mbox series

[GIT,PULL] KVM/arm64 updates for 6.12

Message ID 20240912091229.411782-1-maz@kernel.org (mailing list archive)
State New, archived
Headers show
Series [GIT,PULL] KVM/arm64 updates for 6.12 | expand

Pull-request

git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-6.12

Message

Marc Zyngier Sept. 12, 2024, 9:12 a.m. UTC
Hi Paolo,

Here's the set of KVM/arm64 changes 6.12. The only two user-visible
features are FP8 support and the new Stage-2 page-table dumper. The NV
onslaught continues with the addition of the address translation
instruction emulation, and we have a bunch of fixes all over the
place (details in the tag text below).

Note that there is a very minor conflict with arm64 in -next, which is
trivially resolved as [1].

Please pull,

	M.

[1] https://lore.kernel.org/linux-next/20240905160856.14e95d14@canb.auug.org.au

The following changes since commit 5be63fc19fcaa4c236b307420483578a56986a37:

  Linux 6.11-rc5 (2024-08-25 19:07:11 +1200)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-6.12

for you to fetch changes up to 17a0005644994087794f6552d7a5e105d6976184:

  Merge branch kvm-arm64/visibility-cleanups into kvmarm-master/next (2024-09-12 08:38:17 +0100)

----------------------------------------------------------------
KVM/arm64 updates for 6.12

* New features:

  - Add a Stage-2 page table dumper, reusing the main ptdump
    infrastructure, and allowing easier debugging of the our
    page-table infrastructure

  - Add FP8 support to the KVM/arm64 floating point handling.

  - Add NV support for the AT family of instructions, which mostly
    results in adding a page table walker that deals with most of the
    complexity of the architecture.

* Improvements, fixes and cleanups:

  - Add selftest checks for a bunch of timer emulation corner cases

  - Fix the multiple of cases where KVM/arm64 doesn't correctly handle
    the guest trying to use a GICv3 that isn't advertised

  - Remove REG_HIDDEN_USER from the sysreg infrastructure, making
    things little more simple

  - Prevent MTE tags being restored by userspace if we are actively
    logging writes, as that's a recipe for disaster

  - Correct the refcount on a page that is not considered for MTE tag
    copying (such as a device)

  - Relax the synchronisation when walking a page table to split block
    mappings, moving it at the end the walk, as there is no need to
    perform it on every store.

  - Fix boundary check when transfering memory using FFA

  - Fix pKVM TLB invalidation, only affecting currently out of tree
    code but worth addressing for peace of mind

----------------------------------------------------------------
Colton Lewis (3):
      KVM: arm64: Move data barrier to end of split walk
      KVM: arm64: selftests: Ensure pending interrupts are handled in arch_timer test
      KVM: arm64: selftests: Add arch_timer_edge_cases selftest

