1. 12 1月, 2021 4 次提交
  2. 02 12月, 2020 3 次提交
  3. 18 11月, 2020 1 次提交
  4. 16 11月, 2020 1 次提交
    • J
      KVM: arm64: Correctly align nVHE percpu data · 7bab16a6
      Jamie Iles 提交于
      The nVHE percpu data is partially linked but the nVHE linker script did
      not align the percpu section.  The PERCPU_INPUT macro would then align
      the data to a page boundary:
      
        #define PERCPU_INPUT(cacheline)					\
        	__per_cpu_start = .;						\
        	*(.data..percpu..first)						\
        	. = ALIGN(PAGE_SIZE);						\
        	*(.data..percpu..page_aligned)					\
        	. = ALIGN(cacheline);						\
        	*(.data..percpu..read_mostly)					\
        	. = ALIGN(cacheline);						\
        	*(.data..percpu)						\
        	*(.data..percpu..shared_aligned)				\
        	PERCPU_DECRYPTED_SECTION					\
        	__per_cpu_end = .;
      
      but then when the final vmlinux linking happens the hypervisor percpu
      data is included after page alignment and so the offsets potentially
      don't match.  On my build I saw that the .hyp.data..percpu section was
      at address 0x20 and then the percpu data would begin at 0x1000 (because
      of the page alignment in PERCPU_INPUT), but when linked into vmlinux,
      everything would be shifted down by 0x20 bytes.
      
      This manifests as one of the CPUs getting lost when running
      kvm-unit-tests or starting any VM and subsequent soft lockup on a Cortex
      A72 device.
      
      Fixes: 30c95391 ("kvm: arm64: Set up hyp percpu data for nVHE")
      Signed-off-by: NJamie Iles <jamie@nuviainc.com>
      Signed-off-by: NMarc Zyngier <maz@kernel.org>
      Acked-by: NDavid Brazdil <dbrazdil@google.com>
      Cc: David Brazdil <dbrazdil@google.com>
      Cc: Marc Zyngier <maz@kernel.org>
      Cc: Will Deacon <will@kernel.org>
      Link: https://lore.kernel.org/r/20201113150406.14314-1-jamie@nuviainc.com
      7bab16a6
  5. 13 11月, 2020 3 次提交
  6. 07 11月, 2020 5 次提交
  7. 31 10月, 2020 1 次提交
  8. 30 10月, 2020 8 次提交
  9. 29 10月, 2020 1 次提交
  10. 28 10月, 2020 1 次提交
    • S
      KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 doesn't return SMCCC_RET_NOT_REQUIRED · 1de111b5
      Stephen Boyd 提交于
      According to the SMCCC spec[1](7.5.2 Discovery) the
      ARM_SMCCC_ARCH_WORKAROUND_1 function id only returns 0, 1, and
      SMCCC_RET_NOT_SUPPORTED.
      
       0 is "workaround required and safe to call this function"
       1 is "workaround not required but safe to call this function"
       SMCCC_RET_NOT_SUPPORTED is "might be vulnerable or might not be, who knows, I give up!"
      
      SMCCC_RET_NOT_SUPPORTED might as well mean "workaround required, except
      calling this function may not work because it isn't implemented in some
      cases". Wonderful. We map this SMC call to
      
       0 is SPECTRE_MITIGATED
       1 is SPECTRE_UNAFFECTED
       SMCCC_RET_NOT_SUPPORTED is SPECTRE_VULNERABLE
      
      For KVM hypercalls (hvc), we've implemented this function id to return
      SMCCC_RET_NOT_SUPPORTED, 0, and SMCCC_RET_NOT_REQUIRED. One of those
      isn't supposed to be there. Per the code we call
      arm64_get_spectre_v2_state() to figure out what to return for this
      feature discovery call.
      
       0 is SPECTRE_MITIGATED
       SMCCC_RET_NOT_REQUIRED is SPECTRE_UNAFFECTED
       SMCCC_RET_NOT_SUPPORTED is SPECTRE_VULNERABLE
      
      Let's clean this up so that KVM tells the guest this mapping:
      
       0 is SPECTRE_MITIGATED
       1 is SPECTRE_UNAFFECTED
       SMCCC_RET_NOT_SUPPORTED is SPECTRE_VULNERABLE
      
      Note: SMCCC_RET_NOT_AFFECTED is 1 but isn't part of the SMCCC spec
      
      Fixes: c118bbb5 ("arm64: KVM: Propagate full Spectre v2 workaround state to KVM guests")
      Signed-off-by: NStephen Boyd <swboyd@chromium.org>
      Acked-by: NMarc Zyngier <maz@kernel.org>
      Acked-by: NWill Deacon <will@kernel.org>
      Cc: Andre Przywara <andre.przywara@arm.com>
      Cc: Steven Price <steven.price@arm.com>
      Cc: Marc Zyngier <maz@kernel.org>
      Cc: stable@vger.kernel.org
      Link: https://developer.arm.com/documentation/den0028/latest [1]
      Link: https://lore.kernel.org/r/20201023154751.1973872-1-swboyd@chromium.orgSigned-off-by: NWill Deacon <will@kernel.org>
      1de111b5
  11. 02 10月, 2020 2 次提交
  12. 01 10月, 2020 1 次提交
  13. 30 9月, 2020 7 次提交
  14. 29 9月, 2020 2 次提交