From patchwork Thu Jun 9 14:17:31 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 1641273 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=KShnHfmO; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=Wf7AUsBW; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4LJmQz66sTz9s5V for ; Fri, 10 Jun 2022 00:18:19 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=9gC0EelLM8rPMNvhibCaZaM40nukhclcWVL58aEvw4s=; b=KShnHfmO3f7RHa aIZh7D6Z/PQmzLl12KMBW9EhsgwoNeBfLaKLUe/Xr13z8wYknCqhlRTnJnC2+BC3Xzk+7BkeOKuUF v6jL66fQSUIl3TmBD7yw+BTocf52vLOnkN7lOdfTxi20vydoPKtQEUaRI4C5XBClVyxeLV5EjhlU4 zQ70JlpRVLFr87/pk4ZefkErObTYsUHU2gEsumDT5yWLLZvxp/K4rhfmz8fBwUQ4mQkbOTPluV7Tb n0zMwgMNHvRmlqrGqy6dPzLmdKFfi+ylj6k+BqDBRFgYYA3/NKHOkSL07fEkqtHaHvwl410n5AtzG 5mvihZ6wN9By2JUHq8/A==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nzIz1-002S03-74; Thu, 09 Jun 2022 14:17:59 +0000 Received: from ams.source.kernel.org ([145.40.68.75]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nzIyw-002Rxz-Js for linux-arm-kernel@lists.infradead.org; Thu, 09 Jun 2022 14:17:56 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 6B279B82DFC; Thu, 9 Jun 2022 14:17:52 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 29A53C34114; Thu, 9 Jun 2022 14:17:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1654784271; bh=kJkLKSYMhSBwA9NtLKwJ+0pfq4+7mhggk7YAmP0J9Mc=; h=From:To:Cc:Subject:Date:From; b=Wf7AUsBWT3hqYpXrvTnOKNI6Qub1Ehc3Yd0iwDD/j0zOm2blaHob+b5Uakqs1rBHp LtmkXZQ6ObaXZ/VQGfTi4JjCdMob/VU892p7oZEtOPveP+Lkq7RVxK1IfhStH0C/oC +E5j6Xd12e1Lj02VmYmsdN37h9Y5dmoUoqWuEIFXIOEXowQGYRjaBjrnWlGK9XffL0 5J2mrN+KlZHPets+bNCklX1kAWL3KkmlPaNL4GR/VvBbFRL0w5aOcJqSXMRGWql07r tNXeQ2P1k/E06+WTQnl6YSBOuR++3FMQHYfjo5MFqIrkio/5EhZpq2Ps0vGKn0PfBc MK7XdgSLB4ZlQ== Received: from sofa.misterjones.org ([185.219.108.64] helo=why.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1nzIyq-00Gtbd-Lw; Thu, 09 Jun 2022 15:17:48 +0100 From: Marc Zyngier To: Paolo Bonzini Cc: Alexandru Elisei , David Brazdil , Eric Auger , Mark Brown , Mark Rutland , sunliming , Will Deacon , James Morse , Suzuki K Poulose , Oliver Upton , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] KVM/arm64 fixes for 5.19, take #1 Date: Thu, 9 Jun 2022 15:17:31 +0100 Message-Id: <20220609141731.1197304-1-maz@kernel.org> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pbonzini@redhat.com, alexandru.elisei@arm.com, dbrazdil@google.com, eric.auger@redhat.com, broonie@kernel.org, mark.rutland@arm.com, sunliming@kylinos.cn, will@kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, oupton@google.com, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, kernel-team@android.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220609_071755_016680_6074E5FD X-CRM114-Status: GOOD ( 15.13 ) X-Spam-Score: -5.4 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Paolo, Here's the first set of fixes for 5.19. Nothing major (one fix for the GICv2 emulation, one for the embryonic protected VM support), the rest being a bunch of small scale cleanup that I have decided t [...] Content analysis details: (-5.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [145.40.68.75 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.2 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Paolo, Here's the first set of fixes for 5.19. Nothing major (one fix for the GICv2 emulation, one for the embryonic protected VM support), the rest being a bunch of small scale cleanup that I have decided to take now rather than leaving them for later. Please pull, M. The following changes since commit f2906aa863381afb0015a9eb7fefad885d4e5a56: Linux 5.19-rc1 (2022-06-05 17:18:54 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-5.19-1 for you to fetch changes up to bcbfb588cf323929ac46767dd14e392016bbce04: KVM: arm64: Drop stale comment (2022-06-09 13:24:02 +0100) ---------------------------------------------------------------- KVM/arm64 fixes for 5.19, take #1 - Properly reset the SVE/SME flags on vcpu load - Fix a vgic-v2 regression regarding accessing the pending state of a HW interrupt from userspace (and make the code common with vgic-v3) - Fix access to the idreg range for protected guests - Ignore 'kvm-arm.mode=protected' when using VHE - Return an error from kvm_arch_init_vm() on allocation failure - A bunch of small cleanups (comments, annotations, indentation) ---------------------------------------------------------------- Marc Zyngier (7): KVM: arm64: Always start with clearing SVE flag on load KVM: arm64: Always start with clearing SME flag on load KVM: arm64: Don't read a HW interrupt pending state in user context KVM: arm64: Replace vgic_v3_uaccess_read_pending with vgic_uaccess_read_pending KVM: arm64: Warn if accessing timer pending state outside of vcpu context KVM: arm64: Handle all ID registers trapped for a protected VM KVM: arm64: Drop stale comment Will Deacon (4): KVM: arm64: Return error from kvm_arch_init_vm() on allocation failure KVM: arm64: Ignore 'kvm-arm.mode=protected' when using VHE KVM: arm64: Extend comment in has_vhe() KVM: arm64: Remove redundant hyp_assert_lock_held() assertions sunliming (1): KVM: arm64: Fix inconsistent indenting Documentation/admin-guide/kernel-parameters.txt | 1 - arch/arm64/include/asm/kvm_host.h | 5 --- arch/arm64/include/asm/virt.h | 3 ++ arch/arm64/kernel/cpufeature.c | 10 +----- arch/arm64/kvm/arch_timer.c | 3 ++ arch/arm64/kvm/arm.c | 10 ++++-- arch/arm64/kvm/fpsimd.c | 2 ++ arch/arm64/kvm/hyp/nvhe/mem_protect.c | 4 --- arch/arm64/kvm/hyp/nvhe/sys_regs.c | 42 ++++++++++++++++++++----- arch/arm64/kvm/vgic/vgic-mmio-v2.c | 4 +-- arch/arm64/kvm/vgic/vgic-mmio-v3.c | 40 ++--------------------- arch/arm64/kvm/vgic/vgic-mmio.c | 40 ++++++++++++++++++++--- arch/arm64/kvm/vgic/vgic-mmio.h | 3 ++ arch/arm64/kvm/vmid.c | 2 +- 14 files changed, 95 insertions(+), 74 deletions(-)