Skip to content

Commit 68fc7eb

Browse files
committed
up to 6.1.131
1 parent 19670a6 commit 68fc7eb

File tree

106 files changed

+968
-506
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

106 files changed

+968
-506
lines changed

Makefile

+6-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# SPDX-License-Identifier: GPL-2.0
22
VERSION = 6
33
PATCHLEVEL = 1
4-
SUBLEVEL = 130
4+
SUBLEVEL = 131
55
EXTRAVERSION =
66
NAME = Curry Ramen
77

@@ -1127,6 +1127,11 @@ endif
11271127
KBUILD_USERCFLAGS += $(filter -m32 -m64 --target=%, $(KBUILD_CFLAGS))
11281128
KBUILD_USERLDFLAGS += $(filter -m32 -m64 --target=%, $(KBUILD_CFLAGS))
11291129

1130+
# userspace programs are linked via the compiler, use the correct linker
1131+
ifeq ($(CONFIG_CC_IS_CLANG)$(CONFIG_LD_IS_LLD),yy)
1132+
KBUILD_USERLDFLAGS += $(call cc-option, --ld-path=$(LD))
1133+
endif
1134+
11301135
# make the checker run with the right architecture
11311136
CHECKFLAGS += --arch=$(ARCH)
11321137

arch/loongarch/kernel/machine_kexec.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -126,14 +126,14 @@ void kexec_reboot(void)
126126
/* All secondary cpus go to kexec_smp_wait */
127127
if (smp_processor_id() > 0) {
128128
relocated_kexec_smp_wait(NULL);
129-
unreachable();
129+
BUG();
130130
}
131131
#endif
132132

133133
do_kexec = (void *)reboot_code_buffer;
134134
do_kexec(efi_boot, cmdline_ptr, systable_ptr, start_addr, first_ind_entry);
135135

136-
unreachable();
136+
BUG();
137137
}
138138

139139

arch/powerpc/kvm/e500_mmu_host.c

+13-8
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ static inline int tlbe_is_writable(struct kvm_book3e_206_tlb_entry *tlbe)
242242
return tlbe->mas7_3 & (MAS3_SW|MAS3_UW);
243243
}
244244

245-
static inline bool kvmppc_e500_ref_setup(struct tlbe_ref *ref,
245+
static inline void kvmppc_e500_ref_setup(struct tlbe_ref *ref,
246246
struct kvm_book3e_206_tlb_entry *gtlbe,
247247
kvm_pfn_t pfn, unsigned int wimg)
248248
{
@@ -252,7 +252,11 @@ static inline bool kvmppc_e500_ref_setup(struct tlbe_ref *ref,
252252
/* Use guest supplied MAS2_G and MAS2_E */
253253
ref->flags |= (gtlbe->mas2 & MAS2_ATTRIB_MASK) | wimg;
254254

255-
return tlbe_is_writable(gtlbe);
255+
/* Mark the page accessed */
256+
kvm_set_pfn_accessed(pfn);
257+
258+
if (tlbe_is_writable(gtlbe))
259+
kvm_set_pfn_dirty(pfn);
256260
}
257261

258262
static inline void kvmppc_e500_ref_release(struct tlbe_ref *ref)
@@ -322,7 +326,6 @@ static inline int kvmppc_e500_shadow_map(struct kvmppc_vcpu_e500 *vcpu_e500,
322326
{
323327
struct kvm_memory_slot *slot;
324328
unsigned long pfn = 0; /* silence GCC warning */
325-
struct page *page = NULL;
326329
unsigned long hva;
327330
int pfnmap = 0;
328331
int tsize = BOOK3E_PAGESZ_4K;
@@ -334,7 +337,6 @@ static inline int kvmppc_e500_shadow_map(struct kvmppc_vcpu_e500 *vcpu_e500,
334337
unsigned int wimg = 0;
335338
pgd_t *pgdir;
336339
unsigned long flags;
337-
bool writable = false;
338340

339341
/* used to check for invalidations in progress */
340342
mmu_seq = kvm->mmu_invalidate_seq;
@@ -444,7 +446,7 @@ static inline int kvmppc_e500_shadow_map(struct kvmppc_vcpu_e500 *vcpu_e500,
444446

