From patchwork Mon Mar 4 06:22:05 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Wei Liu X-Patchwork-Id: 209389 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:fa17:b0:10a:f01:a869 with SMTP id ju23csp1245870dyc; Sun, 3 Mar 2024 22:22:24 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXNfGO2YLbApnUAt56uW7keLgDSpM4vTXqGsSjBxv6Zrh0LdrztpxBNdny9ZfEbYWHolpD+6GTgcYemGsxdpmEHgaxCVA== X-Google-Smtp-Source: AGHT+IFSSbCUWvkyynOBsWZIYoXkUTTcTDyS4/mMBWU9zE3b6foPorwTcrUK3KobReU8k/6g8tiF X-Received: by 2002:a05:620a:28c8:b0:788:2572:b24d with SMTP id l8-20020a05620a28c800b007882572b24dmr3840294qkp.25.1709533344347; Sun, 03 Mar 2024 22:22:24 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709533344; cv=pass; d=google.com; s=arc-20160816; b=PHpe45HFuD2Y6bhKICyW2d62QX8feH+vwXOvZFk7Qhnfkh8Xh0iihMqoohE3pudmMj MuxhnT4Or6A4ZjcIrOyAjJMqXe8VuXWKAs9TUXIZqZMiGfTb/b68pYY+EjRwB/qjeb67 tH9kCXe3DF4tGps20VAyeSRbmXMTtntk4P2gSfa7YMJRTeqoE+liLvPumO+bqX6PBYJl VE4lT6vJg1b/fv6tXXU6wyF8QETZxi++2tV9Gn0Oqx6TjTNlz/bSUquzt00+i7TxTqd5 MJdVoJ74+cK80xFN6OcScWbN691sQtp+DUff4JGMzfKz/FXZNvai2EU/QGzLGqqke8sM WWDA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-disposition:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:message-id:subject:cc:to:from:date; bh=Lgbpy/xhGDqTmje0FzgN23UkMz4aW7iaL1u0lYB0pLc=; fh=5DhjU9/1uNYYjLFfMczfyezb/ydgrrwpiLQVBhcxRtg=; b=koJ9D+kgyO+2G4p/mwnTWXFvT/arMEjz+h/DJNdxx5S5C4G5VVpQKgKpfVnpeArXem fkPckBStDJsot6kvFJ2QZaUBXvri30sg3iitv4rwwtSBsVsFlxY3G4Etif9tSQCDtinP 5g03Jl7beUD3pcHeltKGWJEz29L2bj2MI60Mqs7korVOBBEvw7t2ze7lfA6enq4R3TzD zhAQWFvHokae+a0Ooxp4+WqDAGev8LlX9F1lYI6IWPYjZ+J7eo1OwWk0jRDkcSTMllxB q3W1zVuMklA+KOEMcr27DnmAIeBHv6nkYOdD/p/KAE6RMQCFsAO4e6D9R8J4oEO3fc0Q 9now==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-90083-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-90083-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id i2-20020a05620a248200b00788046ea137si7743831qkn.247.2024.03.03.22.22.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Mar 2024 22:22:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-90083-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-90083-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-90083-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 267A01C20D0B for ; Mon, 4 Mar 2024 06:22:24 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E801CDDA5; Mon, 4 Mar 2024 06:22:13 +0000 (UTC) Received: from mail-pj1-f46.google.com (mail-pj1-f46.google.com [209.85.216.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 22577C2C8; Mon, 4 Mar 2024 06:22:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.46 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709533332; cv=none; b=CXTUc1KYw11/lcKP4ex2Q1aX3n3qzlv+imwgTRab62YKj5tyaIXWJeXR1W14u7NE/VcEZNIDDV2eps/wXU/2gtnV7KL9bIJqpma+JWny9M7vJ0P5Kc9e9nDhuNSAUFwPH1agiQ1PBHMgJATXMhsrPg8K3TBxHRdlOZwoG5HqpA0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709533332; c=relaxed/simple; bh=X1D7s0fm2PMS0AJTwarQBIFcT1TzEvEHovub1KFd0gU=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition; b=NmxYf09I68HQH1gWjM5GTINCLwRilfZtNlTKzBa1a5lM8nDAlf0dpvUsL10oqf7cc4nZqJGB2bT08eZggNBifRLqiK+vE9lwOrQhT5L8Cxpzw+RT8Zc9jfMwkct8KL0ArCHPegPL7gpqzNNtNNYDxWBKEI+vbHOzrtv4I1zxkxQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.216.46 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pj1-f46.google.com with SMTP id 98e67ed59e1d1-29b2c48fa3dso679595a91.1; Sun, 03 Mar 2024 22:22:10 