lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID:
 <SA1PR12MB71992A7E86741878935DC385B0592@SA1PR12MB7199.namprd12.prod.outlook.com>
Date: Tue, 27 Feb 2024 08:45:38 +0000
From: Ankit Agrawal <ankita@...dia.com>
To: Oliver Upton <oliver.upton@...ux.dev>, "wangjinchao@...sion.com"
	<wangjinchao@...sion.com>, "shahuang@...hat.com" <shahuang@...hat.com>,
	"catalin.marinas@....com" <catalin.marinas@....com>, "ryan.roberts@....com"
	<ryan.roberts@....com>, "stefanha@...hat.com" <stefanha@...hat.com>,
	"yi.l.liu@...el.com" <yi.l.liu@...el.com>, "david@...hat.com"
	<david@...hat.com>, Jason Gunthorpe <jgg@...pe.ca>, "lpieralisi@...nel.org"
	<lpieralisi@...nel.org>, "gshan@...hat.com" <gshan@...hat.com>,
	"brauner@...nel.org" <brauner@...nel.org>, "rananta@...gle.com"
	<rananta@...gle.com>, "alex.williamson@...hat.com"
	<alex.williamson@...hat.com>, "suzuki.poulose@....com"
	<suzuki.poulose@....com>, "kevin.tian@...el.com" <kevin.tian@...el.com>,
	"surenb@...gle.com" <surenb@...gle.com>, "ricarkol@...gle.com"
	<ricarkol@...gle.com>, "linus.walleij@...aro.org" <linus.walleij@...aro.org>,
	"james.morse@....com" <james.morse@....com>, "ardb@...nel.org"
	<ardb@...nel.org>, "will@...nel.org" <will@...nel.org>,
	"akpm@...ux-foundation.org" <akpm@...ux-foundation.org>, "maz@...nel.org"
	<maz@...nel.org>, "bhe@...hat.com" <bhe@...hat.com>,
	"reinette.chatre@...el.com" <reinette.chatre@...el.com>,
	"yuzenghui@...wei.com" <yuzenghui@...wei.com>, "andreyknvl@...il.com"
	<andreyknvl@...il.com>, "linux-mm@...ck.org" <linux-mm@...ck.org>,
	"mark.rutland@....com" <mark.rutland@....com>
CC: Dan Williams <danw@...dia.com>, Andy Currid <acurrid@...dia.com>, Alistair
 Popple <apopple@...dia.com>, Matt Ochs <mochs@...dia.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Aniket Agashe
	<aniketa@...dia.com>, Neo Jia <cjia@...dia.com>, "kvm@...r.kernel.org"
	<kvm@...r.kernel.org>, John Hubbard <jhubbard@...dia.com>,
	"kvmarm@...ts.linux.dev" <kvmarm@...ts.linux.dev>, Zhi Wang
	<zhiw@...dia.com>, Kirti Wankhede <kwankhede@...dia.com>, Vikram Sethi
	<vsethi@...dia.com>, "linux-arm-kernel@...ts.infradead.org"
	<linux-arm-kernel@...ts.infradead.org>, "Tarun Gupta (SW-GPU)"
	<targupta@...dia.com>
Subject: Re: [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and
 NORMAL_NC for IO memory

>>
>> Currently, KVM for ARM64 maps at stage 2 memory that is considered device
>> with DEVICE_nGnRE memory attributes; this setting overrides (per
>> ARM architecture [1]) any device MMIO mapping present at stage 1,
>> resulting in a set-up whereby a guest operating system cannot
>> determine device MMIO mapping memory attributes on its own but
>> it is always overridden by the KVM stage 2 default.
>>
>> [...]
>
> High time to get this cooking in -next. Looks like there aren't any
> conflicts w/ VFIO, but if that changes I've pushed a topic branch to:
>
>  https://git.kernel.org/pub/scm/linux/kernel/git/oupton/linux.git/log/?h=kvm-arm64/vfio-normal-nc
>
> Applied to kvmarm/next, thanks!

Thanks Oliver for your efforts. Pardon my naivety, but what would the
sequence of steps that this series go through next before landing in an
rc branch? Also, what is the earliest branch this is supposed to land
assuming all goes well?

>
> [1/4] KVM: arm64: Introduce new flag for non-cacheable IO memory
>      https://git.kernel.org/kvmarm/kvmarm/c/c034ec84e879
> [2/4] mm: Introduce new flag to indicate wc safe
>      https://git.kernel.org/kvmarm/kvmarm/c/5c656fcdd6c6
> [3/4] KVM: arm64: Set io memory s2 pte as normalnc for vfio pci device
>      https://git.kernel.org/kvmarm/kvmarm/c/8c47ce3e1d2c
> [4/4] vfio: Convey kvm that the vfio-pci device is wc safe
>      https://git.kernel.org/kvmarm/kvmarm/c/a39d3a966a09

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