Joey Gouly (1):
      KVM: arm64: Make kvm_at() take an OP_AT_*

Marc Zyngier (47):
      KVM: arm64: Move SVCR into the sysreg array
      KVM: arm64: Add predicate for FPMR support in a VM
      KVM: arm64: Move FPMR into the sysreg array
      KVM: arm64: Add save/restore support for FPMR
      KVM: arm64: Honor trap routing for FPMR
      KVM: arm64: Expose ID_AA64FPFR0_EL1 as a writable ID reg
      KVM: arm64: Enable FP8 support when available and configured
      KVM: arm64: Expose ID_AA64PFR2_EL1 to userspace and guests
      Merge branch kvm-arm64/tlbi-fixes-6.12 into kvmarm-master/next
      KVM: arm64: Move GICv3 trap configuration to kvm_calculate_traps()
      KVM: arm64: Force SRE traps when SRE access is not enabled
      KVM: arm64: Force GICv3 trap activation when no irqchip is configured on VHE
      KVM: arm64: Add helper for last ditch idreg adjustments
      KVM: arm64: Zero ID_AA64PFR0_EL1.GIC when no GICv3 is presented to the guest
      KVM: arm64: Add ICH_HCR_EL2 to the vcpu state
      KVM: arm64: Add trap routing information for ICH_HCR_EL2
      KVM: arm64: Honor guest requested traps in GICv3 emulation
      KVM: arm64: Make most GICv3 accesses UNDEF if they trap
      KVM: arm64: Unify UNDEF injection helpers
      KVM: arm64: Add selftest checking how the absence of GICv3 is handled
      arm64: Add missing APTable and TCR_ELx.HPD masks
      arm64: Add PAR_EL1 field description
      arm64: Add system register encoding for PSTATE.PAN
      arm64: Add ESR_ELx_FSC_ADDRSZ_L() helper
      KVM: arm64: nv: Enforce S2 alignment when contiguous bit is set
      KVM: arm64: nv: Turn upper_attr for S2 walk into the full descriptor
      KVM: arm64: nv: Honor absence of FEAT_PAN2
      KVM: arm64: nv: Add basic emulation of AT S1E{0,1}{R,W}
      KVM: arm64: nv: Add basic emulation of AT S1E1{R,W}P
      KVM: arm64: nv: Add basic emulation of AT S1E2{R,W}
      KVM: arm64: nv: Add emulation of AT S12E{0,1}{R,W}
      KVM: arm64: nv: Make ps_to_output_size() generally available
      KVM: arm64: nv: Add SW walker for AT S1 emulation
      KVM: arm64: nv: Sanitise SCTLR_EL1.EPAN according to VM configuration
      KVM: arm64: nv: Make AT+PAN instructions aware of FEAT_PAN3
      KVM: arm64: nv: Plumb handling of AT S1* traps from EL2
      KVM: arm64: nv: Add support for FEAT_ATS1A
      KVM: arm64: Simplify handling of CNTKCTL_EL12
      KVM: arm64: Simplify visibility handling of AArch32 SPSR_*
      KVM: arm64: Get rid of REG_HIDDEN_USER visibility qualifier
      Merge branch kvm-arm64/mmu-misc-6.12 into kvmarm-master/next
      Merge branch kvm-arm64/fpmr into kvmarm-master/next
      Merge branch kvm-arm64/vgic-sre-traps into kvmarm-master/next
      Merge branch kvm-arm64/selftests-6.12 into kvmarm-master/next
      Merge branch kvm-arm64/nv-at-pan into kvmarm-master/next
      Merge branch kvm-arm64/s2-ptdump into kvmarm-master/next
      Merge branch kvm-arm64/visibility-cleanups into kvmarm-master/next

Oliver Upton (1):
      KVM: arm64: selftests: Cope with lack of GICv3 in set_id_regs

Sean Christopherson (2):
      KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
      KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging

Sebastian Ene (5):
      KVM: arm64: Move pagetable definitions to common header
      arm64: ptdump: Expose the attribute parsing functionality
      arm64: ptdump: Use the ptdump description from a local context
      arm64: ptdump: Don't override the level when operating on the stage-2 tables
      KVM: arm64: Register ptdump with debugfs on guest creation

Snehal Koukuntla (1):
      KVM: arm64: Add memory length checks and remove inline in do_ffa_mem_xfer

Will Deacon (2):
      KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init
      KVM: arm64: Ensure TLBI uses correct VMID after changing context

