Re: [PATCH] powerpc/signal32: Use struct_group() to zero spe regs

2021-11-21 Thread Michael Ellerman
LEROY Christophe writes: > Le 18/11/2021 à 21:36, Kees Cook a écrit : >> In preparation for FORTIFY_SOURCE performing compile-time and run-time >> field bounds checking for memset(), avoid intentionally writing across >> neighboring fields. >> >> Add a struct_group() for the spe registers so that

Re: [GIT PULL] Please pull powerpc/linux.git powerpc-5.16-2 tag

2021-11-21 Thread pr-tracker-bot
The pull request you sent on Sun, 21 Nov 2021 15:48:02 +1100: > https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git > tags/powerpc-5.16-2 has been merged into torvalds/linux.git: https://git.kernel.org/torvalds/c/75603b14ed142fa142976bd962c1b44b8e0d2714 Thank you! -- Deet-doot-d

[powerpc:next-test] BUILD SUCCESS 478cb53ce5e2d5fd96c2da42d0f9d2b53620881a

2021-11-21 Thread kernel test robot
-20211121 ia64 allmodconfig ia64defconfig ia64 allyesconfig m68k allmodconfig m68k allyesconfig m68kdefconfig nds32

[powerpc:merge] BUILD SUCCESS a4884e88b53ceabfdf5ea95a95fb56766a826246

2021-11-21 Thread kernel test robot
ig powerpcsocrates_defconfig powerpc mpc832x_rdb_defconfig s390 zfcpdump_defconfig arm randconfig-c002-20211121 ia64 allmodconfig ia64defconfig ia64 allyesc

[powerpc:fixes-test] BUILD SUCCESS e5abb2825c66bacb76417c9a28941cdf7fd22f32

2021-11-21 Thread kernel test robot
zfcpdump_defconfig powerpcsocrates_defconfig powerpc mpc832x_rdb_defconfig mips loongson1b_defconfig m68k bvme6000_defconfig arm randconfig-c002-20211121 ia64 allmodconfig ia64

[PATCH v5 10/12] KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery

2021-11-21 Thread David Woodhouse
From: David Woodhouse This adds basic support for delivering 2 level event channels to a guest. Initially, it only supports delivery via the IRQ routing table, triggered by an eventfd. In order to do so, it has a kvm_xen_set_evtchn_fast() function which will use the pre-mapped shared_info page i

[PATCH v5 12/12] KVM: x86: First attempt at converting nested virtual APIC page to gpc

2021-11-21 Thread David Woodhouse
From: David Woodhouse This is what evolved during the discussion at https://lore.kernel.org/kvm/960e233f-ec0b-4fb5-ba2e-c8d2ccb38...@infradead.org/T/#m11d75fcfe2da357ec1dabba0d0e3abb91fd13665 As discussed, an alternative approach might be to augment kvm_arch_memslots_updated() to raise KVM_REQ_G

[PATCH v5 06/12] KVM: powerpc: Use Makefile.kvm for common files

2021-11-21 Thread David Woodhouse
From: David Woodhouse It's all fairly baroque but in the end, I don't think there's any reason for $(KVM)/irqchip.o to have been handled differently, as they all end up in $(kvm-y) in the end anyway, regardless of whether they get there via $(common-objs-y) and the CPU-specific object lists. Sig

[PATCH v5 02/12] KVM: Add Makefile.kvm for common files, use it for x86

2021-11-21 Thread David Woodhouse
From: David Woodhouse Splitting kvm_main.c out into smaller and better-organized files is slightly non-trivial when it involves editing a bunch of per-arch KVM makefiles. Provide virt/kvm/Makefile.kvm for them to include. Signed-off-by: David Woodhouse Acked-by: Marc Zyngier --- arch/x86/kvm/

[PATCH v5 00/12] KVM: x86/xen: Add in-kernel Xen event channel delivery

2021-11-21 Thread David Woodhouse
Introduce the basic concept of 2 level event channels for kernel delivery, which is just a simple matter of a few test_and_set_bit calls on a mapped shared info page. This can be used for routing MSI of passthrough devices to PIRQ event channels in a Xen guest, and we can build on it for deliverin

[PATCH v5 11/12] KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty

2021-11-21 Thread David Woodhouse
From: David Woodhouse When dirty ring logging is enabled, any dirty logging without an active vCPU context will cause a kernel oops. But we've already declared that the shared_info page doesn't get dirty tracking anyway, since it would be kind of insane to mark it dirty every time we deliver an e

[PATCH v5 09/12] KVM: x86/xen: Maintain valid mapping of Xen shared_info page

2021-11-21 Thread David Woodhouse
From: David Woodhouse Use the newly reinstated gfn_to_pfn_cache to maintain a kernel mapping of the Xen shared_info page so that it can be accessed in atomic context. Note that we do not participate in dirty tracking for the shared info page and we do not explicitly mark it dirty every single ti

[PATCH v5 01/12] KVM: Introduce CONFIG_HAVE_KVM_DIRTY_RING

2021-11-21 Thread David Woodhouse
From: David Woodhouse I'd like to make the build include dirty_ring.c based on whether the arch wants it or not. That's a whole lot simpler if there's a config symbol instead of doing it implicitly on KVM_DIRTY_LOG_PAGE_OFFSET being set to something non-zero. Signed-off-by: David Woodhouse ---

[PATCH v5 04/12] KVM: mips: Use Makefile.kvm for common files

2021-11-21 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- arch/mips/kvm/Makefile | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/mips/kvm/Makefile b/arch/mips/kvm/Makefile index d3710959da55..21ff75bcdbc4 100644 --- a/arch/mips/kvm/Makefile +++ b/arch/mips/kvm/Makefile

[PATCH v5 05/12] KVM: RISC-V: Use Makefile.kvm for common files

2021-11-21 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- arch/riscv/kvm/Makefile | 6 +- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/arch/riscv/kvm/Makefile b/arch/riscv/kvm/Makefile index 30cdd1df0098..300590225348 100644 --- a/arch/riscv/kvm/Makefile +++ b/arch/riscv/kvm/

[PATCH v5 07/12] KVM: arm64: Use Makefile.kvm for common files

2021-11-21 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse Acked-by: Marc Zyngier --- arch/arm64/kvm/Makefile | 6 ++ 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile index 989bb5dad2c8..04a53f71a6b6 100644 --- a/arch/arm64/kvm/Makef

[PATCH v5 08/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support

2021-11-21 Thread David Woodhouse
From: David Woodhouse This can be used in two modes. There is an atomic mode where the cached mapping is accessed while holding the rwlock, and a mode where the physical address is used by a vCPU in guest mode. For the latter case, an invalidation will wake the vCPU with the new KVM_REQ_GPC_INVA

[PATCH v5 03/12] KVM: s390: Use Makefile.kvm for common files

2021-11-21 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse Reviewed-by: Christian Borntraeger --- arch/s390/kvm/Makefile | 6 ++ 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/arch/s390/kvm/Makefile b/arch/s390/kvm/Makefile index b3aaadc60ead..e4f50453cf7f 100644 --- a/arch/s390/k