From patchwork Fri Jan 28 10:12:45 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 1585597 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=Djz6pvne; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=kM7yLy8T; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4JlYFH5WLTz9sPC for ; Fri, 28 Jan 2022 21:13:23 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=DrZW02U+OBiH2hVAy/xgxgmpFOF7oTk4IEqp/59QC+I=; b=Djz6pvneEyKPYx JzCczIzoQF5ePn+MLfw3abdVGhn3R0MKstTaV7kD0IF7DB7y/GBsBet3iJnIBxFnYBgV/yylAXG/8 bTSKHCW03ESebR8p2A5/frHhBMyN9pcqffYxWNJabMMdZq6bMfCmMrRUaFKMMpdleTGMoJmwlAzj7 uvD//P7oca3OxCxHPMREaOXLfD4BnbcbJJFKpO+9aov4EgyhUVzJXM/SY/ZaItITOLQQvswncbgVL txuJFGC0+wPrtwyk7364i+HoOuTVi0bGYiXKxSZ3rISOVCkTjR1lWfI2cvLewoVyqNvPhWuEHIi1C KWs8wEYwnGUmmtoozcbQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nDOFb-001P9l-6A; Fri, 28 Jan 2022 10:13:05 +0000 Received: from ams.source.kernel.org ([145.40.68.75]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nDOFR-001P7D-20 for linux-arm-kernel@lists.infradead.org; Fri, 28 Jan 2022 10:12:54 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 68DA4B82510; Fri, 28 Jan 2022 10:12:51 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 42C7AC340E0; Fri, 28 Jan 2022 10:12:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1643364770; bh=T5i4/kQaBQydnAWtJs7opQEEBq6cdMWHwVtmuP6KstY=; h=From:To:Cc:Subject:Date:From; b=kM7yLy8TwVxIh6xqn8sZrqpFr8k0o/hldx+H3eUQW0DWgiEjcdgibkfgor1x/SvmS ol0kYJ90x3TtZeOQ6YuyfIwN1ld1HFPzIpIDPh+NM5LwUL523mNJUR3f8eYKXt7RWA sjjOQs6ErhCyaB98dR8urr9H1A91sx1ZKJ6uh2hAGJuFXa3JOaHICRQ2C/7mvdbyLk ujcW7aGNfdizlliYiGW+YYWtbzWL7WNFkT5XBAO6BhLcWqQ/jcE/lwsVXUG8pSXF66 XUh6KXN88kgZhk6gyT+Numj5Ez7BDgBR/kM7s2KVCJcYJiblg6pz42iDT5eqPxrkAx YAoG9mX5NxD8Q== Received: from sofa.misterjones.org ([185.219.108.64] helo=why.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1nDOFM-003m9Q-6U; Fri, 28 Jan 2022 10:12:48 +0000 From: Marc Zyngier To: Paolo Bonzini Cc: Ard Biesheuvel , Fuad Tabba , Quentin Perret , James Morse , Suzuki K Poulose , Alexandru Elisei , linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, kernel-team@android.com Subject: [GIT PULL] KVM/arm64 fixes for 5.17, take #1 Date: Fri, 28 Jan 2022 10:12:45 +0000 Message-Id: <20220128101245.506715-1-maz@kernel.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pbonzini@redhat.com, ardb@kernel.org, tabba@google.com, qperret@google.com, james.morse@arm.com, suzuki.poulose@arm.com, alexandru.elisei@arm.com, linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, kernel-team@android.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220128_021253_323080_C4F87842 X-CRM114-Status: GOOD ( 12.91 ) X-Spam-Score: -5.4 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Paolo, Here's a small set of fixes for 5.17. Nothing stands out, just the usual set of bug fixes. There will be another series next week, but these patches need a bit of soak time. Please pull, Content analysis details: (-5.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [145.40.68.75 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.2 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Paolo, Here's a small set of fixes for 5.17. Nothing stands out, just the usual set of bug fixes. There will be another series next week, but these patches need a bit of soak time. Please pull, M. The following changes since commit 1c53a1ae36120997a82f936d044c71075852e521: Merge branch kvm-arm64/misc-5.17 into kvmarm-master/next (2022-01-04 17:16:15 +0000) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-5.17-1 for you to fetch changes up to 278583055a237270fac70518275ba877bf9e4013: KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE (2022-01-24 09:39:03 +0000) ---------------------------------------------------------------- KVM/arm64 fixes for 5.17, take #1 - Correctly update the shadow register on exception injection when running in nVHE mode - Correctly use the mm_ops indirection when performing cache invalidation from the page-table walker - Restrict the vgic-v3 workaround for SEIS to the two known broken implementations ---------------------------------------------------------------- Marc Zyngier (3): KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance KVM: arm64: vgic-v3: Restrict SEIS workaround to known broken systems KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE arch/arm64/kvm/hyp/exception.c | 5 ++++- arch/arm64/kvm/hyp/pgtable.c | 18 ++++++------------ arch/arm64/kvm/hyp/vgic-v3-sr.c | 3 +++ arch/arm64/kvm/vgic/vgic-v3.c | 17 +++++++++++++++-- 4 files changed, 28 insertions(+), 15 deletions(-)