 arch/arm64/include/asm/esr.h                       |    5 +-
 arch/arm64/include/asm/kvm_arm.h                   |    1 +
 arch/arm64/include/asm/kvm_asm.h                   |    6 +-
 arch/arm64/include/asm/kvm_host.h                  |   22 +-
 arch/arm64/include/asm/kvm_mmu.h                   |    6 +
 arch/arm64/include/asm/kvm_nested.h                |   40 +-
 arch/arm64/include/asm/kvm_pgtable.h               |   42 +
 arch/arm64/include/asm/pgtable-hwdef.h             |    9 +
 arch/arm64/include/asm/ptdump.h                    |   43 +-
 arch/arm64/include/asm/sysreg.h                    |   22 +
 arch/arm64/kvm/Kconfig                             |   17 +
 arch/arm64/kvm/Makefile                            |    3 +-
 arch/arm64/kvm/arm.c                               |   15 +-
 arch/arm64/kvm/at.c                                | 1101 ++++++++++++++++++++
 arch/arm64/kvm/emulate-nested.c                    |   81 +-
 arch/arm64/kvm/fpsimd.c                            |    5 +-
 arch/arm64/kvm/guest.c                             |    6 +
 arch/arm64/kvm/hyp/include/hyp/fault.h             |    2 +-
 arch/arm64/kvm/hyp/include/hyp/switch.h            |    3 +
 arch/arm64/kvm/hyp/nvhe/ffa.c                      |   21 +-
 arch/arm64/kvm/hyp/nvhe/hyp-init.S                 |    2 +-
 arch/arm64/kvm/hyp/nvhe/hyp-main.c                 |    9 +
 arch/arm64/kvm/hyp/nvhe/switch.c                   |    9 +
 arch/arm64/kvm/hyp/nvhe/tlb.c                      |    6 +-
 arch/arm64/kvm/hyp/pgtable.c                       |   48 +-
 arch/arm64/kvm/hyp/vgic-v3-sr.c                    |   97 +-
 arch/arm64/kvm/hyp/vhe/switch.c                    |    3 +
 arch/arm64/kvm/nested.c                            |   55 +-
 arch/arm64/kvm/ptdump.c                            |  268 +++++
 arch/arm64/kvm/sys_regs.c                          |  386 ++++---
 arch/arm64/kvm/sys_regs.h                          |   23 +-
 arch/arm64/kvm/vgic/vgic-v3.c                      |   12 +
 arch/arm64/kvm/vgic/vgic.c                         |   14 +-
 arch/arm64/kvm/vgic/vgic.h                         |    6 +-
 arch/arm64/mm/ptdump.c                             |   70 +-
 tools/testing/selftests/kvm/Makefile               |    2 +
 .../selftests/kvm/aarch64/arch_timer_edge_cases.c  | 1062 +++++++++++++++++++
 tools/testing/selftests/kvm/aarch64/no-vgic-v3.c   |  175 ++++
 tools/testing/selftests/kvm/aarch64/set_id_regs.c  |    1 +
 tools/testing/selftests/kvm/aarch64/vgic_irq.c     |   11 +-
 .../selftests/kvm/include/aarch64/arch_timer.h     |   18 +-
 .../selftests/kvm/include/aarch64/processor.h      |    3 +
 .../testing/selftests/kvm/lib/aarch64/processor.c  |    6 +
 43 files changed, 3405 insertions(+), 331 deletions(-)
 create mode 100644 arch/arm64/kvm/at.c
 create mode 100644 arch/arm64/kvm/ptdump.c
 create mode 100644 tools/testing/selftests/kvm/aarch64/arch_timer_edge_cases.c
 create mode 100644 tools/testing/selftests/kvm/aarch64/no-vgic-v3.c

Comments

Paolo Bonzini Sept. 14, 2024, 1:33 p.m. UTC | #1
On Thu, Sep 12, 2024 at 11:12 AM Marc Zyngier <maz@kernel.org> wrote:
>
> Hi Paolo,
>
> Here's the set of KVM/arm64 changes 6.12. The only two user-visible
> features are FP8 support and the new Stage-2 page-table dumper. The NV
> onslaught continues with the addition of the address translation
> instruction emulation, and we have a bunch of fixes all over the
> place (details in the tag text below).
>
> Note that there is a very minor conflict with arm64 in -next, which is
> trivially resolved as [1].

Pulled, thanks.

