Message ID | 20231222231544.3333693-1-pbonzini@redhat.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel+bounces-10108-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:2483:b0:fb:cd0c:d3e with SMTP id q3csp1381007dyi; Fri, 22 Dec 2023 15:16:08 -0800 (PST) X-Google-Smtp-Source: AGHT+IFeS5IpjD55AuqFJzWvSVu8KEfYIvZmikp/xyzwj7rn3Y+k7k7uHQe/A7MllvlDK4ZN7NHI X-Received: by 2002:a05:620a:4912:b0:77f:5e6c:f7e9 with SMTP id vy18-20020a05620a491200b0077f5e6cf7e9mr2737231qkn.68.1703286968340; Fri, 22 Dec 2023 15:16:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703286968; cv=none; d=google.com; s=arc-20160816; b=IfodiCFaWdvBENKIrXQV7kQwierEOdctz/nUJsgEMTBygnQBlEYZvV+R46hXXyDot5 ZAb1+y9gLfSDc/aBD34si0+kgLPujZkhxnImy8hP+50gMtpD+l6NkjV6GxE81U6PPDtm iUe2b2/M3CKDWJBRtFLIMmMuxZ+amd6ahqEjHgTW4KhVm1ao5gF5aqP2eZpzE3Xqm7PN Qqj7Ki5cWPR29/0SWAEHFGlDJXnABodluPiRfxkOMaYBeK74MhsD1/Aktcx8Fl9ju1gn vWyUlpWYWb/g85i9MO+rgMs0Z2mnRRnfJCHa3vWGH6peZquYFNQx5tHOJMeMvl5CfXFh DAVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=qWoEtrdNPasYMgjNknGsXEce5LCOLCYkYpqGX/DZgy0=; fh=RXl73CWCYIm5aDIRwkpfnnURSCU9og7XETYThrQEo9o=; b=TczazzdVPgNUfyI//gdfU5jVAdn6jNDlop2OLWDUss+ryeXf85xqK+nAvjRE0gjX2c S2aUYpqXWpZhGdCdA9bJb0aNMbkK7V5HmYrI80kMEV+2k6UTIkVFlvqqgpwe8XndNqUg PFKaUYV4o0xsUHTQ1x2g0iQuh62+8mWTRWd3ziQ/qhWG2xUpURmoj8sGQhVYSeLp4Kw8 w9O4odwLAE54RGRvIld8Ael7beqVB2TEnELB+xKDa6WTZ7+t2WHDFOS99hpuwOUHxM8U TVUGMC6iGKJzSenF5uc2EE7VDkigFML+iwKF0CIJs2fAfdFZBoxRq+5hSE7TKVl4dwHC wQaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=R+NqSMdb; spf=pass (google.com: domain of linux-kernel+bounces-10108-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-10108-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id qr6-20020a05620a390600b0077db734a0desi5701299qkn.125.2023.12.22.15.16.08 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Dec 2023 15:16:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-10108-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=R+NqSMdb; spf=pass (google.com: domain of linux-kernel+bounces-10108-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-10108-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 142CC1C223A2 for <ouuuleilei@gmail.com>; Fri, 22 Dec 2023 23:16:08 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C5BBB35EF2; Fri, 22 Dec 2023 23:15:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="R+NqSMdb" X-Original-To: linux-kernel@vger.kernel.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 76ECC33CD5 for <linux-kernel@vger.kernel.org>; Fri, 22 Dec 2023 23:15:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1703286947; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=qWoEtrdNPasYMgjNknGsXEce5LCOLCYkYpqGX/DZgy0=; b=R+NqSMdbik/2JQt/mwPPY1QpiKYd3Z2RM8M0FrHB398AB3rxCtxpyZd4tvSE7yV7MGfFXk b3+bDzkJaZmbKkfwVckUbPGIuBCrnVdXTcHayaQKE4jsmavIROV1VLrnNF4RAAr8awd6BZ omp38sWo1V557D4GwlJDsHZf7X3xK7k= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-616-MJJUghEpN5mPW4RiWMpvTg-1; Fri, 22 Dec 2023 18:15:45 -0500 X-MC-Unique: MJJUghEpN5mPW4RiWMpvTg-1 Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com [10.11.54.9]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 73CCE1C0514C; Fri, 22 Dec 2023 23:15:45 +0000 (UTC) Received: from virtlab701.virt.lab.eng.bos.redhat.com (virtlab701.virt.lab.eng.bos.redhat.com [10.19.152.228]) by