From patchwork Sun Jan 29 19:01:42 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 1733640 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=HFC9SAr6; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=PV/JZF/q; dkim-atps=neutral Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4P4gfs10sYz23dQ for ; Mon, 30 Jan 2023 06:02:29 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=nBewhEnMevXmydlZmEL7wzkhe0l39DdOqFZw3I2jKw0=; b=HFC9SAr6GHy5jt eD8dg6SkDo5FkHtX/Q1NqJshFyTPQ+OxpYlcEyYSWn91g/mVEdV11Mm3Y7e/tyoJ+p6tK1oEZ4n++ iG6fWN8QjZgq46U9/EUosWgWkW/dSqeqvtlAcyCCS/IVVIuTkiCwhDEt8foao5rdGifxsOkc09cX1 960ud36MNwusPNmt+eOiTudOeX48zg0AmqJnT+Hl4rPwl5vu6QgwjWIDK/7ezDaJiePuNKnYvi/2Q ND6BLtLkC313JU8H4XF6Z1nugkzr636CEu0J/71t61qV/8ffVHlWkYRXRKzR3vW1j9RBiVEl2ChCv fFzNDOQ81IrL287tSYeg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1pMCwK-001pv3-HR; Sun, 29 Jan 2023 19:02:08 +0000 Received: from dfw.source.kernel.org ([139.178.84.217]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1pMCwH-001pu6-Co for linux-arm-kernel@lists.infradead.org; Sun, 29 Jan 2023 19:02:06 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9546F60DFB; Sun, 29 Jan 2023 19:01:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 057AAC433D2; Sun, 29 Jan 2023 19:01:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1675018919; bh=YnpKJqKcLnIwJIkX7NoOfZ/16Cr2rgVctiBXbHOFcx0=; h=From:To:Cc:Subject:Date:From; b=PV/JZF/q5kNb0JtHeSXCmk3eV8BMA/So5Lehm0SyjuJ6vGganDjWN0+OkR7PW5uVJ 1MMb0zKUEhm1ZpEp5IdZhXiJkEafW3hSDo+MG1c3/b5nfFz5eFdNzj9wYSDIEE4ake 9MV/tjmqQ8Yz+7H2DmZEu+byP2AXeyZ9UB8oZyMF0Q7OHdBB4cm86PZYeiR2VAB5g9 +lXAN/DsYPc7CezuCBeQsY1zC10ENSGjLGqt9OfNtKP8hrcb+r2Eo3Z1KN0UYRpuNN NaAO7KB6V9HL6+A65NQWeGCWYqIMq91h8+Nl8nOJfLBwca6PWJ0j0C6I7wY80r6ODs BpDC0kgf2eegg== Received: from sofa.misterjones.org ([185.219.108.64] helo=valley-girl.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1pMCw8-005edw-Ru; Sun, 29 Jan 2023 19:01:57 +0000 From: Marc Zyngier To: Paolo Bonzini Cc: Gavin Shan , Oliver Upton , Ricardo Koller , Zenghui Yu , James Morse , Suzuki K Poulose , kvmarm@lists.linux.dev, kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: [GIT PULL] kvm/arm64 fixes for 6.2, take #3 Date: Sun, 29 Jan 2023 19:01:42 +0000 Message-Id: <20230129190142.2481354-1-maz@kernel.org> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pbonzini@redhat.com, gshan@redhat.com, oliver.upton@linux.dev, ricarkol@google.com, yuzenghui@huawei.com, james.morse@arm.com, suzuki.poulose@arm.com, kvmarm@lists.linux.dev, kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20230129_110205_530235_9995F5B8 X-CRM114-Status: GOOD ( 13.94 ) X-Spam-Score: -5.4 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Paolo, Here's the (hopefully) last batch of fixes for KVM/arm64 on 6.2. The really important one addresses yet another non-CPU access to the vgic memory, which needs to be suitably identified to avoid genera [...] Content analysis details: (-5.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [139.178.84.217 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.2 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Paolo, Here's the (hopefully) last batch of fixes for KVM/arm64 on 6.2. The really important one addresses yet another non-CPU access to the vgic memory, which needs to be suitably identified to avoid generating a scary warning. The second half of the series fixes a bunch of page-table walk tests after the kernel fix that went in earlier in 6.2. Please pull, M. The following changes since commit ef3691683d7bfd0a2acf48812e4ffe894f10bfa8: KVM: arm64: GICv4.1: Fix race with doorbell on VPE activation/deactivation (2023-01-21 11:02:19 +0000) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-6.2-3 for you to fetch changes up to 08ddbbdf0b55839ca93a12677a30a1ef24634969: KVM: selftests: aarch64: Test read-only PT memory regions (2023-01-29 18:49:08 +0000) ---------------------------------------------------------------- KVM/arm64 fixes for 6.2, take #3 - Yet another fix for non-CPU accesses to the memory backing the VGICv3 subsystem - A set of fixes for the setlftest checking for the S1PTW behaviour after the fix that went in ealier in the cycle ---------------------------------------------------------------- Gavin Shan (3): KVM: arm64: Add helper vgic_write_guest_lock() KVM: arm64: Allow no running vcpu on restoring vgic3 LPI pending status KVM: arm64: Allow no running vcpu on saving vgic3 pending table Ricardo Koller (4): KVM: selftests: aarch64: Relax userfaultfd read vs. write checks KVM: selftests: aarch64: Do not default to dirty PTE pages on all S1PTWs KVM: selftests: aarch64: Fix check of dirty log PT write KVM: selftests: aarch64: Test read-only PT memory regions Documentation/virt/kvm/api.rst | 10 +- arch/arm64/kvm/vgic/vgic-its.c | 13 +- arch/arm64/kvm/vgic/vgic-v3.c | 4 +- arch/arm64/kvm/vgic/vgic.h | 14 ++ include/kvm/arm_vgic.h | 2 +- .../selftests/kvm/aarch64/page_fault_test.c | 187 ++++++++++++--------- 6 files changed, 132 insertions(+), 98 deletions(-)