From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 756A2C433F5 for ; Tue, 3 May 2022 19:41:50 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242006AbiECTpV (ORCPT ); Tue, 3 May 2022 15:45:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40758 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240258AbiECTpS (ORCPT ); Tue, 3 May 2022 15:45:18 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C23A822B22 for ; Tue, 3 May 2022 12:41:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 5EA0D61982 for ; Tue, 3 May 2022 19:41:45 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id ADB6DC385A9; Tue, 3 May 2022 19:41:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651606904; bh=NG94txh+wND3OC7140pcpYGPVjRs1x+nXgpG24yMmfU=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=fTc7B894+zfEF/Ma2g4dJtQhjrNeMsFOCFlDcVHnbmYQlPjq9DBbryPnkvZkEfuzB 3ARA0WYl34O10FIHYd5USTMbmpatTX+aMY7kzUfDGjTjuxIhRDqpFwRChhoIuSsh4R DT5+VArmkueWsGt9Wl7oYB6w6Nz6+vX4dZAx5ikEvcUAIUkZfTFkAGF843wnMmf0MB U0o2KAQsUd87BVjwthgDbo6TQFl6RhPGjN6AW14/mVIHKM410kIzHlzHfPV8lx9PDn Bpt7man9BxvlvvodgvhLUOD9UwCdyAp/8gpQeWsIfn0JgNLXG4pcdgJRw22ahidhU2 MC4D5gJh2farQ== Received: from sofa.misterjones.org ([185.219.108.64] helo=wait-a-minute.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1nlyP0-008jAx-4W; Tue, 03 May 2022 20:41:42 +0100 Date: Tue, 03 May 2022 20:41:41 +0100 Message-ID: <87a6byietm.wl-maz@kernel.org> From: Marc Zyngier To: Kalesh Singh Cc: Catalin Marinas , Mark Rutland , James Morse , Fuad Tabba , Masahiro Yamada , Suren Baghdasaryan , kvmarm , Suzuki K Poulose , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , Ard Biesheuvel , Will Deacon , Quentin Perret , LKML , Alexandru Elisei , Zenghui Yu , Changbin Du , "Cc: Android Kernel" , Nathan Chancellor Subject: Re: [PATCH v8 0/6] KVM: arm64: Hypervisor stack enhancements In-Reply-To: References: <20220420214317.3303360-1-kaleshsingh@google.com> <165117574186.3115452.6818682378273681624.b4-ty@kernel.org> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: kaleshsingh@google.com, catalin.marinas@arm.com, mark.rutland@arm.com, james.morse@arm.com, tabba@google.com, masahiroy@kernel.org, surenb@google.com, kvmarm@lists.cs.columbia.edu, suzuki.poulose@arm.com, linux-arm-kernel@lists.infradead.org, ardb@kernel.org, will@kernel.org, qperret@google.com, linux-kernel@vger.kernel.org, alexandru.elisei@arm.com, yuzenghui@huawei.com, changbin.du@intel.com, kernel-team@android.com, nathan@kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 02 May 2022 17:54:45 +0100, Kalesh Singh wrote: > > On Thu, Apr 28, 2022 at 12:55 PM Marc Zyngier wrote: > > > > On Wed, 20 Apr 2022 14:42:51 -0700, Kalesh Singh wrote: > > > This is v8 of the nVHE hypervisor stack enhancements. This version is based > > > on 5.18-rc3. > > > > > > Previous versions can be found at: > > > v7: https://lore.kernel.org/r/20220408200349.1529080-1-kaleshsingh@google.com/ > > > v6: https://lore.kernel.org/r/20220314200148.2695206-1-kaleshsingh@google.com/ > > > v5: https://lore.kernel.org/r/20220307184935.1704614-1-kaleshsingh@google.com/ > > > v4: https://lore.kernel.org/r/20220225033548.1912117-1-kaleshsingh@google.com/ > > > v3: https://lore.kernel.org/r/20220224051439.640768-1-kaleshsingh@google.com/ > > > v2: https://lore.kernel.org/r/20220222165212.2005066-1-kaleshsingh@google.com/ > > > v1: https://lore.kernel.org/r/20220210224220.4076151-1-kaleshsingh@google.com/ > > > > > > [...] > > > > Applied to next, thanks! > > > > [1/6] KVM: arm64: Introduce hyp_alloc_private_va_range() > > commit: 92abe0f81e1385afd8f1dc66206b5be9a514899b > > [2/6] KVM: arm64: Introduce pkvm_alloc_private_va_range() > > commit: f922c13e778d6d5343d4576be785a8204c595113 > > [3/6] KVM: arm64: Add guard pages for KVM nVHE hypervisor stack > > commit: ce3354318a57875dc59f4bb841662e95bfba03db > > [4/6] KVM: arm64: Add guard pages for pKVM (protected nVHE) hypervisor stack > > commit: 1a919b17ef012ca0572bae759c27e5ea02bfb47f > > [5/6] KVM: arm64: Detect and handle hypervisor stack overflows > > commit: 66de19fad9ef47c5376a99bb2b00661f1c788a94 > > [6/6] KVM: arm64: Symbolize the nVHE HYP addresses > > commit: 6ccf9cb557bd32073b0d68baed97f1bd8a40ff1d > > Thanks for applying these Marc. > > I was wondering if instead of taking these through kvm-arm64/next, > could Catalin consolidated these in arm64 for-next/core with Mark > Ruthland's and Madhavan's stacktrace patches[1]? This avoids conflict > and would allow for the hypervisor unwinding changes[2] to apply > cleanly. So far, there hasn't been any reported conflict. If Catalin needs to merge the branch or part of it, it is stable anyway and can be pulled from anywhere. As for the rest of the stacktrace stuff, I haven't had a look yet. Thanks, M. -- Without deviation from the norm, progress is not possible.