Paolo

> Please pull,
>
>         M.
>
> [1] https://lore.kernel.org/linux-next/20240905160856.14e95d14@canb.auug.org.au
>
> The following changes since commit 5be63fc19fcaa4c236b307420483578a56986a37:
>
>   Linux 6.11-rc5 (2024-08-25 19:07:11 +1200)
>
> are available in the Git repository at:
>
>   git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-6.12
>
> for you to fetch changes up to 17a0005644994087794f6552d7a5e105d6976184:
>
>   Merge branch kvm-arm64/visibility-cleanups into kvmarm-master/next (2024-09-12 08:38:17 +0100)
>
> ----------------------------------------------------------------
> KVM/arm64 updates for 6.12
>
> * New features:
>
>   - Add a Stage-2 page table dumper, reusing the main ptdump
>     infrastructure, and allowing easier debugging of the our
>     page-table infrastructure
>
>   - Add FP8 support to the KVM/arm64 floating point handling.
>
>   - Add NV support for the AT family of instructions, which mostly
>     results in adding a page table walker that deals with most of the
>     complexity of the architecture.
>
> * Improvements, fixes and cleanups:
>
>   - Add selftest checks for a bunch of timer emulation corner cases
>
>   - Fix the multiple of cases where KVM/arm64 doesn't correctly handle
>     the guest trying to use a GICv3 that isn't advertised
>
>   - Remove REG_HIDDEN_USER from the sysreg infrastructure, making
>     things little more simple
>
>   - Prevent MTE tags being restored by userspace if we are actively
>     logging writes, as that's a recipe for disaster
>
>   - Correct the refcount on a page that is not considered for MTE tag
>     copying (such as a device)
>
>   - Relax the synchronisation when walking a page table to split block
>     mappings, moving it at the end the walk, as there is no need to
>     perform it on every store.
>
>   - Fix boundary check when transfering memory using FFA
>
>   - Fix pKVM TLB invalidation, only affecting currently out of tree
>     code but worth addressing for peace of mind
>
> ----------------------------------------------------------------
> Colton Lewis (3):
>       KVM: arm64: Move data barrier to end of split walk
>       KVM: arm64: selftests: Ensure pending interrupts are handled in arch_timer test
>       KVM: arm64: selftests: Add arch_timer_edge_cases selftest
>
> Joey Gouly (1):
>       KVM: arm64: Make kvm_at() take an OP_AT_*
>
> Marc Zyngier (47):
>       KVM: arm64: Move SVCR into the sysreg array
>       KVM: arm64: Add predicate for FPMR support in a VM
>       KVM: arm64: Move FPMR into the sysreg array
>       KVM: arm64: Add save/restore support for FPMR
>       KVM: arm64: Honor trap routing for FPMR
>       KVM: arm64: Expose ID_AA64FPFR0_EL1 as a writable ID reg
>       KVM: arm64: Enable FP8 support when available and configured
>       KVM: arm64: Expose ID_AA64PFR2_EL1 to userspace and guests
>       Merge branch kvm-arm64/tlbi-fixes-6.12 into kvmarm-master/next
>       KVM: arm64: Move GICv3 trap configuration to kvm_calculate_traps()
>       KVM: arm64: Force SRE traps when SRE access is not enabled
>       KVM: arm64: Force GICv3 trap activation when no irqchip is configured on VHE
>       KVM: arm64: Add helper for last ditch idreg adjustments
>       KVM: arm64: Zero ID_AA64PFR0_EL1.GIC when no GICv3 is presented to the guest
>       KVM: arm64: Add ICH_HCR_EL2 to the vcpu state
>       KVM: arm64: Add trap routing information for ICH_HCR_EL2
>       KVM: arm64: Honor guest requested traps in GICv3 emulation
>       KVM: arm64: Make most GICv3 accesses UNDEF if they trap
>       KVM: arm64: Unify UNDEF injection helpers
>       KVM: arm64: Add selftest checking how the absence of GICv3 is handled
>       arm64: Add missing APTable and TCR_ELx.HPD masks
>       arm64: Add PAR_EL1 field description
>       arm64: Add system register encoding for PSTATE.PAN
>       arm64: Add ESR_ELx_FSC_ADDRSZ_L() helper
>       KVM: arm64: nv: Enforce S2 alignment when contiguous bit is set
>       KVM: arm64: nv: Turn upper_attr for S2 walk into the full descriptor
>       KVM: arm64: nv: Honor absence of FEAT_PAN2
>       KVM: arm64: nv: Add basic emulation of AT S1E{0,1}{R,W}
>       KVM: arm64: nv: Add basic emulation of AT S1E1{R,W}P
>       KVM: arm64: nv: Add basic emulation of AT S1E2{R,W}
>       KVM: arm64: nv: Add emulation of AT S12E{0,1}{R,W}
>       KVM: arm64: nv: Make ps_to_output_size() generally available
>       KVM: arm64: nv: Add SW walker for AT S1 emulation
>       KVM: arm64: nv: Sanitise SCTLR_EL1.EPAN according to VM configuration
>       KVM: arm64: nv: Make AT+PAN instructions aware of FEAT_PAN3
>       KVM: arm64: nv: Plumb handling of AT S1* traps from EL2
