Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp118693iob; Tue, 3 May 2022 12:58:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxNWA1u/vNXv0gRA2GTwTbC5eXVZw9ANUpeE1zoL2JCXkfabLGHrVg3Z2KlAa8uY1Whtc9A X-Received: by 2002:aa7:da12:0:b0:427:b434:a374 with SMTP id r18-20020aa7da12000000b00427b434a374mr15246097eds.408.1651607881704; Tue, 03 May 2022 12:58:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651607881; cv=none; d=google.com; s=arc-20160816; b=aINlZHCkAVT2pXit21rMAmi8FsMpySsVsWwm6A918yCOl/wPgD0tqV6c0feiCwdrvs PGHPjf8VUZzN6u8bX7FwkFBcupacoMwIgyD+twNmUEK7VtUJfXeOHzcR+nZGEHjpGxUa LFhsjA3ChuxO0x8SC4lR5vErYxwvyFm7+n/aHrFEDSbybbVjSQhjumClMMjXWhFTgv1v wdal3HEI7mYmAy43gdSrySZ9HG1Kdm6MUSv+qNnABQ0yGtmx/pxBGu8OckKo7kNYXt2R Qx/DNz7f7EDono8kpfatO8293jQu7CxQ13XaQNgWlq9Qi09AfQU8jBWGCHSdGDdtgwaB GYuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=J2tjgE3YSWt4f9CApa4e5e0udhylQYYT7gcAv26oJU4=; b=G7I91wr96iqLE5Mtwf1aNR68tMo1JSJQVZZAsdyhV8aERlKGX1iaWzBGzBMXBMPk8c 7ci0PH05v97fIWt7nsCzZwPso5ujD5y9geBWUffae28GJ+1490j/8sppkIOMYRArLC1B 1Xz/QUmp4P+YvROGqRcIcduV131Zs2ShNjV/brg/VE97pnFBVZ0oZawWh18cqbWddtyS Pd+Y+eL1OpsH4jqHhEge+tH301z2VKvAetQy7xZD/vK+j4g1S+IbQZmsO3Te9WJOQN9b a6DYCvKuhFdUdrC7U6H9gOYPyOwO1Y7JrtSKSwFc9Cy2UVhapTAPs8p6P2b8ZdcRtloF 3FDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fTc7B894; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ho7-20020a1709070e8700b006e88e5388eesi16605512ejc.864.2022.05.03.12.57.38; Tue, 03 May 2022 12:58:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fTc7B894; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242001AbiECTpU (ORCPT + 99 others); Tue, 3 May 2022 15:45:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40758 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240258AbiECTpS (ORCPT ); Tue, 3 May 2022 15:45:18 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C23A822B22 for ; Tue, 3 May 2022 12:41:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 5EA0D61982 for ; Tue, 3 May 2022 19:41:45 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id ADB6DC385A9; Tue, 3 May 2022 19:41:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651606904; bh=NG94txh+wND3OC7140pcpYGPVjRs1x+nXgpG24yMmfU=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=fTc7B894+zfEF/Ma2g4dJtQhjrNeMsFOCFlDcVHnbmYQlPjq9DBbryPnkvZkEfuzB 3ARA0WYl34O10FIHYd5USTMbmpatTX+aMY7kzUfDGjTjuxIhRDqpFwRChhoIuSsh4R DT5+VArmkueWsGt9Wl7oYB6w6Nz6+vX4dZAx5ikEvcUAIUkZfTFkAGF843wnMmf0MB U0o2KAQsUd87BVjwthgDbo6TQFl6RhPGjN6AW14/mVIHKM410kIzHlzHfPV8lx9PDn Bpt7man9BxvlvvodgvhLUOD9UwCdyAp/8gpQeWsIfn0JgNLXG4pcdgJRw22ahidhU2 MC4D5gJh2farQ== Received: from sofa.misterjones.org ([185.219.108.64] helo=wait-a-minute.