[Apologies for the spam, I appear to have forgotten to Cc the lists in my initial posting] Hi Paolo, It was good to see you (and everyone else) at KVM Forum this week! And to celebrate, here's a first batch of fixes for KVM/arm64. A bunch of them are addressing issues introduced by the invasive changes that took place in the 5.10 merge window (MM, nVHE host entry). A few others are addressing some older bugs (VFIO PTE mappings, AArch32 debug, composite huge pages), and a couple of improvements (HYP-visible capabilities are made more robust). Please pull, M. The following changes since commit 4e5dc64c43192b4fd4c96ac150a8f013065f5f5b: Merge branches 'kvm-arm64/pt-new' and 'kvm-arm64/pmu-5.9' into kvmarm-master/next (2020-10-02 09:25:55 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-5.10-1 for you to fetch changes up to 22f553842b14a1289c088a79a67fb479d3fa2a4e: KVM: arm64: Handle Asymmetric AArch32 systems (2020-10-30 16:06:22 +0000) ---------------------------------------------------------------- KVM/arm64 fixes for 5.10, take #1 - Force PTE mapping on device pages provided via VFIO - Fix detection of cacheable mapping at S2 - Fallback to PMD/PTE mappings for composite huge pages - Fix accounting of Stage-2 PGD allocation - Fix AArch32 handling of some of the debug registers - Simplify host HYP entry - Fix stray pointer conversion on nVHE TLB invalidation - Fix initialization of the nVHE code - Simplify handling of capabilities exposed to HYP - Nuke VCPUs caught using a forbidden AArch32 EL0 ---------------------------------------------------------------- Gavin Shan (1): KVM: arm64: Use fallback mapping sizes for contiguous huge page sizes Marc Zyngier (4): KVM: arm64: Don't corrupt tpidr_el2 on failed HVC call KVM: arm64: Remove leftover kern_hyp_va() in nVHE TLB invalidation KVM: arm64: Drop useless PAN setting on host EL1 to EL2 transition KVM: arm64: Fix AArch32 handling of DBGD{CCINT,SCRext} and DBGVCR Mark Rutland (3): KVM: arm64: Factor out is_{vhe,nvhe}_hyp_code() arm64: cpufeature: reorder cpus_have_{const, final}_cap() arm64: cpufeature: upgrade hyp caps to final Qais Yousef (1): KVM: arm64: Handle Asymmetric AArch32 systems Santosh Shukla (1): KVM: arm64: Force PTE mapping on fault resulting in a device mapping Will Deacon (2): KVM: arm64: Allocate stage-2 pgd pages with GFP_KERNEL_ACCOUNT KVM: arm64: Fix masks in stage2_pte_cacheable() arch/arm64/include/asm/cpufeature.h | 40 ++++++++++++++++++++++++++++--------- arch/arm64/include/asm/kvm_host.h | 1 + arch/arm64/include/asm/virt.h | 9 ++++----- arch/arm64/kernel/image-vars.h | 1 - arch/arm64/kvm/arm.c | 19 ++++++++++++++++++ arch/arm64/kvm/hyp/nvhe/host.S | 2 -- arch/arm64/kvm/hyp/nvhe/hyp-init.S | 23 ++++++++++++++------- arch/arm64/kvm/hyp/nvhe/tlb.c | 1 - arch/arm64/kvm/hyp/pgtable.c | 4 ++-- arch/arm64/kvm/mmu.c | 27 ++++++++++++++++++------- arch/arm64/kvm/sys_regs.c | 6 +++--- 11 files changed, 96 insertions(+), 37 deletions(-) _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm