Re: [PATCH 0/9] arm64: Stolen time support

2020-07-20 Thread zhukeqian
Hi Steven, On 2019/8/2 22:50, Steven Price wrote: > This series add support for paravirtualized time for arm64 guests and > KVM hosts following the specification in Arm's document DEN 0057A: > > https://developer.arm.com/docs/den0057/a > > It implements support for stolen time, allowing the gues

Re: [PATCH 07/37] KVM: arm64: Separate SError detection from VAXorcism

2020-07-20 Thread Andrew Scull
On Wed, Jul 15, 2020 at 07:44:08PM +0100, Andrew Scull wrote: > diff --git a/arch/arm64/kvm/hyp/hyp-entry.S b/arch/arm64/kvm/hyp/hyp-entry.S > index e727bee8e110..c441aabb8ab0 100644 > --- a/arch/arm64/kvm/hyp/hyp-entry.S > +++ b/arch/arm64/kvm/hyp/hyp-entry.S > @@ -177,7 +177,6 @@ el2_error: >

[PATCH stable 4.14.y] arm64: entry: Place an SB sequence following an ERET instruction

2020-07-20 Thread Florian Fainelli
From: Will Deacon commit 679db70801da9fda91d26caf13bf5b5ccc74e8e8 upstream Some CPUs can speculate past an ERET instruction and potentially perform speculative accesses to memory before processing the exception return. Since the register state is often controlled by a lower privilege level at th

[PATCH stable 4.19.y] arm64: entry: Place an SB sequence following an ERET instruction

2020-07-20 Thread Florian Fainelli
From: Will Deacon commit 679db70801da9fda91d26caf13bf5b5ccc74e8e8 upstream Some CPUs can speculate past an ERET instruction and potentially perform speculative accesses to memory before processing the exception return. Since the register state is often controlled by a lower privilege level at th

Re: [PATCH stable v4.9 v2] arm64: entry: Place an SB sequence following an ERET instruction

2020-07-20 Thread Florian Fainelli
On 7/20/20 6:04 AM, Greg KH wrote: > On Thu, Jul 09, 2020 at 12:50:23PM -0700, Florian Fainelli wrote: >> From: Will Deacon >> >> commit 679db70801da9fda91d26caf13bf5b5ccc74e8e8 upstream >> >> Some CPUs can speculate past an ERET instruction and potentially perform >> speculative accesses to memor

Re: [PATCH 07/37] KVM: arm64: Separate SError detection from VAXorcism

2020-07-20 Thread Andrew Scull
On Sat, Jul 18, 2020 at 10:00:30AM +0100, Marc Zyngier wrote: > Hi Andrew, > > On Wed, 15 Jul 2020 19:44:08 +0100, > Andrew Scull wrote: > > > > When exiting a guest, just check whether there is an SError pending and > > set the bit in the exit code. The fixup then initiates the ceremony > > sho

Re: [PATCH 07/37] KVM: arm64: Separate SError detection from VAXorcism

2020-07-20 Thread Marc Zyngier
On 2020-07-20 16:40, Andrew Scull wrote: On Wed, Jul 15, 2020 at 07:44:08PM +0100, Andrew Scull wrote: diff --git a/arch/arm64/kvm/hyp/hyp-entry.S b/arch/arm64/kvm/hyp/hyp-entry.S index e727bee8e110..c441aabb8ab0 100644 --- a/arch/arm64/kvm/hyp/hyp-entry.S +++ b/arch/arm64/kvm/hyp/hyp-entry.S @

Re: [PATCH 07/37] KVM: arm64: Separate SError detection from VAXorcism

2020-07-20 Thread Marc Zyngier
On 2020-07-20 15:13, Andrew Scull wrote: On Sat, Jul 18, 2020 at 10:00:30AM +0100, Marc Zyngier wrote: Hi Andrew, On Wed, 15 Jul 2020 19:44:08 +0100, Andrew Scull wrote: > > When exiting a guest, just check whether there is an SError pending and > set the bit in the exit code. The fixup then i

Re: [PATCH stable v4.9 v2] arm64: entry: Place an SB sequence following an ERET instruction

2020-07-20 Thread Greg KH
On Thu, Jul 09, 2020 at 12:50:23PM -0700, Florian Fainelli wrote: > From: Will Deacon > > commit 679db70801da9fda91d26caf13bf5b5ccc74e8e8 upstream > > Some CPUs can speculate past an ERET instruction and potentially perform > speculative accesses to memory before processing the exception return.