445447
if (likely(!pfnmap)) {
446448
tsize_pages = 1UL << (tsize + 10 - PAGE_SHIFT);
447-
pfn = __kvm_faultin_pfn(slot, gfn, FOLL_WRITE, NULL, &page);
449+
pfn = gfn_to_pfn_memslot(slot, gfn);
448450
if (is_error_noslot_pfn(pfn)) {
449451
if (printk_ratelimit())
450452
pr_err("%s: real page not found for gfn %lx\n",
@@ -479,6 +481,7 @@ static inline int kvmppc_e500_shadow_map(struct kvmppc_vcpu_e500 *vcpu_e500,
479481
if (pte_present(pte)) {
480482
wimg = (pte_val(pte) >> PTE_WIMGE_SHIFT) &
481483
MAS2_WIMGE_MASK;
484+
local_irq_restore(flags);
482485
} else {
483486
local_irq_restore(flags);
484487
pr_err_ratelimited("%s: pte not present: gfn %lx,pfn %lx\n",
@@ -487,18 +490,20 @@ static inline int kvmppc_e500_shadow_map(struct kvmppc_vcpu_e500 *vcpu_e500,
487490
goto out;
488491
}
489492
}
490-
local_irq_restore(flags);
493+
kvmppc_e500_ref_setup(ref, gtlbe, pfn, wimg);
491494

492-
writable = kvmppc_e500_ref_setup(ref, gtlbe, pfn, wimg);
493495
kvmppc_e500_setup_stlbe(&vcpu_e500->vcpu, gtlbe, tsize,
494496
ref, gvaddr, stlbe);
495497

496498
/* Clear i-cache for new pages */
497499
kvmppc_mmu_flush_icache(pfn);
498500

499501
out:
500-
kvm_release_faultin_page(kvm, page, !!ret, writable);
501502
spin_unlock(&kvm->mmu_lock);
503+
504+
/* Drop refcount on page, so that mmu notifiers can clear it */
505+
kvm_release_pfn_clean(pfn);
506+
502507
return ret;
503508
}
504509

arch/s390/kernel/traps.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -276,10 +276,10 @@ static void __init test_monitor_call(void)
276276
return;
277277
asm volatile(
278278
" mc 0,0\n"
279-
"0: xgr %0,%0\n"
279+
"0: lhi %[val],0\n"
280280
"1:\n"
281-
EX_TABLE(0b,1b)
282-
: "+d" (val));
281+
EX_TABLE(0b, 1b)
282+
: [val] "+d" (val));
283283
if (!val)
284284
panic("Monitor call doesn't work!\n");
285285
}

arch/x86/include/asm/spec-ctrl.h

+11
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44

55
#include <linux/thread_info.h>
66
#include <asm/nospec-branch.h>
7+
#include <asm/msr.h>
78

89
/*
910
* On VMENTER we must preserve whatever view of the SPEC_CTRL MSR
@@ -76,6 +77,16 @@ static inline u64 ssbd_tif_to_amd_ls_cfg(u64 tifn)
7677
return (tifn & _TIF_SSBD) ? x86_amd_ls_cfg_ssbd_mask : 0ULL;
7778
}
7879

80+
/*
81+
* This can be used in noinstr functions & should only be called in bare
82+
* metal context.
83+
*/
84+
static __always_inline void __update_spec_ctrl(u64 val)
85+
{
86+
__this_cpu_write(x86_spec_ctrl_current, val);
87+
native_wrmsrl(MSR_IA32_SPEC_CTRL, val);
88+
}
89+
7990
#ifdef CONFIG_SMP
8091
extern void speculative_store_bypass_ht_init(void);
8192
#else

arch/x86/kernel/amd_nb.c

+3-6
Original file line numberDiff line numberDiff line change
@@ -342,21 +342,18 @@ bool __init early_is_amd_nb(u32 device)
342342

343343
struct resource *amd_get_mmconfig_range(struct resource *res)
344344
{
345-
u32 address;
346345
u64 base, msr;
347346
unsigned int segn_busn_bits;
348347

349348
if (boot_cpu_data.x86_vendor != X86_VENDOR_AMD &&
350349
boot_cpu_data.x86_vendor != X86_VENDOR_HYGON)
351350
return NULL;
352351

353-
/* assume all cpus from fam10h have mmconfig */
354-
if (boot_cpu_data.x86 < 0x10)
352+
/* Assume CPUs from Fam10h have mmconfig, although not all VMs do */
353+
if (boot_cpu_data.x86 < 0x10 ||
354+
rdmsrl_safe(MSR_FAM10H_MMIO_CONF_BASE, &msr))
355355
return NULL;
356356

357-
address = MSR_FAM10H_MMIO_CONF_BASE;
358-
rdmsrl(address, msr);
359-
360357
/* mmconfig is not enabled */
361358
if (!(msr & FAM10H_MMIO_CONF_ENABLE))
362359
return NULL;

arch/x86/kernel/cpu/bugs.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ void update_spec_ctrl_cond(u64 val)
9292
wrmsrl(MSR_IA32_SPEC_CTRL, val);
9393
}
9494

95-
u64 spec_ctrl_current(void)
95+
noinstr u64 spec_ctrl_current(void)
9696
{
9797
return this_cpu_read(x86_spec_ctrl_current);
9898
}

arch/x86/kernel/cpu/cacheinfo.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -801,7 +801,7 @@ void init_intel_cacheinfo(struct cpuinfo_x86 *c)
801801
cpuid(2, &regs[0], &regs[1], &regs[2], &regs[3]);
802802

803803
/* If bit 31 is set, this is an unknown format */
804-
for (j = 0 ; j < 3 ; j++)
804+
for (j = 0 ; j < 4 ; j++)
805805
if (regs[j] & (1 << 31))
806806
regs[j] = 0;
807807

arch/x86/kernel/cpu/intel.c

+35-17
Original file line numberDiff line numberDiff line change
@@ -784,26 +784,37 @@ static unsigned int intel_size_cache(struct cpuinfo_x86 *c, unsigned int size)
784784
}
785785
#endif
786786

787-
#define TLB_INST_4K 0x01
788-
#define TLB_INST_4M 0x02
789-
#define TLB_INST_2M_4M 0x03
787+
#define TLB_INST_4K 0x01
788+
#define TLB_INST_4M 0x02
789+
#define TLB_INST_2M_4M 0x03
790790

791-
#define TLB_INST_ALL 0x05
792-
#define TLB_INST_1G 0x06
791+
#define TLB_INST_ALL 0x05
792+
#define TLB_INST_1G 0x06
793793

794-
#define TLB_DATA_4K 0x11
795-
#define TLB_DATA_4M 0x12
796-
#define TLB_DATA_2M_4M 0x13
797-
#define TLB_DATA_4K_4M 0x14
794+
#define TLB_DATA_4K 0x11
795+
#define TLB_DATA_4M 0x12
796+
#define TLB_DATA_2M_4M 0x13
797+
#define TLB_DATA_4K_4M 0x14
798798

799-
#define TLB_DATA_1G 0x16
799+
#define TLB_DATA_1G 0x16
800+
#define TLB_DATA_1G_2M_4M 0x17
800801

801-
#define TLB_DATA0_4K 0x21
802-
#define TLB_DATA0_4M 0x22
803-
#define TLB_DATA0_2M_4M 0x23
802+
#define TLB_DATA0_4K 0x21
803+
#define TLB_DATA0_4M 0x22
804+
#define TLB_DATA0_2M_4M 0x23
804805

805-
#define STLB_4K 0x41
806-
#define STLB_4K_2M 0x42
806+
#define STLB_4K 0x41
807+
#define STLB_4K_2M 0x42
808+
809+
/*
810+
* All of leaf 0x2's one-byte TLB descriptors implies the same number of
811+
* entries for their respective TLB types. The 0x63 descriptor is an
812+
* exception: it implies 4 dTLB entries for 1GB pages 32 dTLB entries
813+
* for 2MB or 4MB pages. Encode descriptor 0x63 dTLB entry count for
814+
* 2MB/4MB pages here, as its count for dTLB 1GB pages is already at the
815+
* intel_tlb_table[] mapping.
816+
*/
817+
#define TLB_0x63_2M_4M_ENTRIES 32
807818

