Skip to content

Commit 7beb771

Browse files
committed
Automatic merge of 'master' into merge (2024-09-30 19:21)
2 parents 33af155 + 9852d85 commit 7beb771

File tree

342 files changed

+5911
-3360
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

342 files changed

+5911
-3360
lines changed

Documentation/admin-guide/kernel-parameters.txt

+17
Original file line numberDiff line numberDiff line change
@@ -2677,6 +2677,23 @@
26772677

26782678
Default is Y (on).
26792679

2680+
kvm.enable_virt_at_load=[KVM,ARM64,LOONGARCH,MIPS,RISCV,X86]
2681+
If enabled, KVM will enable virtualization in hardware
2682+
when KVM is loaded, and disable virtualization when KVM
2683+
is unloaded (if KVM is built as a module).
2684+
2685+
If disabled, KVM will dynamically enable and disable
2686+
virtualization on-demand when creating and destroying
2687+
VMs, i.e. on the 0=>1 and 1=>0 transitions of the
2688+
number of VMs.
2689+
2690+
Enabling virtualization at module lode avoids potential
2691+
latency for creation of the 0=>1 VM, as KVM serializes
2692+
virtualization enabling across all online CPUs. The
2693+
"cost" of enabling virtualization when KVM is loaded,
2694+
is that doing so may interfere with using out-of-tree
2695+
hypervisors that want to "own" virtualization hardware.
2696+
26802697
kvm.enable_vmware_backdoor=[KVM] Support VMware backdoor PV interface.
26812698
Default is false (don't support).
26822699

Documentation/arch/s390/vfio-ap.rst

+30
Original file line numberDiff line numberDiff line change
@@ -999,6 +999,36 @@ the vfio_ap mediated device to which it is assigned as long as each new APQN
999999
resulting from plugging it in references a queue device bound to the vfio_ap
10001000
device driver.
10011001

1002+
Driver Features
1003+
===============
1004+
The vfio_ap driver exposes a sysfs file containing supported features.
1005+
This exists so third party tools (like Libvirt and mdevctl) can query the
1006+
availability of specific features.
1007+
1008+
The features list can be found here: /sys/bus/matrix/devices/matrix/features
1009+
1010+
Entries are space delimited. Each entry consists of a combination of
1011+
alphanumeric and underscore characters.
1012+
1013+
Example:
1014+
cat /sys/bus/matrix/devices/matrix/features
1015+
guest_matrix dyn ap_config
1016+
1017+
the following features are advertised:
1018+
1019+
---------------+---------------------------------------------------------------+
1020+
| Flag | Description |
1021+
+==============+===============================================================+
1022+
| guest_matrix | guest_matrix attribute exists. It reports the matrix of |
1023+
| | adapters and domains that are or will be passed through to a |
1024+
| | guest when the mdev is attached to it. |
1025+
+--------------+---------------------------------------------------------------+
1026+
| dyn | Indicates hot plug/unplug of AP adapters, domains and control |
1027+
| | domains for a guest to which the mdev is attached. |
1028+
+------------+-----------------------------------------------------------------+
1029+
| ap_config | ap_config interface for one-shot modifications to mdev config |
1030+
+--------------+---------------------------------------------------------------+
1031+
10021032
Limitations
10031033
===========
10041034
Live guest migration is not supported for guests using AP devices without

Documentation/core-api/cleanup.rst

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
.. SPDX-License-Identifier: GPL-2.0
2+
3+
===========================
4+
Scope-based Cleanup Helpers
5+
===========================
6+
7+
.. kernel-doc:: include/linux/cleanup.h
8+
:doc: scope-based cleanup helpers

Documentation/core-api/index.rst

+1
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ Library functionality that is used throughout the kernel.
3535

3636
kobject
3737
kref
38+
cleanup
3839
assoc_array
3940
xarray
4041
maple_tree

Documentation/devicetree/bindings/mailbox/mtk,adsp-mbox.yaml

+9-3
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,15 @@ description: |
1717
1818
properties:
1919
compatible:
20-
enum:
21-
- mediatek,mt8195-adsp-mbox
22-
- mediatek,mt8186-adsp-mbox
20+
oneOf:
21+
- enum:
22+
- mediatek,mt8186-adsp-mbox
23+
- mediatek,mt8195-adsp-mbox
24+
- items:
25+
- enum:
26+
- mediatek,mt8188-adsp-mbox
27+
- const: mediatek,mt8186-adsp-mbox
28+
2329

2430
"#mbox-cells":
2531
const: 0

Documentation/devicetree/bindings/mailbox/qcom-ipcc.yaml

+2
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,9 @@ properties:
2424
compatible:
2525
items:
2626
- enum:
27+
- qcom,qcs8300-ipcc
2728
- qcom,qdu1000-ipcc
29+
- qcom,sa8255p-ipcc
2830
- qcom,sa8775p-ipcc
2931
- qcom,sc7280-ipcc
3032
- qcom,sc8280xp-ipcc