smtp.corp.redhat.com (Postfix) with ESMTP id 56FA6492BC6; Fri, 22 Dec 2023 23:15:45 +0000 (UTC) From: Paolo Bonzini <pbonzini@redhat.com> To: torvalds@linux-foundation.org Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: [GIT PULL] KVM fixes for Linux 6.7-rc7 Date: Fri, 22 Dec 2023 18:15:44 -0500 Message-Id: <20231222231544.3333693-1-pbonzini@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.9 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1786025836451112104 X-GMAIL-MSGID: 1786025836451112104 |
Series |
[GIT,PULL] KVM fixes for Linux 6.7-rc7
|
|
Pull-request
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linusMessage
Paolo Bonzini
Dec. 22, 2023, 11:15 p.m. UTC
Linus, The following changes since commit a39b6ac3781d46ba18193c9dbb2110f31e9bffe9: Linux 6.7-rc5 (2023-12-10 14:33:40 -0800) are available in the Git repository at: https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus for you to fetch changes up to ef5b28372c565128bdce7a59bc78402a8ce68e1b: Merge tag 'kvm-riscv-fixes-6.7-1' of https://github.com/kvm-riscv/linux into kvm-master (2023-12-22 18:05:07 -0500) ---------------------------------------------------------------- RISC-V - Fix a race condition in updating external interrupt for trap-n-emulated IMSIC swfile - Fix print_reg defaults in get-reg-list selftest ARM: - Ensure a vCPU's redistributor is unregistered from the MMIO bus if vCPU creation fails - Fix building KVM selftests for arm64 from the top-level Makefile x86: - Fix breakage for SEV-ES guests that use XSAVES. Selftests: - Fix bad use of strcat(), by not using strcat() at all ---------------------------------------------------------------- Andrew Jones (1): KVM: riscv: selftests: Fix get-reg-list print_reg defaults Marc Zyngier (5): KVM: arm64: vgic: Simplify kvm_vgic_destroy() KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy() KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy KVM: arm64: vgic: Ensure that slots_lock is held in vgic_register_all_redist_iodevs() KVM: Convert comment into an assertion in kvm_io_bus_register_dev() Michael Roth (1): KVM: SEV: Do not intercept accesses to MSR_IA32_XSS for SEV-ES guests Oliver Upton (1): KVM: selftests: Ensure sysreg-defs.h is generated at the expected path Paolo Bonzini (3): KVM: selftests: Fix dynamic generation of configuration names Merge tag 'kvmarm-fixes-6.7-2' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into kvm-master Merge tag 'kvm-riscv-fixes-6.7-1' of https://github.com/kvm-riscv/linux into kvm-master Yong-Xuan Wang (1): RISCV: KVM: update external interrupt atomically for IMSIC swfile arch/arm64/kvm/arm.c | 2 +- arch/arm64/kvm/vgic/vgic-init.c | 55 ++++++++++++++---------- arch/arm64/kvm/vgic/vgic-mmio-v3.c | 4 +- arch/arm64/kvm/vgic/vgic.h | 1 + arch/riscv/kvm/aia_imsic.c | 13 ++++++ arch/x86/kvm/svm/sev.c | 19 ++++++++ arch/x86/kvm/svm/svm.c | 1 + arch/x86/kvm/svm/svm.h | 2 +- tools/testing/selftests/kvm/Makefile | 26 ++++++----- tools/testing/selftests/kvm/get-reg-list.c | 9 ++-- tools/testing/selftests/kvm/riscv/get-reg-list.c | 10 +++-- virt/kvm/kvm_main.c | 3 +- 12 files changed, 101 insertions(+), 44 deletions(-)
Comments
The pull request you sent on Fri, 22 Dec 2023 18:15:44 -0500:
> https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/867583b3991929aeea3844874fba598243c54240
Thank you!