808819
static const struct _tlb_table intel_tlb_table[] = {
809820
{ 0x01, TLB_INST_4K, 32, " TLB_INST 4 KByte pages, 4-way set associative" },
@@ -825,7 +836,8 @@ static const struct _tlb_table intel_tlb_table[] = {
825836
{ 0x5c, TLB_DATA_4K_4M, 128, " TLB_DATA 4 KByte and 4 MByte pages" },
826837
{ 0x5d, TLB_DATA_4K_4M, 256, " TLB_DATA 4 KByte and 4 MByte pages" },
827838
{ 0x61, TLB_INST_4K, 48, " TLB_INST 4 KByte pages, full associative" },
828-
{ 0x63, TLB_DATA_1G, 4, " TLB_DATA 1 GByte pages, 4-way set associative" },
839+
{ 0x63, TLB_DATA_1G_2M_4M, 4, " TLB_DATA 1 GByte pages, 4-way set associative"
840+
" (plus 32 entries TLB_DATA 2 MByte or 4 MByte pages, not encoded here)" },
829841
{ 0x6b, TLB_DATA_4K, 256, " TLB_DATA 4 KByte pages, 8-way associative" },
830842
{ 0x6c, TLB_DATA_2M_4M, 128, " TLB_DATA 2 MByte or 4 MByte pages, 8-way associative" },
831843
{ 0x6d, TLB_DATA_1G, 16, " TLB_DATA 1 GByte pages, fully associative" },
@@ -925,6 +937,12 @@ static void intel_tlb_lookup(const unsigned char desc)
925937
if (tlb_lld_4m[ENTRIES] < intel_tlb_table[k].entries)
926938
tlb_lld_4m[ENTRIES] = intel_tlb_table[k].entries;
927939
break;
940+
case TLB_DATA_1G_2M_4M:
941+
if (tlb_lld_2m[ENTRIES] < TLB_0x63_2M_4M_ENTRIES)
942+
tlb_lld_2m[ENTRIES] = TLB_0x63_2M_4M_ENTRIES;
943+
if (tlb_lld_4m[ENTRIES] < TLB_0x63_2M_4M_ENTRIES)
944+
tlb_lld_4m[ENTRIES] = TLB_0x63_2M_4M_ENTRIES;
945+
fallthrough;
928946
case TLB_DATA_1G:
929947
if (tlb_lld_1g[ENTRIES] < intel_tlb_table[k].entries)
930948
tlb_lld_1g[ENTRIES] = intel_tlb_table[k].entries;
@@ -948,7 +966,7 @@ static void intel_detect_tlb(struct cpuinfo_x86 *c)
948966
cpuid(2, &regs[0], &regs[1], &regs[2], &regs[3]);
949967

950968
/* If bit 31 is set, this is an unknown format */
951-
for (j = 0 ; j < 3 ; j++)
969+
for (j = 0 ; j < 4 ; j++)
952970
if (regs[j] & (1 << 31))
953971
regs[j] = 0;
954972

arch/x86/kernel/cpu/sgx/ioctl.c

+7
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,13 @@ static int sgx_encl_create(struct sgx_encl *encl, struct sgx_secs *secs)
6464
struct file *backing;
6565
long ret;
6666

67+
/*
68+
* ECREATE would detect this too, but checking here also ensures
69+
* that the 'encl_size' calculations below can never overflow.
70+
*/
71+
if (!is_power_of_2(secs->size))
72+
return -EINVAL;
73+
6774
va_page = sgx_encl_grow(encl, true);
6875
if (IS_ERR(va_page))
6976
return PTR_ERR(va_page);

arch/x86/kvm/svm/svm.c

+12
Original file line numberDiff line numberDiff line change
@@ -3039,6 +3039,18 @@ static int svm_set_msr(struct kvm_vcpu *vcpu, struct msr_data *msr)
30393039
__func__, data);
30403040
break;
30413041
}
3042+
3043+
/*
3044+
* AMD changed the architectural behavior of bits 5:2. On CPUs
3045+
* without BusLockTrap, bits 5:2 control "external pins", but
3046+
* on CPUs that support BusLockDetect, bit 2 enables BusLockTrap
3047+
* and bits 5:3 are reserved-to-zero. Sadly, old KVM allowed
3048+
* the guest to set bits 5:2 despite not actually virtualizing
3049+
* Performance-Monitoring/Breakpoint external pins. Drop bits
3050+
* 5:2 for backwards compatibility.
3051+
*/
3052+
data &= ~GENMASK(5, 2);
3053+
30423054
if (data & DEBUGCTL_RESERVED_BITS)
30433055
return 1;
30443056

arch/x86/kvm/svm/svm.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -539,7 +539,7 @@ static inline bool is_x2apic_msrpm_offset(u32 offset)
539539
/* svm.c */
540540
#define MSR_INVALID 0xffffffffU
541541

