Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp629055img; Fri, 22 Mar 2019 05:29:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqy8Vz77ZiSqjKwFxc5mohoMi4ACSWXoa1jHePet6+/1J6WoR7exRDQe2ektlZB93ZADzuLL X-Received: by 2002:a17:902:b40a:: with SMTP id x10mr1013730plr.231.1553257767930; Fri, 22 Mar 2019 05:29:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553257767; cv=none; d=google.com; s=arc-20160816; b=A5FzYWUieHKcXvspA6NV9WWyKie7N4IyvHDsQYp3mIERjO+em3kCwfUWb1LuXqiSqG bmV9gE4O4NMRyy2jm921N0twpFZppX5rOGMnrgTc/Iy3E2SyKLr2lSDjo7a1dzpDoVcL cVqVRvlRRr5hc0/WWvVa8UxdSKchQbwYhE6zY+zQKRF4AEOCghXdajBv8Tyb+hPrskWi TCbSrQDUPj+YjXgTAmGffFbxi0AsOyLMsMLsFngvi39vWJWJyBkFo5tN8kbcC15rV414 qyYilpqSOleVCAYHdkAC5snXK9KUpCGysJanlLWYJbCCYCn5GUt+3/tP5TIFm2MccctG mRBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4E4p/ruMzA4v7ZkacpORRSB0rmJrmKXsJaTVq4KGeVo=; b=YNkip7/4Q07Ez17ZP4gLT6iUnxIRujuQLnrwd3qtinRZ+DNm7lqg4zyPrbVZWssa/S qxpmkpnUAkXXohp1NlR5bq/lcQkduwQ35rJQ7uzIBfT8/DzXlG44aivJj1Ymy/WucQRP hmJrGWo4bglsKrZTb7YQQxiYR3E4zanGnyTnNDa9QJuSYsov59aZNR7ATEfdeb7DdB2u mK4W2qOp9N66xy86UVZ+LAd2d0OUPtw/txZZRxZn1UgX02YD6hb0un4R7zlHcWkr5IxE 3TpRwwOUABTCgg7MkAxD5MIhvdTaSKjhVkz/IhVb/2NoZxwDqTvUVWE2ao41+3m5KdIV fvZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="sFp/PRpq"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s68si6656312pgb.199.2019.03.22.05.29.10; Fri, 22 Mar 2019 05:29:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="sFp/PRpq"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390668AbfCVM2Z (ORCPT + 99 others); Fri, 22 Mar 2019 08:28:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:59724 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390262AbfCVMUn (ORCPT ); Fri, 22 Mar 2019 08:20:43 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5E97F218A1; Fri, 22 Mar 2019 12:20:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553257242; bh=GpsUx+ZQEoPrjn4rstYJuVzOfeDhx9uZLINIlYND+I0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sFp/PRpqfUAXeH+HLtjx3qU6+EGekV33K3UxTc0aio5fTr7lOsuHV+8mO0YNapnU1 B/mjPopnI4lHefSXcQU80ANSNpwFgsGCVpwP0gM+Px+BaAYwLEfChUQ8RMQSUQLboO 6xQnlPx1hl9f2L5/9uxUfzPxS2TpYyUusk1Mc3yI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christoffer Dall , Dave Martin , Marc Zyngier Subject: [PATCH 5.0 174/238] arm64: KVM: Fix architecturally invalid reset value for FPEXC32_EL2 Date: Fri, 22 Mar 2019 12:16:33 +0100 Message-Id: <20190322111308.547007032@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111258.383569278@linuxfoundation.org> References: <20190322111258.383569278@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dave Martin commit c88b093693ccbe41991ef2e9b1d251945e6e54ed upstream. Due to what looks like a typo dating back to the original addition of FPEXC32_EL2 handling, KVM currently initialises this register to an architecturally invalid value. As a result, the VECITR field (RES1) in bits [10:8] is initialised with 0, and the two reserved (RES0) bits [6:5] are initialised with 1. (In the Common VFP Subarchitecture as specified by ARMv7-A, these two bits were IMP DEF. ARMv8-A removes them.) This patch changes the reset value from 0x70 to 0x700, which reflects the architectural constraints and is presumably what was originally intended. Cc: # 4.12.x- Cc: Christoffer Dall Fixes: 62a89c44954f ("arm64: KVM: 32bit handling of coprocessor traps") Signed-off-by: Dave Martin Signed-off-by: Marc Zyngier Signed-off-by: Greg Kroah-Hartman --- arch/arm64/kvm/sys_regs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/arm64/kvm/sys_regs.c +++ b/arch/arm64/kvm/sys_regs.c @@ -1476,7 +1476,7 @@ static const struct sys_reg_desc sys_reg { SYS_DESC(SYS_DACR32_EL2), NULL, reset_unknown, DACR32_EL2 }, { SYS_DESC(SYS_IFSR32_EL2), NULL, reset_unknown, IFSR32_EL2 }, - { SYS_DESC(SYS_FPEXC32_EL2), NULL, reset_val, FPEXC32_EL2, 0x70 }, + { SYS_DESC(SYS_FPEXC32_EL2), NULL, reset_val, FPEXC32_EL2, 0x700 }, }; static bool trap_dbgidr(struct kvm_vcpu *vcpu,