Re: [PATCH 6.6 6/8] KVM: arm64: Refactor exit handlers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



[ Sasha's backport helper bot ]

Hi,

✅ All tests passed successfully. No issues detected.
No action required from the submitter.

The upstream commit SHA1 provided is correct: 9b66195063c5a145843547b1d692bd189be85287

WARNING: Author mismatch between patch and upstream commit:
Backport author: Mark Brown<broonie@xxxxxxxxxx>
Commit author: Mark Rutland<mark.rutland@xxxxxxx>

Status in newer kernel trees:
6.13.y | Present (different SHA1: 4c68a146aaaa)
6.12.y | Present (different SHA1: 14aab4391836)

Note: The patch differs from the upstream commit:
---
1:  9b66195063c5a ! 1:  15cf8a2271ac3 KVM: arm64: Refactor exit handlers
    @@ Metadata
      ## Commit message ##
         KVM: arm64: Refactor exit handlers
     
    +    [ Upstream commit 9b66195063c5a145843547b1d692bd189be85287 ]
    +
         The hyp exit handling logic is largely shared between VHE and nVHE/hVHE,
         with common logic in arch/arm64/kvm/hyp/include/hyp/switch.h. The code
         in the header depends on function definitions provided by
    @@ Commit message
         Reviewed-by: Oliver Upton <oliver.upton@xxxxxxxxx>
         Link: https://lore.kernel.org/r/20250210195226.1215254-7-mark.rutland@xxxxxxx
         Signed-off-by: Marc Zyngier <maz@xxxxxxxxxx>
    +    Signed-off-by: Mark Brown <broonie@xxxxxxxxxx>
     
      ## arch/arm64/kvm/hyp/include/hyp/switch.h ##
     @@ arch/arm64/kvm/hyp/include/hyp/switch.h: static bool kvm_hyp_handle_dabt_low(struct kvm_vcpu *vcpu, u64 *exit_code)
    @@ arch/arm64/kvm/hyp/nvhe/switch.c: static const exit_handler_fn *kvm_get_exit_han
     +static inline bool fixup_guest_exit(struct kvm_vcpu *vcpu, u64 *exit_code)
      {
     +	const exit_handler_fn *handlers = kvm_get_exit_handler_array(vcpu);
    -+
    + 	struct kvm *kvm = kern_hyp_va(vcpu->kvm);
    + 
     +	synchronize_vcpu_pstate(vcpu, exit_code);
     +
     +	/*
    @@ arch/arm64/kvm/hyp/nvhe/switch.c: static const exit_handler_fn *kvm_get_exit_han
     +	 * it.  The check below is based on the one in
     +	 * kvm_arch_vcpu_ioctl_run().
     +	 */
    - 	if (unlikely(vcpu_is_protected(vcpu) && vcpu_mode_is_32bit(vcpu))) {
    + 	if (kvm_vm_is_protected(kvm) && vcpu_mode_is_32bit(vcpu)) {
      		/*
      		 * As we have caught the guest red-handed, decide that it isn't
     @@ arch/arm64/kvm/hyp/nvhe/switch.c: static void early_exit_filter(struct kvm_vcpu *vcpu, u64 *exit_code)
    @@ arch/arm64/kvm/hyp/nvhe/switch.c: static void early_exit_filter(struct kvm_vcpu
     
      ## arch/arm64/kvm/hyp/vhe/switch.c ##
     @@ arch/arm64/kvm/hyp/vhe/switch.c: static const exit_handler_fn hyp_exit_handlers[] = {
    - 	[ESR_ELx_EC_MOPS]		= kvm_hyp_handle_mops,
    + 	[ESR_ELx_EC_PAC]		= kvm_hyp_handle_ptrauth,
      };
      
     -static const exit_handler_fn *kvm_get_exit_handler_array(struct kvm_vcpu *vcpu)
---

Results of testing on various branches:

| Branch                    | Patch Apply | Build Test |
|---------------------------|-------------|------------|
| stable/linux-6.12.y       |  Success    |  Success   |




[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux