]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
entry: Rename "kvm" entry code assets to "virt" to genericize APIs
authorSean Christopherson <seanjc@google.com>
Thu, 28 Aug 2025 00:01:54 +0000 (17:01 -0700)
committerWei Liu <wei.liu@kernel.org>
Tue, 30 Sep 2025 22:50:18 +0000 (22:50 +0000)
Rename the "kvm" entry code files and Kconfigs to use generic "virt"
nomenclature so that the code can be reused by other hypervisors (or
rather, their root/dom0 partition drivers), without incorrectly suggesting
the code somehow relies on and/or involves KVM.

No functional change intended.

Signed-off-by: Sean Christopherson <seanjc@google.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Joel Fernandes <joelagnelf@nvidia.com>
Signed-off-by: Wei Liu <wei.liu@kernel.org>
12 files changed:
MAINTAINERS
arch/arm64/kvm/Kconfig
arch/loongarch/kvm/Kconfig
arch/riscv/kvm/Kconfig
arch/x86/kvm/Kconfig
include/linux/entry-virt.h [moved from include/linux/entry-kvm.h with 94% similarity]
include/linux/kvm_host.h
include/linux/rcupdate.h
kernel/entry/Makefile
kernel/entry/virt.c [moved from kernel/entry/kvm.c with 97% similarity]
kernel/rcu/tree.c
virt/kvm/Kconfig

index fe168477caa45799dfe07de2f54de6d6a1ce0615..c255048333f054019b7483cb14d775d9b5666609 100644 (file)
@@ -10200,7 +10200,7 @@ L:      linux-kernel@vger.kernel.org
 S:     Maintained
 T:     git git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git core/entry
 F:     include/linux/entry-common.h
-F:     include/linux/entry-kvm.h
+F:     include/linux/entry-virt.h
 F:     include/linux/irq-entry-common.h
 F:     kernel/entry/
 
index 713248f240e03d505ac17085b3b2f70054ff1102..6f4fc3caa31a601c8174fe297bab68cc83ee62ef 100644 (file)
@@ -25,7 +25,7 @@ menuconfig KVM
        select HAVE_KVM_CPU_RELAX_INTERCEPT
        select KVM_MMIO
        select KVM_GENERIC_DIRTYLOG_READ_PROTECT
-       select KVM_XFER_TO_GUEST_WORK
+       select VIRT_XFER_TO_GUEST_WORK
        select KVM_VFIO
        select HAVE_KVM_DIRTY_RING_ACQ_REL
        select NEED_KVM_DIRTY_RING_WITH_BITMAP
index 40eea6da7c2598eb3accc4fb0c5bda5b9d3e7f4d..ae64bbdf83a7a490153b2a5a77cd34b6226e58d0 100644 (file)
@@ -31,7 +31,7 @@ config KVM
        select KVM_GENERIC_HARDWARE_ENABLING
        select KVM_GENERIC_MMU_NOTIFIER
        select KVM_MMIO
-       select KVM_XFER_TO_GUEST_WORK
+       select VIRT_XFER_TO_GUEST_WORK
        select SCHED_INFO
        select GUEST_PERF_EVENTS if PERF_EVENTS
        help
index 5a62091b08090b308eef08f9cba68ab1d2ae3827..c50328212917ec6b54919ff6a8b49344569f7a5d 100644 (file)
@@ -30,7 +30,7 @@ config KVM
        select KVM_GENERIC_DIRTYLOG_READ_PROTECT
        select KVM_GENERIC_HARDWARE_ENABLING
        select KVM_MMIO
-       select KVM_XFER_TO_GUEST_WORK
+       select VIRT_XFER_TO_GUEST_WORK
        select KVM_GENERIC_MMU_NOTIFIER
        select SCHED_INFO
        select GUEST_PERF_EVENTS if PERF_EVENTS
index 2c86673155c9a097a6af3d313a9f7d1429d8102f..f81074b0c0a8eb96dabac86ada50c3cd90d192b5 100644 (file)
@@ -40,7 +40,7 @@ config KVM_X86
        select HAVE_KVM_MSI
        select HAVE_KVM_CPU_RELAX_INTERCEPT
        select HAVE_KVM_NO_POLL
-       select KVM_XFER_TO_GUEST_WORK
+       select VIRT_XFER_TO_GUEST_WORK
        select KVM_GENERIC_DIRTYLOG_READ_PROTECT
        select KVM_VFIO
        select HAVE_KVM_PM_NOTIFIER if PM
similarity index 94%
rename from include/linux/entry-kvm.h
rename to include/linux/entry-virt.h
index 3644de7e601960d582544eeb366fa70112511d3c..42c89e3e5ca7ac9ed90706ced5b688d909ab5f3c 100644 (file)
@@ -1,6 +1,6 @@
 /* SPDX-License-Identifier: GPL-2.0 */
-#ifndef __LINUX_ENTRYKVM_H
-#define __LINUX_ENTRYKVM_H
+#ifndef __LINUX_ENTRYVIRT_H
+#define __LINUX_ENTRYVIRT_H
 