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709533330; x=1710138130; h=content-disposition:mime-version:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Lgbpy/xhGDqTmje0FzgN23UkMz4aW7iaL1u0lYB0pLc=; b=czK+7cLHCTuXT0AOZ8YeIApGpoenPoG9Dc34dByeuArZNwjctEYzycRHYRDTG9lKHQ MZchpkOBiFDMp8LJdqMra5Yz/YPiflE5XdcbFJ/tMrPP7qrVuyrFnPrQ9kM1egzM7roS iaMjcdTrXvuXQuAPGuanJYf013zef2T+3rqvjRESJuPStxDHswBVcfzXjTyzjrFu1erZ wNzwhLwdyI1F+OUrtZe8KDPrRCwhnBEeLYoG/OvRoFgO1+bDJCcI8E9uen6x+zLgPpVb CGaU+wfCdct7LELgN1b1TBIsyFYhGnFkUc7TFrVrnlJWwNp4bZUgZMpanZLsVtwVR6dc prRQ== X-Forwarded-Encrypted: i=1; AJvYcCWHP18EwWNswF9pJv82lxt6e1G6yFsLhaCG0UdszOY8B9hdwH0Kmbl7Hu99UTjQf75+t8Lj+zVVTf4kIPiVNluduXH6sVUx9nyxtBHvCA2KqlbPfVEa7c+2BnuP1eGZ8rnIjpntG/e3o2Ki X-Gm-Message-State: AOJu0YwbEiXjoYPh5wnGW6WC4frWY0rPJUL4UO3dG2LkwS3WNiGxgEpO zJ86qO0oxyqzIUFuBVCx1YZTW6ee5sHSBNaiQOyAiaRN/1ohOmjhy45YZF/R X-Received: by 2002:a17:90a:a884:b0:29a:9c12:785 with SMTP id h4-20020a17090aa88400b0029a9c120785mr5890475pjq.1.1709533330360; Sun, 03 Mar 2024 22:22:10 -0800 (PST) Received: from liuwe-devbox-debian-v2 ([20.69.120.36]) by smtp.gmail.com with ESMTPSA id y5-20020a17090aca8500b0029b59bf77b4sm31318pjt.42.2024.03.03.22.22.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Mar 2024 22:22:09 -0800 (PST) Date: Mon, 4 Mar 2024 06:22:05 +0000 From: Wei Liu To: Linus Torvalds Cc: Wei Liu , Linux on Hyper-V List , Linux Kernel List , kys@microsoft.com, haiyangz@microsoft.com, decui@microsoft.com Subject: [GIT PULL] Hyper-V fixes for 6.8-rc8 Message-ID: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Disposition: inline X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1792575636309766210 X-GMAIL-MSGID: 1792575636309766210 Hi Linus, The following changes since commit d206a76d7d2726f3b096037f2079ce0bd3ba329b: Linux 6.8-rc6 (2024-02-25 15:46:06 -0800) are available in the Git repository at: ssh://git@gitolite.kernel.org/pub/scm/linux/kernel/git/hyperv/linux.git tags/hyperv-fixes-signed-20240303 for you to fetch changes up to aa707b615ce1551c25c5a3500cca2cf620e36b12: Drivers: hv: vmbus: make hv_bus const (2024-03-03 02:32:35 +0000) ---------------------------------------------------------------- hyperv-fixes for v6.8 - Multiple fixes, cleanups and documentations for Hyper-V core code and drivers. ---------------------------------------------------------------- Michael Kelley (8): Drivers: hv: vmbus: Calculate ring buffer size for more efficient use of memory fbdev/hyperv_fb: Fix logic error for Gen2 VMs in hvfb_getmem() Drivers: hv: vmbus: Remove duplication and cleanup code in create_gpadl_header() Drivers: hv: vmbus: Update indentation in create_gpadl_header() Documentation: hyperv: Add overview of PCI pass-thru device support x86/hyperv: Use slow_virt_to_phys() in page transition hypervisor callback x86/mm: Regularize set_memory_p() parameters and make non-static x86/hyperv: Make encrypted/decrypted changes safe for load_unaligned_zeropad() Peter Martincic (1): hv_utils: Allow implicit ICTIMESYNCFLAG_SYNC Ricardo B. Marliere (1): Drivers: hv: vmbus: make hv_bus const Saurabh Sengar (1): x86/hyperv: Allow 15-bit APIC IDs for VTL platforms Documentation/virt/hyperv/index.rst | 1 + Documentation/virt/hyperv/vpci.rst | 316 ++++++++++++++++++++++++++++++++++++ arch/x86/hyperv/hv_vtl.c | 7 + arch/x86/hyperv/ivm.c | 65 +++++++- arch/x86/include/asm/set_memory.h | 1 + arch/x86/mm/pat/set_memory.c | 24 +-- drivers/hv/channel.c | 176 ++++++++------------ drivers/hv/hv_util.c | 31 +++- drivers/hv/vmbus_drv.c | 2 +- drivers/video/fbdev/hyperv_fb.c | 2 - include/linux/hyperv.h | 22 ++- 11 files changed, 521 insertions(+), 126 deletions(-) create mode 100644 Documentation/virt/hyperv/vpci.rst