Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id C20DFC636D3 for ; Mon, 6 Feb 2023 17:13:26 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230183AbjBFRNZ (ORCPT ); Mon, 6 Feb 2023 12:13:25 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48098 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229762AbjBFRNT (ORCPT ); Mon, 6 Feb 2023 12:13:19 -0500 Received: from out-82.mta0.migadu.com (out-82.mta0.migadu.com [91.218.175.82]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 37F9211658 for ; Mon, 6 Feb 2023 09:13:12 -0800 (PST) X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1675703590; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=2vII0gLu68kSuBCcExcNCtXjKdRpzzjDFHCPp8egne4=; b=UquOkQo+cdHwkgxsDiSw5Ekm1UrcIziy+pGPxa6B4zhpqZxLSovf0DU4J8ASia+yMbqK5E XucgPpDR8o0M4KOoG4TVUPR1M7sYxLmWU/WPpPuWH/RR87nDTwZP1Xr4T1gNSaaHkwYWUB 1W5XFq7Vg1vypqQw0MmlB6xRWGDv9a4= From: Oliver Upton To: Marc Zyngier , Mark Brown , Will Deacon , Suzuki K Poulose , Zenghui Yu , Quentin Perret , Catalin Marinas , James Morse Cc: Oliver Upton , kvmarm@lists.linux.dev, linux-arm-kernel@lists.infradead.org, kernel-team@android.com, kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org Subject: Re: [PATCH 0/4] KVM: arm64: Fix CPU resume/on with pKVM Date: Mon, 6 Feb 2023 17:12:59 +0000 Message-Id: <167570355326.3822888.6416716908821358162.b4-ty@linux.dev> In-Reply-To: <20230201103755.1398086-1-qperret@google.com> References: <20230201103755.1398086-1-qperret@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 1 Feb 2023 10:37:50 +0000, Quentin Perret wrote: > When using pKVM, we do not reset the EL2 exception vectors back to the > stubs for e.g. Power Management or CPU hotplug as we normally do in KVM. > As consequence, the initialisation perfomed by __finalise_el2 is missing > on e.g. the CPU_RESUME path with pKVM, hence leaving certain registers > in an incorrect state. > > One such example is ZCR_EL2 which remains configured with SVE traps > enabled. And so using SVE on a CPU that has gone through a hotplug > off/on cycle leads to a hyp panic. Not good. > > [...] Applied to kvmarm/next, thanks! [1/4] KVM: arm64: Provide sanitized SYS_ID_AA64SMFR0_EL1 to nVHE https://git.kernel.org/kvmarm/kvmarm/c/8669651ce0d9 [2/4] KVM: arm64: Introduce finalise_el2_state macro https://git.kernel.org/kvmarm/kvmarm/c/e2d4f5ae1771 [3/4] KVM: arm64: Use sanitized values in __check_override in nVHE https://git.kernel.org/kvmarm/kvmarm/c/3c4cc31537ec [4/4] KVM: arm64: Finalise EL2 state from pKVM PSCI relay https://git.kernel.org/kvmarm/kvmarm/c/6f10f2ec61c7 -- Best, Oliver