1. 04 1月, 2022 1 次提交
  2. 20 12月, 2021 1 次提交
  3. 16 12月, 2021 2 次提交
  4. 01 12月, 2021 1 次提交
  5. 21 10月, 2021 1 次提交
    • M
      arm64/sve: Put system wide vector length information into structs · b5bc00ff
      Mark Brown 提交于
      With the introduction of SME we will have a second vector length in the
      system, enumerated and configured in a very similar fashion to the
      existing SVE vector length.  While there are a few differences in how
      things are handled this is a relatively small portion of the overall
      code so in order to avoid code duplication we factor out
      
      We create two structs, one vl_info for the static hardware properties
      and one vl_config for the runtime configuration, with an array
      instantiated for each and update all the users to reference these. Some
      accessor functions are provided where helpful for readability, and the
      write to set the vector length is put into a function since the system
      register being updated needs to be chosen at compile time.
      
      This is a mostly mechanical replacement, further work will be required
      to actually make things generic, ensuring that we handle those places
      where there are differences properly.
      Signed-off-by: NMark Brown <broonie@kernel.org>
      Link: https://lore.kernel.org/r/20211019172247.3045838-8-broonie@kernel.orgSigned-off-by: NWill Deacon <will@kernel.org>
      b5bc00ff
  6. 17 10月, 2021 1 次提交
  7. 19 8月, 2021 1 次提交
  8. 18 8月, 2021 1 次提交
  9. 11 8月, 2021 2 次提交
  10. 22 6月, 2021 1 次提交
  11. 27 5月, 2021 1 次提交
  12. 10 4月, 2021 1 次提交
    • M
      KVM: arm64: Fully zero the vcpu state on reset · 85d70374
      Marc Zyngier 提交于
      On vcpu reset, we expect all the registers to be brought back
      to their initial state, which happens to be a bunch of zeroes.
      
      However, some recent commit broke this, and is now leaving a bunch
      of registers (such as the FP state) with whatever was left by the
      guest. My bad.
      
      Zero the reset of the state (32bit SPSRs and FPSIMD state).
      
      Cc: stable@vger.kernel.org
      Fixes: e47c2055 ("KVM: arm64: Make struct kvm_regs userspace-only")
      Signed-off-by: NMarc Zyngier <maz@kernel.org>
      85d70374
  13. 19 3月, 2021 1 次提交
  14. 18 3月, 2021 1 次提交
  15. 12 3月, 2021 1 次提交
    • M
      KVM: arm64: Reject VM creation when the default IPA size is unsupported · 7d717558
      Marc Zyngier 提交于
      KVM/arm64 has forever used a 40bit default IPA space, partially
      due to its 32bit heritage (where the only choice is 40bit).
      
      However, there are implementations in the wild that have a *cough*
      much smaller *cough* IPA space, which leads to a misprogramming of
      VTCR_EL2, and a guest that is stuck on its first memory access
      if userspace dares to ask for the default IPA setting (which most
      VMMs do).
      
      Instead, blundly reject the creation of such VM, as we can't
      satisfy the requirements from userspace (with a one-off warning).
      Also clarify the boot warning, and document that the VM creation
      will fail when an unsupported IPA size is provided.
      
      Although this is an ABI change, it doesn't really change much
      for userspace:
      
      - the guest couldn't run before this change, but no error was
        returned. At least userspace knows what is happening.
      
      - a memory slot that was accepted because it did fit the default
        IPA space now doesn't even get a chance to be registered.
      
      The other thing that is left doing is to convince userspace to
      actually use the IPA space setting instead of relying on the
      antiquated default.
      
      Fixes: 233a7cb2 ("kvm: arm64: Allow tuning the physical address size for VM")
      Signed-off-by: NMarc Zyngier <maz@kernel.org>
      Cc: stable@vger.kernel.org
      Reviewed-by: NAndrew Jones <drjones@redhat.com>
      Reviewed-by: NEric Auger <eric.auger@redhat.com>
      Link: https://lore.kernel.org/r/20210311100016.3830038-2-maz@kernel.org
      7d717558
  16. 10 3月, 2021 1 次提交
  17. 28 11月, 2020 1 次提交
  18. 27 11月, 2020 1 次提交
  19. 10 11月, 2020 1 次提交
  20. 29 9月, 2020 1 次提交
  21. 11 9月, 2020 1 次提交
  22. 07 7月, 2020 1 次提交
  23. 22 6月, 2020 2 次提交
  24. 29 5月, 2020 1 次提交
  25. 28 5月, 2020 1 次提交
  26. 21 5月, 2020 1 次提交
  27. 20 5月, 2020 1 次提交
  28. 16 5月, 2020 1 次提交
  29. 28 4月, 2020 1 次提交
  30. 28 1月, 2020 2 次提交
  31. 19 6月, 2019 1 次提交
  32. 24 4月, 2019 2 次提交
    • A
      KVM: arm64: Add capability to advertise ptrauth for guest · a243c16d
      Amit Daniel Kachhap 提交于
      This patch advertises the capability of two cpu feature called address
      pointer authentication and generic pointer authentication. These
      capabilities depend upon system support for pointer authentication and
      VHE mode.
      
      The current arm64 KVM partially implements pointer authentication and
      support of address/generic authentication are tied together. However,
      separate ABI requirements for both of them is added so that any future
      isolated implementation will not require any ABI changes.
      Signed-off-by: NAmit Daniel Kachhap <amit.kachhap@arm.com>
      Cc: Mark Rutland <mark.rutland@arm.com>
      Cc: Marc Zyngier <marc.zyngier@arm.com>
      Cc: Christoffer Dall <christoffer.dall@arm.com>
      Cc: kvmarm@lists.cs.columbia.edu
      Signed-off-by: NMarc Zyngier <marc.zyngier@arm.com>
      a243c16d
    • A
      KVM: arm64: Add userspace flag to enable pointer authentication · a22fa321
      Amit Daniel Kachhap 提交于
      Now that the building blocks of pointer authentication are present, lets
      add userspace flags KVM_ARM_VCPU_PTRAUTH_ADDRESS and
      KVM_ARM_VCPU_PTRAUTH_GENERIC. These flags will enable pointer
      authentication for the KVM guest on a per-vcpu basis through the ioctl
      KVM_ARM_VCPU_INIT.
      
      This features will allow the KVM guest to allow the handling of
      pointer authentication instructions or to treat them as undefined
      if not set.
      
      Necessary documentations are added to reflect the changes done.
      Reviewed-by: NDave Martin <Dave.Martin@arm.com>
      Signed-off-by: NAmit Daniel Kachhap <amit.kachhap@arm.com>
      Cc: Mark Rutland <mark.rutland@arm.com>
      Cc: Marc Zyngier <marc.zyngier@arm.com>
      Cc: Christoffer Dall <christoffer.dall@arm.com>
      Cc: kvmarm@lists.cs.columbia.edu
      Signed-off-by: NMarc Zyngier <marc.zyngier@arm.com>
      a22fa321
  33. 19 4月, 2019 2 次提交
  34. 29 3月, 2019 1 次提交