[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <176037441177.969330.7925084033862079350.b4-ty@kernel.org>
Date: Mon, 13 Oct 2025 17:56:03 +0100
From: Marc Zyngier <maz@...nel.org>
To: Oliver Upton <oliver.upton@...ux.dev>,
Catalin Marinas <catalin.marinas@....com>,
Will Deacon <will@...nel.org>,
Alexandru Elisei <alexandru.elisei@....com>,
Mukesh Ojha <mukesh.ojha@....qualcomm.com>
Cc: Joey Gouly <joey.gouly@....com>,
Suzuki K Poulose <suzuki.poulose@....com>,
Zenghui Yu <yuzenghui@...wei.com>,
linux-arm-kernel@...ts.infradead.org,
kvmarm@...ts.linux.dev,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2] KVM: arm64: Guard PMSCR_EL1 initialization with SPE presence check
On Fri, 10 Oct 2025 23:17:07 +0530, Mukesh Ojha wrote:
> Commit efad60e46057 ("KVM: arm64: Initialize PMSCR_EL1 when in VHE")
> does not perform sufficient check before initializing PMSCR_EL1 to 0
> when running in VHE mode. On some platforms, this causes the system to
> hang during boot, as EL3 has not delegated access to the Profiling
> Buffer to the Non-secure world, nor does it reinject an UNDEF on sysreg
> trap.
>
> [...]
Applied to fixes, thanks!
[1/1] KVM: arm64: Guard PMSCR_EL1 initialization with SPE presence check
commit: c35dd838666d47de2848639234ec32e3ba22b49f
Cheers,
M.
--
Without deviation from the norm, progress is not possible.
Powered by blists - more mailing lists