Skip to content

Commit 47e8eec

Browse files
committed
Merge tag 'kvmarm-5.19' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
KVM/arm64 updates for 5.19 - Add support for the ARMv8.6 WFxT extension - Guard pages for the EL2 stacks - Trap and emulate AArch32 ID registers to hide unsupported features - Ability to select and save/restore the set of hypercalls exposed to the guest - Support for PSCI-initiated suspend in collaboration with userspace - GICv3 register-based LPI invalidation support - Move host PMU event merging into the vcpu data structure - GICv3 ITS save/restore fixes - The usual set of small-scale cleanups and fixes [Due to the conflict, KVM_SYSTEM_EVENT_SEV_TERM is relocated from 4 to 6. - Paolo]
2 parents 825be3b + 5c0ad55 commit 47e8eec

1,425 files changed

Lines changed: 17240 additions & 9765 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.mailmap

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -391,6 +391,10 @@ Uwe Kleine-König <ukleinek@strlen.de>
391391
Uwe Kleine-König <ukl@pengutronix.de>
392392
Uwe Kleine-König <Uwe.Kleine-Koenig@digi.com>
393393
Valdis Kletnieks <Valdis.Kletnieks@vt.edu>
394+
Vasily Averin <vasily.averin@linux.dev> <vvs@virtuozzo.com>
395+
Vasily Averin <vasily.averin@linux.dev> <vvs@openvz.org>
396+
Vasily Averin <vasily.averin@linux.dev> <vvs@parallels.com>
397+
Vasily Averin <vasily.averin@linux.dev> <vvs@sw.ru>
394398
Vinod Koul <vkoul@kernel.org> <vinod.koul@intel.com>
395399
Vinod Koul <vkoul@kernel.org> <vinod.koul@linux.intel.com>
396400
Vinod Koul <vkoul@kernel.org> <vkoul@infradead.org>

Documentation/ABI/testing/sysfs-class-firmware-attributes

Lines changed: 26 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Description:
116116
<value>[ForceIf:<attribute>=<value>]
117117
<value>[ForceIfNot:<attribute>=<value>]
118118

119-
For example:
119+
For example::
120120

121121
LegacyOrom/dell_value_modifier has value:
122122
Disabled[ForceIf:SecureBoot=Enabled]
@@ -212,7 +212,7 @@ Description:
212212
the next boot.
213213

214214
Lenovo specific class extensions
215-
------------------------------
215+
--------------------------------
216216

217217
On Lenovo systems the following additional settings are available:
218218

@@ -246,9 +246,7 @@ Description:
246246
that is being referenced (e.g hdd0, hdd1 etc)
247247
This attribute defaults to device 0.
248248

249-
certificate:
250-
signature:
251-
save_signature:
249+
certificate, signature, save_signature:
252250
These attributes are used for certificate based authentication. This is
253251
used in conjunction with a signing server as an alternative to password
254252
based authentication.
@@ -257,22 +255,27 @@ Description:
257255
The attributes can be displayed to check the stored value.
258256

259257
Some usage examples:
260-
Installing a certificate to enable feature:
261-
echo <supervisor password > authentication/Admin/current_password
262-
echo <signed certificate> > authentication/Admin/certificate
263258

264-
Updating the installed certificate:
265-
echo <signature> > authentication/Admin/signature
266-
echo <signed certificate> > authentication/Admin/certificate
259+
Installing a certificate to enable feature::
260+
261+
echo "supervisor password" > authentication/Admin/current_password
262+
echo "signed certificate" > authentication/Admin/certificate
263+
264+
Updating the installed certificate::
265+
266+
echo "signature" > authentication/Admin/signature
267+
echo "signed certificate" > authentication/Admin/certificate
267268

268-
Removing the installed certificate:
269-
echo <signature> > authentication/Admin/signature
270-
echo '' > authentication/Admin/certificate
269+
Removing the installed certificate::
271270

272-
Changing a BIOS setting:
273-
echo <signature> > authentication/Admin/signature
274-
echo <save signature> > authentication/Admin/save_signature
275-
echo Enable > attribute/PasswordBeep/current_value
271+
echo "signature" > authentication/Admin/signature
272+
echo "" > authentication/Admin/certificate
273+
274+
Changing a BIOS setting::
275+
276+
echo "signature" > authentication/Admin/signature
277+
echo "save signature" > authentication/Admin/save_signature
278+
echo Enable > attribute/PasswordBeep/current_value
276279

277280
You cannot enable certificate authentication if a supervisor password
278281
has not been set.
@@ -288,9 +291,10 @@ Description:
288291
certificate_to_password:
289292
Write only attribute used to switch from certificate based authentication
290293
back to password based.
291-
Usage:
292-
echo <signature> > authentication/Admin/signature
293-
echo <password> > authentication/Admin/certificate_to_password
294+
Usage::
295+
296+
echo "signature" > authentication/Admin/signature
297+
echo "password" > authentication/Admin/certificate_to_password
294298

295299

296300
What: /sys/class/firmware-attributes/*/attributes/pending_reboot
@@ -345,7 +349,7 @@ Description:
345349

346350
# echo "factory" > /sys/class/firmware-attributes/*/device/attributes/reset_bios
347351
# cat /sys/class/firmware-attributes/*/device/attributes/reset_bios
348-
# builtinsafe lastknowngood [factory] custom
352+
builtinsafe lastknowngood [factory] custom
349353