 #include <linux/static_call_types.h>
 #include <linux/resume_user_mode.h>
@@ -10,7 +10,7 @@
 #include <linux/tick.h>
 
 /* Transfer to guest mode work */
-#ifdef CONFIG_KVM_XFER_TO_GUEST_WORK
+#ifdef CONFIG_VIRT_XFER_TO_GUEST_WORK
 
 #ifndef ARCH_XFER_TO_GUEST_MODE_WORK
 # define ARCH_XFER_TO_GUEST_MODE_WORK  (0)
@@ -90,6 +90,6 @@ static inline bool xfer_to_guest_mode_work_pending(void)
        lockdep_assert_irqs_disabled();
        return __xfer_to_guest_mode_work_pending();
 }
-#endif /* CONFIG_KVM_XFER_TO_GUEST_WORK */
+#endif /* CONFIG_VIRT_XFER_TO_GUEST_WORK */
 
 #endif
index 598b9473e46d6ccd798842ee73a9069ae4efa5c4..70ac2267d5d0c36f282f12cac2b13e630e3b9b7e 100644 (file)
@@ -2,7 +2,7 @@
 #ifndef __KVM_HOST_H
 #define __KVM_HOST_H
 
-#include <linux/entry-kvm.h>
+#include <linux/entry-virt.h>
 #include <linux/types.h>
 #include <linux/hardirq.h>
 #include <linux/list.h>
@@ -2444,7 +2444,7 @@ static inline int kvm_arch_vcpu_run_pid_change(struct kvm_vcpu *vcpu)
 }
 #endif /* CONFIG_HAVE_KVM_VCPU_RUN_PID_CHANGE */
 
-#ifdef CONFIG_KVM_XFER_TO_GUEST_WORK
+#ifdef CONFIG_VIRT_XFER_TO_GUEST_WORK
 static inline void kvm_handle_signal_exit(struct kvm_vcpu *vcpu)
 {
        vcpu->run->exit_reason = KVM_EXIT_INTR;
@@ -2461,7 +2461,7 @@ static inline int kvm_xfer_to_guest_mode_handle_work(struct kvm_vcpu *vcpu)
        }
        return r;
 }
-#endif /* CONFIG_KVM_XFER_TO_GUEST_WORK */
+#endif /* CONFIG_VIRT_XFER_TO_GUEST_WORK */
 
 /*
  * If more than one page is being (un)accounted, @virt must be the address of
index 120536f4c6eb1d8f91afc16111d976f7a14ef4fc..1e1f3aa375d9e478a15ed2dcf2f8ba02706225b9 100644 (file)
@@ -129,7 +129,7 @@ static inline void rcu_sysrq_start(void) { }
 static inline void rcu_sysrq_end(void) { }
 #endif /* #else #ifdef CONFIG_RCU_STALL_COMMON */
 
-#if defined(CONFIG_NO_HZ_FULL) && (!defined(CONFIG_GENERIC_ENTRY) || !defined(CONFIG_KVM_XFER_TO_GUEST_WORK))
+#if defined(CONFIG_NO_HZ_FULL) && (!defined(CONFIG_GENERIC_ENTRY) || !defined(CONFIG_VIRT_XFER_TO_GUEST_WORK))
 void rcu_irq_work_resched(void);
 #else
 static __always_inline void rcu_irq_work_resched(void) { }
index 77fcd83dd663139bd96a102bfee7f65822e941b3..2333d70802e4457dfa61a142230fbfc477c43ca4 100644 (file)
@@ -14,4 +14,4 @@ CFLAGS_common.o               += -fno-stack-protector
 
 obj-$(CONFIG_GENERIC_IRQ_ENTRY)        += common.o
 obj-$(CONFIG_GENERIC_SYSCALL)          += syscall-common.o syscall_user_dispatch.o
-obj-$(CONFIG_KVM_XFER_TO_GUEST_WORK)   += kvm.o
+obj-$(CONFIG_VIRT_XFER_TO_GUEST_WORK)  += virt.o
similarity index 97%
rename from kernel/entry/kvm.c
rename to kernel/entry/virt.c
index 6fc762eaacca7cb173b5dfcf9c067474a7a929c0..c52f99249763427561e314c2b52ff80a1a0e9bbc 100644 (file)
@@ -1,6 +1,6 @@
 // SPDX-License-Identifier: GPL-2.0
 
-#include <linux/entry-kvm.h>
+#include <linux/entry-virt.h>
 
 static int xfer_to_guest_mode_work(unsigned long ti_work)
 {
index 174ee243b3490ac7c87922c760031446264517a4..995489b72535eb794dcf89d02872ca25840bf46e 100644 (file)
@@ -573,7 +573,7 @@ void rcutorture_format_gp_seqs(unsigned long long seqs, char *cp, size_t len)
 }
 EXPORT_SYMBOL_GPL(rcutorture_format_gp_seqs);
 
-#if defined(CONFIG_NO_HZ_FULL) && (!defined(CONFIG_GENERIC_ENTRY) || !defined(CONFIG_KVM_XFER_TO_GUEST_WORK))
+#if defined(CONFIG_NO_HZ_FULL) && (!defined(CONFIG_GENERIC_ENTRY) || !defined(CONFIG_VIRT_XFER_TO_GUEST_WORK))
 /*
  * An empty function that will trigger a reschedule on
  * IRQ tail once IRQs get re-enabled on userspace/guest resume.
@@ -602,7 +602,7 @@ noinstr void rcu_irq_work_resched(void)
        if (IS_ENABLED(CONFIG_GENERIC_ENTRY) && !(current->flags & PF_VCPU))
                return;
 
-       if (IS_ENABLED(CONFIG_KVM_XFER_TO_GUEST_WORK) && (current->flags & PF_VCPU))
+       if (IS_ENABLED(CONFIG_VIRT_XFER_TO_GUEST_WORK) && (current->flags & PF_VCPU))
                return;
 
        instrumentation_begin();
@@ -611,7 +611,7 @@ noinstr void rcu_irq_work_resched(void)
        }
        instrumentation_end();
 }
-#endif /* #if defined(CONFIG_NO_HZ_FULL) && (!defined(CONFIG_GENERIC_ENTRY) || !defined(CONFIG_KVM_XFER_TO_GUEST_WORK)) */
+#endif /* #if defined(CONFIG_NO_HZ_FULL) && (!defined(CONFIG_GENERIC_ENTRY) || !defined(CONFIG_VIRT_XFER_TO_GUEST_WORK)) */
 
 #ifdef CONFIG_PROVE_RCU
 /**
index 727b542074e7efa306f0db0e21d072adff70e3cf..ce843db5383122ee5e70666c66c0ac2ceb4f493d 100644 (file)
@@ -87,7 +87,7 @@ config HAVE_KVM_VCPU_RUN_PID_CHANGE
 config HAVE_KVM_NO_POLL
        bool
 
-config KVM_XFER_TO_GUEST_WORK
+config VIRT_XFER_TO_GUEST_WORK
        bool
 
 config HAVE_KVM_PM_NOTIFIER