From patchwork Sat Apr 8 12:17:30 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Oliver Upton X-Patchwork-Id: 13205683 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 96AA4C77B61 for ; Sat, 8 Apr 2023 12:18:02 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229902AbjDHMSB (ORCPT ); Sat, 8 Apr 2023 08:18:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56050 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229614AbjDHMSA (ORCPT ); Sat, 8 Apr 2023 08:18:00 -0400 Received: from out-45.mta0.migadu.com (out-45.mta0.migadu.com [91.218.175.45]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E72841BDC for ; Sat, 8 Apr 2023 05:17:58 -0700 (PDT) X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1680956276; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=ed/VqAIsjS0LwI2iXHWPnqeSv4/U5M057y9nzcwmI5Y=; b=YRDgSAmlHofela0sEB1xCaI+EoD+xiyLUd5yLbKfCsMyBPGobiOB1B6bpvkg6V3DdA1CqD ia/25hFAIwodePn26PjMDLLqbfJy0KBhNWTLEKC9INlJwUgiCXPOP3XGxpfEOlXg/lU6Q8 NsOEAUAzkUODhNZyAopi72sVmGQVz88= From: Oliver Upton To: kvmarm@lists.linux.dev Cc: kvm@vger.kernel.org, Marc Zyngier , James Morse , Suzuki K Poulose , Zenghui Yu , Oliver Upton Subject: [PATCH 0/2] KVM: arm64: Reserve SMC64 arch range per SMCCC filter documentation Date: Sat, 8 Apr 2023 12:17:30 +0000 Message-Id: <20230408121732.3411329-1-oliver.upton@linux.dev> MIME-Version: 1.0 X-Migadu-Flow: FLOW_OUT Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org The intention of the SMCCC filter series was that the 'Arm architecture calls' range is reserved, meaning userspace cannot apply a filter to it. Though the documentation calls out both the SMC32 and presently unused SMC64 views, only the SMC32 view of this range was actually reserved. Small series to align UAPI behavior with the documentation and adding a test case for the missed condition. Applies to kvmarm/next. Oliver Upton (2): KVM: arm64: Prevent userspace from handling SMC64 arch range KVM: arm64: Test that SMC64 arch calls are reserved arch/arm64/kvm/hypercalls.c | 25 ++++++++++++++----- .../selftests/kvm/aarch64/smccc_filter.c | 8 ++++++ 2 files changed, 27 insertions(+), 6 deletions(-) base-commit: b87b85f845976e8d23e5f9fe7e399f6fc7360d26