Documentation/virt/kvm/api.rst

+27-4
Original file line numberDiff line numberDiff line change
@@ -4214,7 +4214,9 @@ whether or not KVM_CAP_X86_USER_SPACE_MSR's KVM_MSR_EXIT_REASON_FILTER is
42144214
enabled. If KVM_MSR_EXIT_REASON_FILTER is enabled, KVM will exit to userspace
42154215
on denied accesses, i.e. userspace effectively intercepts the MSR access. If
42164216
KVM_MSR_EXIT_REASON_FILTER is not enabled, KVM will inject a #GP into the guest
4217-
on denied accesses.
4217+
on denied accesses. Note, if an MSR access is denied during emulation of MSR
4218+
load/stores during VMX transitions, KVM ignores KVM_MSR_EXIT_REASON_FILTER.
4219+
See the below warning for full details.
42184220

42194221
If an MSR access is allowed by userspace, KVM will emulate and/or virtualize
42204222
the access in accordance with the vCPU model. Note, KVM may still ultimately
@@ -4229,9 +4231,22 @@ filtering. In that mode, ``KVM_MSR_FILTER_DEFAULT_DENY`` is invalid and causes
42294231
an error.
42304232

42314233
.. warning::
4232-
MSR accesses as part of nested VM-Enter/VM-Exit are not filtered.
4233-
This includes both writes to individual VMCS fields and reads/writes
4234-
through the MSR lists pointed to by the VMCS.
4234+
MSR accesses that are side effects of instruction execution (emulated or
4235+
native) are not filtered as hardware does not honor MSR bitmaps outside of
4236+
RDMSR and WRMSR, and KVM mimics that behavior when emulating instructions
4237+
to avoid pointless divergence from hardware. E.g. RDPID reads MSR_TSC_AUX,
4238+
SYSENTER reads the SYSENTER MSRs, etc.
4239+
4240+
MSRs that are loaded/stored via dedicated VMCS fields are not filtered as
4241+
part of VM-Enter/VM-Exit emulation.
4242+
4243+
MSRs that are loaded/store via VMX's load/store lists _are_ filtered as part
4244+
of VM-Enter/VM-Exit emulation. If an MSR access is denied on VM-Enter, KVM
4245+
synthesizes a consistency check VM-Exit(EXIT_REASON_MSR_LOAD_FAIL). If an
4246+
MSR access is denied on VM-Exit, KVM synthesizes a VM-Abort. In short, KVM
4247+
extends Intel's architectural list of MSRs that cannot be loaded/saved via
4248+
the VM-Enter/VM-Exit MSR list. It is platform owner's responsibility to
4249+
to communicate any such restrictions to their end users.
42354250

42364251
x2APIC MSR accesses cannot be filtered (KVM silently ignores filters that
42374252
cover any x2APIC MSRs).
@@ -8082,6 +8097,14 @@ KVM_X86_QUIRK_MWAIT_NEVER_UD_FAULTS By default, KVM emulates MONITOR/MWAIT (if
80828097
guest CPUID on writes to MISC_ENABLE if
80838098
KVM_X86_QUIRK_MISC_ENABLE_NO_MWAIT is
80848099
disabled.
8100+
8101+
KVM_X86_QUIRK_SLOT_ZAP_ALL By default, KVM invalidates all SPTEs in
8102+
fast way for memslot deletion when VM type
8103+
is KVM_X86_DEFAULT_VM.
8104+
When this quirk is disabled or when VM type
8105+
is other than KVM_X86_DEFAULT_VM, KVM zaps
8106+
only leaf SPTEs that are within the range of
8107+
the memslot being deleted.
80858108
=================================== ============================================
80868109

80878110
7.32 KVM_CAP_MAX_VCPU_ID

Documentation/virt/kvm/locking.rst

+24-8
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ The acquisition orders for mutexes are as follows:
1111

1212
- cpus_read_lock() is taken outside kvm_lock
1313

14+
- kvm_usage_lock is taken outside cpus_read_lock()
15+
1416
- kvm->lock is taken outside vcpu->mutex
1517

1618
- kvm->lock is taken outside kvm->slots_lock and kvm->irq_lock
@@ -24,6 +26,13 @@ The acquisition orders for mutexes are as follows:
2426
are taken on the waiting side when modifying memslots, so MMU notifiers
2527
must not take either kvm->slots_lock or kvm->slots_arch_lock.
2628

29+
cpus_read_lock() vs kvm_lock:
30+
31+
- Taking cpus_read_lock() outside of kvm_lock is problematic, despite that
32+
being the official ordering, as it is quite easy to unknowingly trigger
33+
cpus_read_lock() while holding kvm_lock. Use caution when walking vm_list,
34+
e.g. avoid complex operations when possible.
35+
2736
For SRCU:
2837

