From patchwork Fri Nov 12 15:37:22 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 1554474 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=xflxCj4v; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4HrN5F6XSvz9sPf for ; Sat, 13 Nov 2021 02:37:53 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=ZkX1EvbLzoxbQizOQm4wIvYXJ6jEnfS30DoWlTFQpHo=; b=xflxCj4vJkYmOR Yr11CnewAXt1VWWk/65ZvGOmfNxMDa7tHEtbKrcWcy6Gmfn4S8WnfRw0O2Mx2jCjzQvCjOQPmmBBh yGv6u4iZTNNfY8DrOlERQcFGdeuzAqE+6Mq+EQhovRTZp7JP06HVKIet68hY12huJd0TwAPyPlPGH oBEhCX16Yk60g8pBYZ28mQL74004spkf/QEr9FYfm97R6stCY/eJISlONTQQ2xw9AspgrIbFDuaoQ M7wB4uwsa/pZ4/Lwv3nq9nwNj/yqxpZ7EXJwot2jpfYN8SCMPtaT2qnDJmWnG7pgbKxzTGIMK5sXL uNGChaWFNOnk+jVxKPBQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1mlYcP-00B7q2-Oo; Fri, 12 Nov 2021 15:37:34 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1mlYcK-00B7om-36 for linux-arm-kernel@lists.infradead.org; Fri, 12 Nov 2021 15:37:29 +0000 Received: from disco-boy.misterjones.org (disco-boy.misterjones.org [51.254.78.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D4A2A60F41; Fri, 12 Nov 2021 15:37:27 +0000 (UTC) Received: from sofa.misterjones.org ([185.219.108.64] helo=why.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1mlYcH-0053Av-KL; Fri, 12 Nov 2021 15:37:25 +0000 From: Marc Zyngier To: Paolo Bonzini Cc: Alexandru Elisei , Catalin Marinas , Fuad Tabba , James Morse , Mark Rutland , Quentin Perret , Randy Dunlap , Suzuki K Poulose , Will Deacon , YueHaibing , kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org Subject: [GIT PULL] KVM/arm64 fixes for 5.16, take #1 Date: Fri, 12 Nov 2021 15:37:22 +0000 Message-Id: <20211112153722.4010408-1-maz@kernel.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pbonzini@redhat.com, alexandru.elisei@arm.com, catalin.marinas@arm.com, tabba@google.com, james.morse@arm.com, mark.rutland@arm.com, qperret@google.com, rdunlap@infradead.org, suzuki.poulose@arm.com, will@kernel.org, yuehaibing@huawei.com, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20211112_073728_191444_FB5C17A1 X-CRM114-Status: GOOD ( 13.48 ) X-Spam-Score: -5.0 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: [this went out as a series instead of a PR yesterday, my bad] Paolo, Here's the first set of fixes for 5.16. The main items are a fix for a host S2 issue for protected VM, as well as a correctness fix when extracting the exception class from assembly code. The rest is [...] Content analysis details: (-5.0 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [198.145.29.99 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org [this went out as a series instead of a PR yesterday, my bad] Paolo, Here's the first set of fixes for 5.16. The main items are a fix for a host S2 issue for protected VM, as well as a correctness fix when extracting the exception class from assembly code. The rest is strictly cosmetic. Please pull, M. The following changes since commit 5a2acbbb0179a7ffbb5440b9fa46689f619705ac: Merge branch kvm/selftests/memslot into kvmarm-master/next (2021-10-21 11:40:03 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-5.16-1 for you to fetch changes up to 50a8d3315960c74095c59e204db44abd937d4b5d: KVM: arm64: Fix host stage-2 finalization (2021-11-08 18:07:48 +0000) ---------------------------------------------------------------- KVM/arm64 fixes for 5.16, take #1 - Fix the host S2 finalization by solely iterating over the memblocks instead of the whole IPA space - Tighten the return value of kvm_vcpu_preferred_target() now that 32bit support is long gone - Make sure the extraction of ESR_ELx.EC is limited to the architected bits - Comment fixups ---------------------------------------------------------------- Mark Rutland (1): KVM: arm64: Extract ESR_ELx.EC only Quentin Perret (1): KVM: arm64: Fix host stage-2 finalization Randy Dunlap (1): KVM: arm64: nvhe: Fix a non-kernel-doc comment YueHaibing (1): KVM: arm64: Change the return type of kvm_vcpu_preferred_target() arch/arm64/include/asm/esr.h | 1 + arch/arm64/include/asm/kvm_host.h | 2 +- arch/arm64/kvm/arm.c | 5 +---- arch/arm64/kvm/guest.c | 7 +------ arch/arm64/kvm/hyp/hyp-entry.S | 2 +- arch/arm64/kvm/hyp/nvhe/host.S | 2 +- arch/arm64/kvm/hyp/nvhe/setup.c | 14 ++++++++++++-- arch/arm64/kvm/hyp/nvhe/sys_regs.c | 2 +- 8 files changed, 19 insertions(+), 16 deletions(-)