From patchwork Tue Mar 19 13:30:20 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 10859613 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id EEC5E922 for ; Tue, 19 Mar 2019 13:30:48 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D5C3E2917D for ; Tue, 19 Mar 2019 13:30:48 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id C9FAD2968A; Tue, 19 Mar 2019 13:30:48 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 7774F2917D for ; Tue, 19 Mar 2019 13:30:48 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727018AbfCSNar (ORCPT ); Tue, 19 Mar 2019 09:30:47 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:51644 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726717AbfCSNar (ORCPT ); Tue, 19 Mar 2019 09:30:47 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 82DEE1596; Tue, 19 Mar 2019 06:30:46 -0700 (PDT) Received: from why.lan (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 74D1C3F59C; Tue, 19 Mar 2019 06:30:44 -0700 (PDT) From: Marc Zyngier To: linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org Cc: Christoffer Dall , Andre Przywara , Eric Auger , Suzuki K Poulose , Julien Thierry , James Morse Subject: [PATCH 0/2] KVM: arm/arm64: vgic-its: Guest memory access fixes Date: Tue, 19 Mar 2019 13:30:20 +0000 Message-Id: <20190319133022.10693-1-marc.zyngier@arm.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP While messing with something completely different, I managed to trigger a number of RCU warnings, due to the lack of srcu locking in the ITS code. Andre partially addressed those last year[1], but there was some more left. [1] http://lists.infradead.org/pipermail/linux-arm-kernel/2018-May/577056.html Marc Zyngier (2): KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots arch/arm/include/asm/kvm_mmu.h | 11 +++++++++++ arch/arm64/include/asm/kvm_mmu.h | 11 +++++++++++ virt/kvm/arm/vgic/vgic-its.c | 21 ++++++++++++++------- 3 files changed, 36 insertions(+), 7 deletions(-)