2938
- ``synchronize_srcu(&kvm->srcu)`` is called inside critical sections
@@ -227,10 +236,16 @@ time it will be set using the Dirty tracking mechanism described above.
227236
:Type: mutex
228237
:Arch: any
229238
:Protects: - vm_list
230-
- kvm_usage_count
239+
240+
``kvm_usage_lock``
241+
^^^^^^^^^^^^^^^^^^
242+
243+
:Type: mutex
244+
:Arch: any
245+
:Protects: - kvm_usage_count
231246
- hardware virtualization enable/disable
232-
:Comment: KVM also disables CPU hotplug via cpus_read_lock() during
233-
enable/disable.
247+
:Comment: Exists to allow taking cpus_read_lock() while kvm_usage_count is
248+
protected, which simplifies the virtualization enabling logic.
234249

235250
``kvm->mn_invalidate_lock``
236251
^^^^^^^^^^^^^^^^^^^^^^^^^^^
@@ -290,11 +305,12 @@ time it will be set using the Dirty tracking mechanism described above.
290305
wakeup.
291306

292307
``vendor_module_lock``
293-
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
308+
^^^^^^^^^^^^^^^^^^^^^^
294309
:Type: mutex
295310
:Arch: x86
296311
:Protects: loading a vendor module (kvm_amd or kvm_intel)
297-
:Comment: Exists because using kvm_lock leads to deadlock. cpu_hotplug_lock is
298-
taken outside of kvm_lock, e.g. in KVM's CPU online/offline callbacks, and
299-
many operations need to take cpu_hotplug_lock when loading a vendor module,
300-
e.g. updating static calls.
312+
:Comment: Exists because using kvm_lock leads to deadlock. kvm_lock is taken
313+
in notifiers, e.g. __kvmclock_cpufreq_notifier(), that may be invoked while
314+
cpu_hotplug_lock is held, e.g. from cpufreq_boost_trigger_state(), and many
315+
operations need to take cpu_hotplug_lock when loading a vendor module, e.g.
316+
updating static calls.

MAINTAINERS

+3
Original file line numberDiff line numberDiff line change
@@ -15678,6 +15678,9 @@ F: include/dt-bindings/clock/mobileye,eyeq5-clk.h
1567815678

1567915679
MODULE SUPPORT
1568015680
M: Luis Chamberlain <[email protected]>
15681+
R: Petr Pavlu <[email protected]>
15682+
R: Sami Tolvanen <[email protected]>
15683+
R: Daniel Gomez <[email protected]>
1568115684
1568215685
1568315686
S: Maintained

Makefile

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
# SPDX-License-Identifier: GPL-2.0
22
VERSION = 6
3-
PATCHLEVEL = 11
3+
PATCHLEVEL = 12
44
SUBLEVEL = 0
5-
EXTRAVERSION =
5+
EXTRAVERSION = -rc1
66
NAME = Baby Opossum Posse
77

88
# *DOCUMENTATION*

arch/arm64/kvm/arm.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -2164,7 +2164,7 @@ static void cpu_hyp_uninit(void *discard)
21642164
}
21652165
}
21662166

2167-
int kvm_arch_hardware_enable(void)
2167+
int kvm_arch_enable_virtualization_cpu(void)
21682168
{
21692169
/*
21702170
* Most calls to this function are made with migration
@@ -2184,7 +2184,7 @@ int kvm_arch_hardware_enable(void)
21842184
return 0;
21852185
}
21862186

2187-
void kvm_arch_hardware_disable(void)
2187+
void kvm_arch_disable_virtualization_cpu(void)
21882188
{
21892189
kvm_timer_cpu_down();
21902190
kvm_vgic_cpu_down();
@@ -2380,7 +2380,7 @@ static int __init do_pkvm_init(u32 hyp_va_bits)
23802380

23812381
/*
23822382
* The stub hypercalls are now disabled, so set our local flag to
2383-
* prevent a later re-init attempt in kvm_arch_hardware_enable().
2383+
* prevent a later re-init attempt in kvm_arch_enable_virtualization_cpu().
23842384
*/
23852385
__this_cpu_write(kvm_hyp_initialized, 1);
23862386
preempt_enable();

arch/loongarch/kvm/main.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -261,7 +261,7 @@ long kvm_arch_dev_ioctl(struct file *filp,
261261
return -ENOIOCTLCMD;
262262
}
263263

264-
int kvm_arch_hardware_enable(void)
264+
int kvm_arch_enable_virtualization_cpu(void)
265265
{
266266
unsigned long env, gcfg = 0;
267267

@@ -300,7 +300,7 @@ int kvm_arch_hardware_enable(void)
300300
return 0;
301301
}
302302