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1nlyP0-008jAx-4W; Tue, 03 May 2022 20:41:42 +0100 Date: Tue, 03 May 2022 20:41:41 +0100 Message-ID: <87a6byietm.wl-maz@kernel.org> From: Marc Zyngier To: Kalesh Singh Cc: Catalin Marinas , Mark Rutland , James Morse , Fuad Tabba , Masahiro Yamada , Suren Baghdasaryan , kvmarm , Suzuki K Poulose , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , Ard Biesheuvel , Will Deacon , Quentin Perret , LKML , Alexandru Elisei , Zenghui Yu , Changbin Du , "Cc: Android Kernel" , Nathan Chancellor Subject: Re: [PATCH v8 0/6] KVM: arm64: Hypervisor stack enhancements In-Reply-To: References: <20220420214317.3303360-1-kaleshsingh@google.com> <165117574186.3115452.6818682378273681624.b4-ty@kernel.org> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: kaleshsingh@google.com, catalin.marinas@arm.com, mark.rutland@arm.com, james.morse@arm.com, tabba@google.com, masahiroy@kernel.org, surenb@google.com, kvmarm@lists.cs.columbia.edu, suzuki.poulose@arm.com, linux-arm-kernel@lists.infradead.org, ardb@kernel.org, will@kernel.org, qperret@google.com, linux-kernel@vger.kernel.org, alexandru.elisei@arm.com, yuzenghui@huawei.com, changbin.du@intel.com, kernel-team@android.com, nathan@kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 02 May 2022 17:54:45 +0100, Kalesh Singh wrote: > > On Thu, Apr 28, 2022 at 12:55 PM Marc Zyngier wrote: > > > > On Wed, 20 Apr 2022 14:42:51 -0700, Kalesh Singh wrote: > > > This is v8 of the nVHE hypervisor stack enhancements. This version is based > > > on 5.18-rc3. > > > > > > Previous versions can be found at: > > > v7: https://lore.kernel.org/r/20220408200349.1529080-1-kaleshsingh@google.com/ > > > v6: https://lore.kernel.org/r/20220314200148.2695206-1-kaleshsingh@google.com/ > > > v5: https://lore.kernel.org/r/20220307184935.1704614-1-kaleshsingh@google.com/ > > > v4: https://lore.kernel.org/r/20220225033548.1912117-1-kaleshsingh@google.com/ > > > v3: https://lore.kernel.org/r/20220224051439.640768-1-kaleshsingh@google.com/ > > > v2: https://lore.kernel.org/r/20220222165212.2005066-1-kaleshsingh@google.com/ > > > v1: https://lore.kernel.org/r/20220210224220.4076151-1-kaleshsingh@google.com/ > > > > > > [...] > > > > Applied to next, thanks! > > > > [1/6] KVM: arm64: Introduce hyp_alloc_private_va_range() > > commit: 92abe0f81e1385afd8f1dc66206b5be9a514899b > > [2/6] KVM: arm64: Introduce pkvm_alloc_private_va_range() > > commit: f922c13e778d6d5343d4576be785a8204c595113 > > [3/6] KVM: arm64: Add guard pages for KVM nVHE hypervisor stack > > commit: ce3354318a57875dc59f4bb841662e95bfba03db > > [4/6] KVM: arm64: Add guard pages for pKVM (protected nVHE) hypervisor stack > > commit: 1a919b17ef012ca0572bae759c27e5ea02bfb47f > > [5/6] KVM: arm64: Detect and handle hypervisor stack overflows > > commit: 66de19fad9ef47c5376a99bb2b00661f1c788a94 > > [6/6] KVM: arm64: Symbolize the nVHE HYP addresses > > commit: 6ccf9cb557bd32073b0d68baed97f1bd8a40ff1d > > Thanks for applying these Marc. > > I was wondering if instead of taking these through kvm-arm64/next, > could Catalin consolidated these in arm64 for-next/core with Mark > Ruthland's and Madhavan's stacktrace patches[1]? This avoids conflict > and would allow for the hypervisor unwinding changes[2] to apply > cleanly. So far, there hasn't been any reported conflict. If Catalin needs to merge the branch or part of it, it is stable anyway and can be pulled from anywhere. As for the rest of the stacktrace stuff, I haven't had a look yet. Thanks, M. -- Without deviation from the norm, progress is not possible.