>       KVM: arm64: nv: Add support for FEAT_ATS1A
>       KVM: arm64: Simplify handling of CNTKCTL_EL12
>       KVM: arm64: Simplify visibility handling of AArch32 SPSR_*
>       KVM: arm64: Get rid of REG_HIDDEN_USER visibility qualifier
>       Merge branch kvm-arm64/mmu-misc-6.12 into kvmarm-master/next
>       Merge branch kvm-arm64/fpmr into kvmarm-master/next
>       Merge branch kvm-arm64/vgic-sre-traps into kvmarm-master/next
>       Merge branch kvm-arm64/selftests-6.12 into kvmarm-master/next
>       Merge branch kvm-arm64/nv-at-pan into kvmarm-master/next
>       Merge branch kvm-arm64/s2-ptdump into kvmarm-master/next
>       Merge branch kvm-arm64/visibility-cleanups into kvmarm-master/next
>
> Oliver Upton (1):
>       KVM: arm64: selftests: Cope with lack of GICv3 in set_id_regs
>
> Sean Christopherson (2):
>       KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
>       KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging
>
> Sebastian Ene (5):
>       KVM: arm64: Move pagetable definitions to common header
>       arm64: ptdump: Expose the attribute parsing functionality
>       arm64: ptdump: Use the ptdump description from a local context
>       arm64: ptdump: Don't override the level when operating on the stage-2 tables
>       KVM: arm64: Register ptdump with debugfs on guest creation
>
> Snehal Koukuntla (1):
>       KVM: arm64: Add memory length checks and remove inline in do_ffa_mem_xfer
>
> Will Deacon (2):
>       KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init
>       KVM: arm64: Ensure TLBI uses correct VMID after changing context
>
>  arch/arm64/include/asm/esr.h                       |    5 +-
>  arch/arm64/include/asm/kvm_arm.h                   |    1 +
>  arch/arm64/include/asm/kvm_asm.h                   |    6 +-
>  arch/arm64/include/asm/kvm_host.h                  |   22 +-
>  arch/arm64/include/asm/kvm_mmu.h                   |    6 +
>  arch/arm64/include/asm/kvm_nested.h                |   40 +-
>  arch/arm64/include/asm/kvm_pgtable.h               |   42 +
>  arch/arm64/include/asm/pgtable-hwdef.h             |    9 +
>  arch/arm64/include/asm/ptdump.h                    |   43 +-
>  arch/arm64/include/asm/sysreg.h                    |   22 +
>  arch/arm64/kvm/Kconfig                             |   17 +
>  arch/arm64/kvm/Makefile                            |    3 +-
>  arch/arm64/kvm/arm.c                               |   15 +-
>  arch/arm64/kvm/at.c                                | 1101 ++++++++++++++++++++
>  arch/arm64/kvm/emulate-nested.c                    |   81 +-
>  arch/arm64/kvm/fpsimd.c                            |    5 +-
>  arch/arm64/kvm/guest.c                             |    6 +
>  arch/arm64/kvm/hyp/include/hyp/fault.h             |    2 +-
>  arch/arm64/kvm/hyp/include/hyp/switch.h            |    3 +
>  arch/arm64/kvm/hyp/nvhe/ffa.c                      |   21 +-
>  arch/arm64/kvm/hyp/nvhe/hyp-init.S                 |    2 +-
>  arch/arm64/kvm/hyp/nvhe/hyp-main.c                 |    9 +
>  arch/arm64/kvm/hyp/nvhe/switch.c                   |    9 +
>  arch/arm64/kvm/hyp/nvhe/tlb.c                      |    6 +-
>  arch/arm64/kvm/hyp/pgtable.c                       |   48 +-
>  arch/arm64/kvm/hyp/vgic-v3-sr.c                    |   97 +-
>  arch/arm64/kvm/hyp/vhe/switch.c                    |    3 +
>  arch/arm64/kvm/nested.c                            |   55 +-
>  arch/arm64/kvm/ptdump.c                            |  268 +++++
>  arch/arm64/kvm/sys_regs.c                          |  386 ++++---
>  arch/arm64/kvm/sys_regs.h                          |   23 +-
>  arch/arm64/kvm/vgic/vgic-v3.c                      |   12 +
>  arch/arm64/kvm/vgic/vgic.c                         |   14 +-
>  arch/arm64/kvm/vgic/vgic.h                         |    6 +-
>  arch/arm64/mm/ptdump.c                             |   70 +-
>  tools/testing/selftests/kvm/Makefile               |    2 +
>  .../selftests/kvm/aarch64/arch_timer_edge_cases.c  | 1062 +++++++++++++++++++
>  tools/testing/selftests/kvm/aarch64/no-vgic-v3.c   |  175 ++++
>  tools/testing/selftests/kvm/aarch64/set_id_regs.c  |    1 +
>  tools/testing/selftests/kvm/aarch64/vgic_irq.c     |   11 +-
>  .../selftests/kvm/include/aarch64/arch_timer.h     |   18 +-
>  .../selftests/kvm/include/aarch64/processor.h      |    3 +
>  .../testing/selftests/kvm/lib/aarch64/processor.c  |    6 +
>  43 files changed, 3405 insertions(+), 331 deletions(-)
>  create mode 100644 arch/arm64/kvm/at.c
>  create mode 100644 arch/arm64/kvm/ptdump.c
>  create mode 100644 tools/testing/selftests/kvm/aarch64/arch_timer_edge_cases.c
>  create mode 100644 tools/testing/selftests/kvm/aarch64/no-vgic-v3.c
>