From patchwork Fri Apr 8 15:07:46 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 1614954 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=ePJjKoRO; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=OwUH05q+; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4KZhTK2pfkz9sFq for ; Sat, 9 Apr 2022 01:08:21 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=E0D/lZxxArNlksgDYPOlt5fDMMhOi6GuYKDOQEpWrOo=; b=ePJjKoROP3x+NC 6qM5gw5rpME6mLhKDp4g96s4XB6LOEhv/LpOoAdAyv3Trk1eDunSgkygbAXBTfriRIYLULTNw9LrW Ppx+lF7Tbv/sO2s91iUvbHHPBEJDEZAs2h7qS2L6WKi280Ky81xnfCvZ4UqRmDcUtCcUzrQpAq2sy IEOSiixTWSN2GqK4W8TEjIh2Ra8NVp83q7+B76CK3vBSkAKBe7oyVH6QqcQ+dABULsMIBiZAJg5T+ Ad5riuqMLCLmvPuQbqe3rFAJwWuxpWcZw/zl5K0qek7iJXtCb6J2kKPZvThzFSiazpd6bU4x39YKd S3XiFMO41PkgpFfUk8Og==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1ncqDN-000AWg-SE; Fri, 08 Apr 2022 15:07:57 +0000 Received: from dfw.source.kernel.org ([139.178.84.217]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1ncqDL-000AVg-DM for linux-arm-kernel@lists.infradead.org; Fri, 08 Apr 2022 15:07:56 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 81B6A61EA5; Fri, 8 Apr 2022 15:07:54 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DD969C385A3; Fri, 8 Apr 2022 15:07:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1649430473; bh=5j8bxG+Xf5JcARca/W0PU8fTbYvFa41eJ4g77CdktOU=; h=From:To:Cc:Subject:Date:From; b=OwUH05q+9KXFfOSC4yZMPKORuPjU2H+csDTW56fdTil9Rcr3EV6aFZ81NwQs2NcHw jgUkyvGNLZA/DrjBi3v+MPfPAToU+tXsQxN+D0krBSo31CprBCbej/u5sNdDMz+IRG pmLOnIsm+7z3hB29qdYykcPmUH5UEh1zdXAljBGhp8qewIqpOnj2eRaCcpjDYL4muA xa//E8oFKVOJ9pHjhoIDT8GDblUy5WJ1TPbN709l7HohctsAZNu2FTnLcJZhbwrTHR GeeV2lYcIwAeKX9ky1WOAi0OTJF8Z/ip7SI43EY8esIeUvM8hdQUmgmVt6f4Cs/c7v bjGtVHB7xj/VQ== Received: from sofa.misterjones.org ([185.219.108.64] helo=why.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1ncqDH-002o1A-Bu; Fri, 08 Apr 2022 16:07:51 +0100 From: Marc Zyngier To: Paolo Bonzini Cc: Andrew Jones , Jing Zhang , Oliver Upton , Reiji Watanabe , Will Deacon , Yu Zhe , James Morse , Suzuki K Poulose , Alexandru Elisei , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] KVM/arm64 fixes for 5.18, take #1 Date: Fri, 8 Apr 2022 16:07:46 +0100 Message-Id: <20220408150746.260017-1-maz@kernel.org> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pbonzini@redhat.com, drjones@redhat.com, jingzhangos@google.com, oupton@google.com, reijiw@google.com, will@kernel.org, yuzhe@nfschina.com, james.morse@arm.com, suzuki.poulose@arm.com, alexandru.elisei@arm.com, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, kernel-team@android.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220408_080755_574835_019B258E X-CRM114-Status: GOOD ( 14.15 ) X-Spam-Score: -5.4 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Paolo, Here's the first batches of fixes for 5.18 (most of it courtesy of Oliver). The two important items here are a MMU rwlock fix when splitting block mappings, and a debugfs registration issue resulting [...] Content analysis details: (-5.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [139.178.84.217 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.2 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Paolo, Here's the first batches of fixes for 5.18 (most of it courtesy of Oliver). The two important items here are a MMU rwlock fix when splitting block mappings, and a debugfs registration issue resulting in a potentially spectacular outcome. Please pull, M. The following changes since commit 3123109284176b1532874591f7c81f3837bbdc17: Linux 5.18-rc1 (2022-04-03 14:08:21 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-5.18-1 for you to fetch changes up to 21db83846683d3987666505a3ec38f367708199a: selftests: KVM: Free the GIC FD when cleaning up in arch_timer (2022-04-07 08:46:13 +0100) ---------------------------------------------------------------- KVM/arm64 fixes for 5.18, take #1 - Some PSCI fixes after introducing PSCIv1.1 and SYSTEM_RESET2 - Fix the MMU write-lock not being taken on THP split - Fix mixed-width VM handling - Fix potential UAF when debugfs registration fails - Various selftest updates for all of the above ---------------------------------------------------------------- Andrew Jones (1): KVM: selftests: get-reg-list: Add KVM_REG_ARM_FW_REG(3) Oliver Upton (7): KVM: arm64: Generally disallow SMC64 for AArch32 guests KVM: arm64: Actually prevent SMC64 SYSTEM_RESET2 from AArch32 KVM: arm64: Drop unneeded minor version check from PSCI v1.x handler KVM: arm64: Don't split hugepages outside of MMU write lock KVM: Don't create VM debugfs files outside of the VM directory selftests: KVM: Don't leak GIC FD across dirty log test iterations selftests: KVM: Free the GIC FD when cleaning up in arch_timer Reiji Watanabe (2): KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs KVM: arm64: selftests: Introduce vcpu_width_config Yu Zhe (1): KVM: arm64: vgic: Remove unnecessary type castings arch/arm64/include/asm/kvm_emulate.h | 27 +++-- arch/arm64/include/asm/kvm_host.h | 10 ++ arch/arm64/kvm/mmu.c | 11 +- arch/arm64/kvm/psci.c | 31 +++--- arch/arm64/kvm/reset.c | 65 +++++++---- arch/arm64/kvm/vgic/vgic-debug.c | 10 +- arch/arm64/kvm/vgic/vgic-its.c | 2 +- tools/testing/selftests/kvm/.gitignore | 1 + tools/testing/selftests/kvm/Makefile | 1 + tools/testing/selftests/kvm/aarch64/arch_timer.c | 15 ++- tools/testing/selftests/kvm/aarch64/get-reg-list.c | 14 ++- .../selftests/kvm/aarch64/vcpu_width_config.c | 122 +++++++++++++++++++++ tools/testing/selftests/kvm/dirty_log_perf_test.c | 34 +++++- virt/kvm/kvm_main.c | 10 +- 14 files changed, 285 insertions(+), 68 deletions(-) create mode 100644 tools/testing/selftests/kvm/aarch64/vcpu_width_config.c