From patchwork Thu Jan 5 15:42:50 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 1722187 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=X5ZWSwZ4; dkim=fail reason="signature verification failed" (2048-bit key; secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256 header.s=desiato.20200630 header.b=HuHl879I; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=JVfh+umc; dkim-atps=neutral Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4Np2J25C04z23fj for ; Fri, 6 Jan 2023 10:10:26 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=a2F3eS6mejGtnPJw0+USeHOyy/PWlnNBAfQ3F+LNOHM=; b=X5ZWSwZ47W12zl hDmPKOGaIHjWJWFB5mIBY1hMjbsRA4uCsMZRCLBKnbTZfRZu5sEdPrf2X+SZ9vDs5IoUpwfCH0fvH 7g/8dAPzPPsHtM/zrlOZlbX5F4cUwdIr19zG5gb9TgAbjyk3QF8Kjy2LzTcZo6TLemgI0fVFyllX0 KYKqmFxBf7tN4nAN0YacbfkN7egv5/a9dyXRybBIGf0FToa1uqsrlFDtNCSBruX4C6YPXnhwycJjz eytvLrm7xxP2M5X3jK/vT1xRq6igMAvRT/gml87BrSkMHWAYrsowtrwwAYZoWYFQKRh7apjPNJICe 32rdqLA8P3dfVQyCgmng==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1pDZNC-00Fyl3-Sg; Thu, 05 Jan 2023 23:10:11 +0000 Received: from desiato.infradead.org ([2001:8b0:10b:1:d65d:64ff:fe57:4e05]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1pDVUn-00Dvp2-9Y for linux-arm-kernel@bombadil.infradead.org; Thu, 05 Jan 2023 19:01:45 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=desiato.20200630; h=Content-Transfer-Encoding:MIME-Version :Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:In-Reply-To:References; bh=4zu+Ft1LL9oj6htKoXi7d+ifmGdE2VC3bo9FZYRrx0g=; b=HuHl879IwtA/chk0ORugKsneQ3 f3usrfi4sO0owSHUd99t62XKPT+cp1SsE73NVkRD51vz9TBtRHLtEvUmbbewHaFe/PfqGRMGGyjgT q1PBYd12sn7mIV5CNfyhmoGCmGCVRxLj04F7tFVQFOsllgvQlz3UErOX7ydM+Jj/4k2vxEAF9ZyTl gO1wodj52X2ms3G/1pMy7nVS/PuZJZExTkMD9r32lmtgpZGy9npUT1LazH7BOVg97nATRNFlXJDcJ CTEom6C3txZ/flvGmJlkZ4wBLJiMrm+0GX7SGY78cDOcYlC5ndDhS7rlXWnc+00GbYcGox2ygRjFJ giQbXJKg==; Received: from ams.source.kernel.org ([2604:1380:4601:e00::1]) by desiato.infradead.org with esmtps (Exim 4.96 #2 (Red Hat Linux)) id 1pDSOU-001RvO-1k for linux-arm-kernel@lists.infradead.org; Thu, 05 Jan 2023 15:43:04 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id B836CB8199B; Thu, 5 Jan 2023 15:43:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 52CA1C433EF; Thu, 5 Jan 2023 15:43:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1672933386; bh=y74N97g+Yx8E7h9CsEgRapP40oMw4aE0lxW2+d1Edec=; h=From:To:Cc:Subject:Date:From; b=JVfh+umcShNIlXPn6f/oW7BCEb5Au78jLh2dmpxjcnKvdhb9ijocjfIqMbQkkEJIS FCjhh8RhqY5mqsrlOwbONUZXkSk3sBqXAVhTc29T3aW+Nt5c1xflqynjD3xbsTvClO x9ze2FrzMSpoP2aEP3uXGLchWTAJoHWmaUUHJAIAc5s9vl8ZZI4jioGgX82wONyMzZ uC1yZf5Q5GBiyywd/vK2lvSa3oFA22swxtp7Nv+V/WbwQ4hW1miFAXebVA7p5XN/WU ZjCcPq+wGYdFHpCNE1iCXGaLKjHsX6qYuJ2bYgo50Tnf5RhNqPU8F1dJ0/BkHn/zY/ xA88ay6DkrNpg== Received: from sofa.misterjones.org ([185.219.108.64] helo=valley-girl.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1pDSOV-00H25l-VO; Thu, 05 Jan 2023 15:43:04 +0000 From: Marc Zyngier To: Paolo Bonzini Cc: Alexandru Elisei , Ard Biesheuvel , James Clark , Oliver Upton , Zenghui Yu , James Morse , Suzuki K Poulose , , , linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org Subject: [GIT PULL] KVM/arm64 fixes for 6.2, take #1 Date: Thu, 5 Jan 2023 15:42:50 +0000 Message-Id: <20230105154250.660145-1-maz@kernel.org> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pbonzini@redhat.com, alexandru.elisei@arm.com, ardb@kernel.org, james.clark@arm.com, oliver.upton@linux.dev, yuzenghui@huawei.com, james.morse@arm.com, suzuki.poulose@arm.com, kvmarm@lists.cs.columbia.edu, kvmarm@lists.linux.dev, linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20230105_154302_967598_8CF3FAD1 X-CRM114-Status: GOOD ( 13.96 ) X-Spam-Score: -5.2 (-----) X-Spam-Report: Spam detection software, running on the system "desiato.