542-
#define DEBUGCTL_RESERVED_BITS (~(0x3fULL))
542+
#define DEBUGCTL_RESERVED_BITS (~(DEBUGCTLMSR_BTF | DEBUGCTLMSR_LBR))
543543

544544
extern bool dump_invalid_vmcb;
545545

arch/x86/mm/init.c

+14-9
Original file line numberDiff line numberDiff line change
@@ -263,28 +263,33 @@ static void __init probe_page_size_mask(void)
263263
}
264264

265265
/*
266-
* INVLPG may not properly flush Global entries
267-
* on these CPUs when PCIDs are enabled.
266+
* INVLPG may not properly flush Global entries on
267+
* these CPUs. New microcode fixes the issue.
268268
*/
269269
static const struct x86_cpu_id invlpg_miss_ids[] = {
270-
X86_MATCH_INTEL_FAM6_MODEL(ALDERLAKE, 0),
271-
X86_MATCH_INTEL_FAM6_MODEL(ALDERLAKE_L, 0),
272-
X86_MATCH_INTEL_FAM6_MODEL(ALDERLAKE_N, 0),
273-
X86_MATCH_INTEL_FAM6_MODEL(RAPTORLAKE, 0),
274-
X86_MATCH_INTEL_FAM6_MODEL(RAPTORLAKE_P, 0),
275-
X86_MATCH_INTEL_FAM6_MODEL(RAPTORLAKE_S, 0),
270+
X86_MATCH_INTEL_FAM6_MODEL(ALDERLAKE, 0x2e),
271+
X86_MATCH_INTEL_FAM6_MODEL(ALDERLAKE_L, 0x42c),
272+
X86_MATCH_INTEL_FAM6_MODEL(ALDERLAKE_N, 0x11),
273+
X86_MATCH_INTEL_FAM6_MODEL(RAPTORLAKE, 0x118),
274+
X86_MATCH_INTEL_FAM6_MODEL(RAPTORLAKE_P, 0x4117),
275+
X86_MATCH_INTEL_FAM6_MODEL(RAPTORLAKE_S, 0x2e),
276276
{}
277277
};
278278

279279
static void setup_pcid(void)
280280
{
281+
const struct x86_cpu_id *invlpg_miss_match;
282+
281283
if (!IS_ENABLED(CONFIG_X86_64))
282284
return;
283285

284286
if (!boot_cpu_has(X86_FEATURE_PCID))
285287
return;
286288

287-
if (x86_match_cpu(invlpg_miss_ids)) {
289+
invlpg_miss_match = x86_match_cpu(invlpg_miss_ids);
290+
291+
if (invlpg_miss_match &&
292+
boot_cpu_data.microcode < invlpg_miss_match->driver_data) {
288293
pr_info("Incomplete global flushes, disabling PCID");
289294
setup_clear_cpu_cap(X86_FEATURE_PCID);
290295
return;

block/partitions/efi.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -682,7 +682,7 @@ static void utf16_le_to_7bit(const __le16 *in, unsigned int size, u8 *out)
682682
out[size] = 0;
683683

684684
while (i < size) {
685-
u8 c = le16_to_cpu(in[i]) & 0xff;
685+
u8 c = le16_to_cpu(in[i]) & 0x7f;
686686

687687
if (c && !isprint(c))
688688
c = '!';

drivers/base/core.c

+1
Original file line numberDiff line numberDiff line change
@@ -2023,6 +2023,7 @@ static bool __fw_devlink_relax_cycles(struct fwnode_handle *con_handle,
20232023
out:
20242024
sup_handle->flags &= ~FWNODE_FLAG_VISITED;
20252025
put_device(sup_dev);
2026+
put_device(con_dev);
20262027
put_device(par_dev);
20272028
return ret;
20282029
}

0 commit comments

Comments
 (0)