.137.202.133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="kghbLRme"; dkim-atps=neutral Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 47Ygks4zm3z9sRH for ; Fri, 13 Dec 2019 04:28:53 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:To :From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=6QD/EC7cnY69wvOWUEtJOZo8vI/MYTZwfujfZDUs4F8=; b=kghbLRmeVacxoA LePvlRHmIQhyLtCZhK0T67SXwl9AAzsbixBRzEn9QV9SpyIo4RuhQFRlXsVHYZWyp1+zeiPagyWoc a0Nea6rVoaLDUr9dI7bNuzd7gsNLaBcH4+mM3ZCE6OAKsljwVolF7DvPeOL2EdLGfQSKCYVzJHgzd ucbkpX/uzWiutuWn0TvoHS1EVuUHjAfgRV7k0IFISg04fXX1cmr06EEDKxjGCiniD1lY70MMgx7Pl G81Yhf/swh75T5r4CGsFkOEFJ30TwgJljtSP0Z7o6G9KGpk/HFBPhMMqdfV9zrZPLwllq4/uLR5Lh Fusf67Q6NJ5P0OR4cYaw==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1ifSGh-0005DB-GG; Thu, 12 Dec 2019 17:28:51 +0000 Received: from inca-roads.misterjones.org ([213.251.177.50]) by bombadil.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1ifSGe-00059t-KI for linux-arm-kernel@lists.infradead.org; Thu, 12 Dec 2019 17:28:50 +0000 Received: from 78.163-31-62.static.virginmediabusiness.co.uk ([62.31.163.78] helo=why.lan) by cheepnis.misterjones.org with esmtpsa (TLSv1.2:DHE-RSA-AES128-GCM-SHA256:128) (Exim 4.80) (envelope-from ) id 1ifSGU-00069s-N1; Thu, 12 Dec 2019 18:28:38 +0100 From: Marc Zyngier To: Paolo Bonzini , =?utf-8?b?UmFkaW0gS3LEjW3DocWZ?= Subject: [GIT PULL] KVM/arm updates for 5.5-rc2 Date: Thu, 12 Dec 2019 17:28:16 +0000 Message-Id: <20191212172824.11523-1-maz@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 X-SA-Exim-Connect-IP: 62.31.163.78 X-SA-Exim-Rcpt-To: pbonzini@redhat.com, rkrcmar@redhat.com, alexandru.elisei@arm.com, ard.biesheuvel@linaro.org, christoffer.dall@arm.com, eric.auger@redhat.com, james.morse@arm.com, justin.he@arm.com, mark.rutland@arm.com, linmiaohe@huawei.com, steven.price@arm.com, will@kernel.org, kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, julien.thierry.kdev@gmail.com, suzuki.poulose@arm.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on cheepnis.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20191212_092848_811027_DA107787 X-CRM114-Status: UNSURE ( 9.10 ) X-CRM114-Notice: Please train this message. X-Spam-Score: 1.0 (+) X-Spam-Report: SpamAssassin version 3.4.2 on bombadil.infradead.org summary: Content analysis details: (1.0 points) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record 1.0 SPF_SOFTFAIL SPF: sender does not match SPF record (softfail) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Mark Rutland , Miaohe Lin , Jia He , kvm@vger.kernel.org, Ard Biesheuvel , Will Deacon , Suzuki K Poulose , Christoffer Dall , Steven Price , Eric Auger , James Morse , Julien Thierry , Alexandru Elisei , kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Paolo, Radim, This is the first set of fixes for 5.5-rc2. This time around, a couple of MM fixes, a ONE_REG fix for an issue detected by GCC-10, and a handful of cleanups. Please pull, M. The following changes since commit cd7056ae34af0e9424da97bbc7d2b38246ba8a2c: Merge remote-tracking branch 'kvmarm/misc-5.5' into kvmarm/next (2019-11-08 11:27:29 +0000) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-5.5-1 for you to fetch changes up to 6d674e28f642e3ff676fbae2d8d1b872814d32b6: KVM: arm/arm64: Properly handle faulting of device mappings (2019-12-12 16:22:40 +0000) ---------------------------------------------------------------- KVM/arm fixes for .5.5, take #1 - Fix uninitialised sysreg accessor - Fix handling of demand-paged device mappings - Stop spamming the console on IMPDEF sysregs - Relax mappings of writable memslots - Assorted cleanups ---------------------------------------------------------------- Jia He (1): KVM: arm/arm64: Remove excessive permission check in kvm_arch_prepare_memory_region Marc Zyngier (1): KVM: arm/arm64: Properly handle faulting of device mappings Mark Rutland (2): KVM: arm64: Sanely ratelimit sysreg messages KVM: arm64: Don't log IMP DEF sysreg traps Miaohe Lin (3): KVM: arm/arm64: Get rid of unused arg in cpu_init_hyp_mode() KVM: arm/arm64: vgic: Fix potential double free dist->spis in __kvm_vgic_destroy() KVM: arm/arm64: vgic: Use wrapper function to lock/unlock all vcpus in kvm_vgic_create() Will Deacon (1): KVM: arm64: Ensure 'params' is initialised when looking up sys register arch/arm64/kvm/sys_regs.c | 25 ++++++++++++++++++------- arch/arm64/kvm/sys_regs.h | 17 +++++++++++++++-- virt/kvm/arm/arm.c | 4 ++-- virt/kvm/arm/mmu.c | 30 +++++++++++++++++------------- virt/kvm/arm/vgic/vgic-init.c | 20 +++++--------------- 5 files changed, 57 insertions(+), 39 deletions(-)