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Paolo, Happy new year! Here's the first batch of fixes for KVM/arm64 for 6.2. We have two important fixes this time around, one for the PMU emulation, and the other for guest page table walks in read-only memslots, somethin [...] Content analysis details: (-5.2 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [2604:1380:4601:e00:0:0:0:1 listed in] [list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Paolo, Happy new year! Here's the first batch of fixes for KVM/arm64 for 6.2. We have two important fixes this time around, one for the PMU emulation, and the other for guest page table walks in read-only memslots, something that EFI has started doing... The rest is mostly documentation updates, cleanups, and an update to the list of reviewers (Alexandru stepping down, and Zenghui joining the fun). Please pull, M. The following changes since commit 88603b6dc419445847923fcb7fe5080067a30f98: Linux 6.2-rc2 (2023-01-01 13:53:16 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-6.2-1 for you to fetch changes up to de535c0234dd2dbd9c790790f2ca1c4ec8a52d2b: Merge branch kvm-arm64/MAINTAINERS into kvmarm-master/fixes (2023-01-05 15:26:53 +0000) ---------------------------------------------------------------- KVM/arm64 fixes for 6.2, take #1 - Fix the PMCR_EL0 reset value after the PMU rework - Correctly handle S2 fault triggered by a S1 page table walk by not always classifying it as a write, as this breaks on R/O memslots - Document why we cannot exit with KVM_EXIT_MMIO when taking a write fault from a S1 PTW on a R/O memslot - Put the Apple M2 on the naughty step for not being able to correctly implement the vgic SEIS feature, just liek the M1 before it - Reviewer updates: Alex is stepping down, replaced by Zenghui ---------------------------------------------------------------- Alexandru Elisei (1): MAINTAINERS: Remove myself as a KVM/arm64 reviewer James Clark (1): KVM: arm64: PMU: Fix PMCR_EL0 reset value Marc Zyngier (8): KVM: arm64: Fix S1PTW handling on RO memslots KVM: arm64: Document the behaviour of S1PTW faults on RO memslots KVM: arm64: Convert FSC_* over to ESR_ELx_FSC_* KVM: arm64: vgic: Add Apple M2 cpus to the list of broken SEIS implementations Merge branch kvm-arm64/pmu-fixes-6.2 into kvmarm-master/fixes Merge branch kvm-arm64/s1ptw-write-fault into kvmarm-master/fixes MAINTAINERS: Add Zenghui Yu as a KVM/arm64 reviewer Merge branch kvm-arm64/MAINTAINERS into kvmarm-master/fixes Documentation/virt/kvm/api.rst | 8 +++++++ MAINTAINERS | 2 +- arch/arm64/include/asm/cputype.h | 4 ++++ arch/arm64/include/asm/esr.h | 9 +++++++ arch/arm64/include/asm/kvm_arm.h | 15 ------------ arch/arm64/include/asm/kvm_emulate.h | 42 +++++++++++++++++++++++---------- arch/arm64/kvm/hyp/include/hyp/fault.h | 2 +- arch/arm64/kvm/hyp/include/hyp/switch.h | 2 +- arch/arm64/kvm/mmu.c | 21 ++++++++++------- arch/arm64/kvm/sys_regs.c | 2 +- arch/arm64/kvm/vgic/vgic-v3.c | 2 ++ 11 files changed, 69 insertions(+), 40 deletions(-)