From patchwork Fri Oct 15 08:42:45 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 1541519 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=RQqsiQSp; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4HW0q40nhRz9sR4 for ; Fri, 15 Oct 2021 20:10:24 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=mg6ywbJZeJTNITuxKVz8bwUETQ7Epq4BpFFI32z/teQ=; b=RQqsiQSpHka6J/ r2PStclRUK1Mfx3qPvVuGgktJ+YS9IzOMFf19ApbyRe35QEYeQKKsFlNRopByLTCBScnFtVZVU+W3 rTPjdI2Sol5oNbuvZPgaYTU9GP/D50RumtG5Sua0O8XG3/WsKrEHmdTYRh5qA/Ixpz+D7+QFcw/jv wAvqbTet2fE4K3uL7Ht4ttQvRDRjuNxGf5fu2S6CkIPLm6gcLLxE5C71L38pt/xuc1/E9tk2E48yP vvuc0wtZNLMZJApzrBpkNlV1HQlhzZ3KTEVXXzHiS1j3eMUKogb/Y5f2tCRTBEuyT+5ZjDhPQOO26 QZXNTtmQSnCulTMwCnFQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1mbJDj-006AyH-U0; Fri, 15 Oct 2021 09:09:44 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1mbIo4-0063vJ-8c for linux-arm-kernel@lists.infradead.org; Fri, 15 Oct 2021 08:43:13 +0000 Received: from disco-boy.misterjones.org (disco-boy.misterjones.org [51.254.78.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E42AF60FC3; Fri, 15 Oct 2021 08:43:11 +0000 (UTC) Received: from sofa.misterjones.org ([185.219.108.64] helo=why.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1mbIo1-00GuxM-R3; Fri, 15 Oct 2021 09:43:09 +0100 From: Marc Zyngier To: Paolo Bonzini Cc: Quentin Perret , Will Deacon , James Morse , Suzuki K Poulose , Alexandru Elisei , linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, kernel-team@android.com Subject: [GIT PULL] KVM/arm64 fixes for 5.15, take #2 Date: Fri, 15 Oct 2021 09:42:45 +0100 Message-Id: <20211015084245.2994276-1-maz@kernel.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pbonzini@redhat.com, qperret@google.com, will@kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, alexandru.elisei@arm.com, linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, kernel-team@android.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20211015_014312_368104_E715ECA1 X-CRM114-Status: GOOD ( 10.07 ) X-Spam-Score: -5.0 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Paolo, Another couple of fixes for KVM/arm64: a fix for a stage-2 refcounting issue, and an error handling howler affecting MTE, all thanks to Quentin. Please pull, Content analysis details: (-5.0 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [198.145.29.99 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Paolo, Another couple of fixes for KVM/arm64: a fix for a stage-2 refcounting issue, and an error handling howler affecting MTE, all thanks to Quentin. Please pull, M. The following changes since commit e840f42a49925707fca90e6c7a4095118fdb8c4d: KVM: arm64: Fix PMU probe ordering (2021-09-20 12:43:34 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-5.15-2 for you to fetch changes up to 6e6a8ef088e1222cb1250942f51ad9c1ab219ab2: KVM: arm64: Release mmap_lock when using VM_SHARED with MTE (2021-10-05 13:22:45 +0100) ---------------------------------------------------------------- KVM/arm64 fixes for 5.15, take #2 - Properly refcount pages used as a concatenated stage-2 PGD - Fix missing unlock when detecting the use of MTE+VM_SHARED ---------------------------------------------------------------- Quentin Perret (3): KVM: arm64: Fix host stage-2 PGD refcount KVM: arm64: Report corrupted refcount at EL2 KVM: arm64: Release mmap_lock when using VM_SHARED with MTE arch/arm64/kvm/hyp/include/nvhe/gfp.h | 1 + arch/arm64/kvm/hyp/nvhe/mem_protect.c | 13 ++++++++++++- arch/arm64/kvm/hyp/nvhe/page_alloc.c | 15 +++++++++++++++ arch/arm64/kvm/mmu.c | 6 ++++-- 4 files changed, 32 insertions(+), 3 deletions(-)