350354
Note that any changes to this attribute requires a reboot
351355
for changes to take effect.

Documentation/ABI/testing/sysfs-driver-intel_sdsi

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,17 +13,19 @@ Description:
1313
Should the operation fail, one of the following error codes
1414
may be returned:
1515

16+
========== =====
1617
Error Code Cause
17-
---------- -----
18-
EIO General mailbox failure. Log may indicate cause.
19-
EBUSY Mailbox is owned by another agent.
20-
EPERM SDSI capability is not enabled in hardware.
21-
EPROTO Failure in mailbox protocol detected by driver.
18+
========== =====
19+
EIO General mailbox failure. Log may indicate cause.
20+
EBUSY Mailbox is owned by another agent.
21+
EPERM SDSI capability is not enabled in hardware.
22+
EPROTO Failure in mailbox protocol detected by driver.
2223
See log for details.
23-
EOVERFLOW For provision commands, the size of the data
24+
EOVERFLOW For provision commands, the size of the data
2425
exceeds what may be written.
25-
ESPIPE Seeking is not allowed.
26-
ETIMEDOUT Failure to complete mailbox transaction in time.
26+
ESPIPE Seeking is not allowed.
27+
ETIMEDOUT Failure to complete mailbox transaction in time.
28+
========== =====
2729

2830
What: /sys/bus/auxiliary/devices/intel_vsec.sdsi.X/guid
2931
Date: Feb 2022

Documentation/ABI/testing/sysfs-fs-erofs

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,9 @@ Description: Shows all enabled kernel features.
99
What: /sys/fs/erofs/<disk>/sync_decompress
1010
Date: November 2021
1111
Contact: "Huang Jianan" <huangjianan@oppo.com>
12-
Description: Control strategy of sync decompression
12+
Description: Control strategy of sync decompression:
13+
1314
- 0 (default, auto): enable for readpage, and enable for
14-
readahead on atomic contexts only,
15+
readahead on atomic contexts only.
1516
- 1 (force on): enable for readpage and readahead.
1617
- 2 (force off): disable for all situations.

Documentation/arm64/cpu-feature-registers.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -290,6 +290,8 @@ infrastructure:
290290
+------------------------------+---------+---------+
291291
| RPRES | [7-4] | y |
292292
+------------------------------+---------+---------+
293+
| WFXT | [3-0] | y |
294+
+------------------------------+---------+---------+
293295

294296

295297
Appendix I: Example

Documentation/arm64/elf_hwcaps.rst

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -264,6 +264,43 @@ HWCAP2_MTE3
264264
Functionality implied by ID_AA64PFR1_EL1.MTE == 0b0011, as described
265265
by Documentation/arm64/memory-tagging-extension.rst.
266266

267+
HWCAP2_SME
268+
269+
Functionality implied by ID_AA64PFR1_EL1.SME == 0b0001, as described
270+
by Documentation/arm64/sme.rst.
271+
272+
HWCAP2_SME_I16I64
273+
274+
Functionality implied by ID_AA64SMFR0_EL1.I16I64 == 0b1111.
275+
276+
HWCAP2_SME_F64F64
277+
278+
Functionality implied by ID_AA64SMFR0_EL1.F64F64 == 0b1.
279+
280+
HWCAP2_SME_I8I32
281+
282+
Functionality implied by ID_AA64SMFR0_EL1.I8I32 == 0b1111.
283+
284+
HWCAP2_SME_F16F32
285+
286+
Functionality implied by ID_AA64SMFR0_EL1.F16F32 == 0b1.
287+
288+
HWCAP2_SME_B16F32
289+
290+
Functionality implied by ID_AA64SMFR0_EL1.B16F32 == 0b1.
291+
292+
HWCAP2_SME_F32F32
293+
294+
Functionality implied by ID_AA64SMFR0_EL1.F32F32 == 0b1.
295+
296+
HWCAP2_SME_FA64
297+
298+
Functionality implied by ID_AA64SMFR0_EL1.FA64 == 0b1.
299+
300+
HWCAP2_WFXT
301+
302+
Functionality implied by ID_AA64ISAR2_EL1.WFXT == 0b0010.
303+
267304
4. Unused AT_HWCAP bits
268305
-----------------------
269306

Documentation/arm64/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ ARM64 Architecture
2121
perf
2222
pointer-authentication
2323
silicon-errata
24+
sme
2425
sve
2526
tagged-address-abi
2627
tagged-pointers

Documentation/arm64/memory-tagging-extension.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -228,10 +228,10 @@ Core dump support
228228
-----------------
229229

230230
The allocation tags for user memory mapped with ``PROT_MTE`` are dumped
231-
in the core file as additional ``PT_ARM_MEMTAG_MTE`` segments. The
231+
in the core file as additional ``PT_AARCH64_MEMTAG_MTE`` segments. The
232232
program header for such segment is defined as:
233233

234-
:``p_type``: ``PT_ARM_MEMTAG_MTE``
234+
:``p_type``: ``PT_AARCH64_MEMTAG_MTE``
235235
:``p_flags``: 0
236236
:``p_offset``: segment file offset
237237
:``p_vaddr``: segment virtual address, same as the corresponding

0 commit comments

Comments
 (0)