[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <aLqcZ6zL4rTtxfaS@linux.dev>
Date: Fri, 5 Sep 2025 01:16:39 -0700
From: Oliver Upton <oliver.upton@...ux.dev>
To: p@...d.pw
Cc: kvmarm@...ts.linux.dev, linux-arm-kernel@...ts.infradead.org,
linux-kernel@...r.kernel.org, maz@...nel.org, joey.gouly@....com,
suzuki.poulose@....com, yuzenghui@...wei.com,
catalin.marinas@....com, will@...nel.org
Subject: Re: [PATCH v2] KVM: arm64: nv: Fix incorrect VNCR invalidation range
calculation
Hi Dongha,
Thanks for respinning. Please send new versions of a patch series as a
new thread (i.e. don't specify In-Reply-To), it helps a lot for patch
organization on the receiving side.
On Fri, Sep 05, 2025 at 05:30:08PM +0900, p@...d.pw wrote:
> From: leedongha <p@...d.pw>
>
> The code for invalidating VNCR entries in both kvm_invalidate_vncr_ipa()
> and invalidate_vncr_va() incorrectly uses a bitwise AND with `(size - 1)`
> instead of `~(size - 1)` to align the start address. This results
> in masking the address bits instead of aligning them down to the start
> of the block.
>
> This bug may cause stale VNCR TLB entries to remain valid even after a
> TLBI or MMU notifier, leading to incorrect memory translation and
> unexpected guest behavior.
>
> Credit
> Team 0xB6 in bob14:
> DongHa Lee (@GAP-dev)
> Gyujeong Jin (@gyutrange)
> Daehyeon Ko (@4ncienth)
> Geonha Lee (@leegn4a)
> Hyungyu Oh (@ohhyungyu)
> Jaewon Yang (@R4mbb)
>
> Link: https://lore.kernel.org/r/20250903123949.24858-1-p@sswd.pw
> Reviewed-by: Marc Zyngier <maz@...nel.org>
> Signed-off-by: Dongha Lee <p@...d.pw>
This SOB still doesn't match the one you used to author the patch.
Please make sure the author and SOB lines are an exact match, both name
and email.
Otherwise this looks good to me. I will apply it if you can respin once
more.
Thanks,
Oliver
Powered by blists - more mailing lists