303-
void kvm_arch_hardware_disable(void)
303+
void kvm_arch_disable_virtualization_cpu(void)
304304
{
305305
write_csr_gcfg(0);
306306
write_csr_gstat(0);

arch/mips/include/asm/kvm_host.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -728,8 +728,8 @@ struct kvm_mips_callbacks {
728728
int (*handle_fpe)(struct kvm_vcpu *vcpu);
729729
int (*handle_msa_disabled)(struct kvm_vcpu *vcpu);
730730
int (*handle_guest_exit)(struct kvm_vcpu *vcpu);
731-
int (*hardware_enable)(void);
732-
void (*hardware_disable)(void);
731+
int (*enable_virtualization_cpu)(void);
732+
void (*disable_virtualization_cpu)(void);
733733
int (*check_extension)(struct kvm *kvm, long ext);
734734
int (*vcpu_init)(struct kvm_vcpu *vcpu);
735735
void (*vcpu_uninit)(struct kvm_vcpu *vcpu);

arch/mips/kvm/mips.c

+4-4
Original file line numberDiff line numberDiff line change
@@ -125,14 +125,14 @@ int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
125125
return 1;
126126
}
127127

128-
int kvm_arch_hardware_enable(void)
128+
int kvm_arch_enable_virtualization_cpu(void)
129129
{
130-
return kvm_mips_callbacks->hardware_enable();
130+
return kvm_mips_callbacks->enable_virtualization_cpu();
131131
}
132132

133-
void kvm_arch_hardware_disable(void)
133+
void kvm_arch_disable_virtualization_cpu(void)
134134
{
135-
kvm_mips_callbacks->hardware_disable();
135+
kvm_mips_callbacks->disable_virtualization_cpu();
136136
}
137137

138138
int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)

arch/mips/kvm/vz.c

+4-4
Original file line numberDiff line numberDiff line change
@@ -2869,7 +2869,7 @@ static unsigned int kvm_vz_resize_guest_vtlb(unsigned int size)
28692869
return ret + 1;
28702870
}
28712871

2872-
static int kvm_vz_hardware_enable(void)
2872+
static int kvm_vz_enable_virtualization_cpu(void)
28732873
{
28742874
unsigned int mmu_size, guest_mmu_size, ftlb_size;
28752875
u64 guest_cvmctl, cvmvmconfig;
@@ -2983,7 +2983,7 @@ static int kvm_vz_hardware_enable(void)
29832983
return 0;
29842984
}
29852985

2986-
static void kvm_vz_hardware_disable(void)
2986+
static void kvm_vz_disable_virtualization_cpu(void)
29872987
{
29882988
u64 cvmvmconfig;
29892989
unsigned int mmu_size;
@@ -3280,8 +3280,8 @@ static struct kvm_mips_callbacks kvm_vz_callbacks = {
32803280
.handle_msa_disabled = kvm_trap_vz_handle_msa_disabled,
32813281
.handle_guest_exit = kvm_trap_vz_handle_guest_exit,
32823282

3283-
.hardware_enable = kvm_vz_hardware_enable,
3284-
.hardware_disable = kvm_vz_hardware_disable,
3283+
.enable_virtualization_cpu = kvm_vz_enable_virtualization_cpu,
3284+
.disable_virtualization_cpu = kvm_vz_disable_virtualization_cpu,
32853285
.check_extension = kvm_vz_check_extension,
32863286
.vcpu_init = kvm_vz_vcpu_init,
32873287
.vcpu_uninit = kvm_vz_vcpu_uninit,

arch/riscv/kvm/main.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ long kvm_arch_dev_ioctl(struct file *filp,
2020
return -EINVAL;
2121
}
2222

23-
int kvm_arch_hardware_enable(void)
23+
int kvm_arch_enable_virtualization_cpu(void)
2424
{
2525
csr_write(CSR_HEDELEG, KVM_HEDELEG_DEFAULT);
2626
csr_write(CSR_HIDELEG, KVM_HIDELEG_DEFAULT);
@@ -35,7 +35,7 @@ int kvm_arch_hardware_enable(void)
3535
return 0;
3636
}
3737

38-
void kvm_arch_hardware_disable(void)
38+
void kvm_arch_disable_virtualization_cpu(void)
3939
{
4040
kvm_riscv_aia_disable();
4141

arch/s390/configs/debug_defconfig

+1
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@ CONFIG_CMM=m
5959
CONFIG_APPLDATA_BASE=y
6060
CONFIG_S390_HYPFS_FS=y
6161
CONFIG_KVM=m
62+
CONFIG_KVM_S390_UCONTROL=y
6263
CONFIG_S390_UNWIND_SELFTEST=m
6364
CONFIG_S390_KPROBES_SANITY_TEST=m
6465
CONFIG_S390_MODULES_SANITY_TEST=m

0 commit comments

Comments
 (0)