From patchwork Wed Aug 28 23:23:53 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Paul Mackerras X-Patchwork-Id: 1154938 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=kvm-ppc-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=ozlabs.org Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; secure) header.d=ozlabs.org header.i=@ozlabs.org header.b="BTpSvlQl"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 46JhdZ37m4z9sNx for ; Thu, 29 Aug 2019 09:24:02 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726828AbfH1XYB (ORCPT ); Wed, 28 Aug 2019 19:24:01 -0400 Received: from bilbo.ozlabs.org ([203.11.71.1]:59645 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726787AbfH1XYB (ORCPT ); Wed, 28 Aug 2019 19:24:01 -0400 Received: by ozlabs.org (Postfix, from userid 1003) id 46JhdV07mSz9sNk; Thu, 29 Aug 2019 09:23:57 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ozlabs.org; s=201707; t=1567034638; bh=1Ihwg1PIrv+Mdc9qXg3LJ1mTnfGppKTWocJKvY/n2HY=; h=Date:From:To:Cc:Subject:From; b=BTpSvlQlaAVYAutJsv9qyZITFqRVdAwFoyB6CsD9fR8ZYPxHsR0E4/UeJ1Kf2jJOT JBMa/3v85CefRRQxZePQ/SMtDkUkfQwIeaLYRu0J4O1Fa23CYr3nar3jatkgLArpG3 PXj5Jt9dGoNgJW+RJMLg4uy8XlDByGS/9og5MqGNi/pFikj0SaRm84glE5Y/C863aD +7RdjJwNcoTPlmvOG9qjQM3YNxktRw3dov0HtIpjD6C63jrUzvrvBHsWYrGGUOR0QJ QuoX6in957C3USXQd3GnLh/J1YBepmzAg5f98sotdbztJwVXwT6UFtPxqAPF2yhFSc qiYjmgsOZN4RQ== Date: Thu, 29 Aug 2019 09:23:53 +1000 From: Paul Mackerras To: Paolo Bonzini , Radim =?utf-8?b?S3LEjW3DocWZ?= , kvm@vger.kernel.org Cc: kvm-ppc@vger.kernel.org, David Gibson Subject: [GIT PULL] Please pull my kvm-ppc-next-5.4-1 tag Message-ID: <20190828232353.GA4485@blackberry> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) Sender: kvm-ppc-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm-ppc@vger.kernel.org Paolo or Radim, Please do a pull from my kvm-ppc-next-5.4-1 tag to get a PPC KVM update for 5.4. There is not a lot this time, mostly minor fixes and some prep for future patch series, plus a series that fixes a race condition in the XIVE interrupt controller code where interrupts could arrive after free_irq() and cause hangs and crashes in the host. The XIVE fix touches both PPC KVM and generic powerpc code, so Michael Ellerman put it in his topic/ppc-kvm branch and I have merged that branch into my kvm-ppc-next branch. Thanks, Paul. The following changes since commit 609488bc979f99f805f34e9a32c1e3b71179d10b: Linux 5.3-rc2 (2019-07-28 12:47:02 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc tags/kvm-ppc-next-5.4-1 for you to fetch changes up to ff42df49e75f053a8a6b4c2533100cdcc23afe69: KVM: PPC: Book3S HV: Don't lose pending doorbell request on migration on P9 (2019-08-27 14:08:22 +1000) ---------------------------------------------------------------- PPC KVM update for 5.4 - Some prep for extending the uses of the rmap array - Various minor fixes - Commits from the powerpc topic/ppc-kvm branch, which fix a problem with interrupts arriving after free_irq, causing host hangs and crashes. ---------------------------------------------------------------- Cédric Le Goater (1): KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP Fabiano Rosas (1): KVM: PPC: Remove leftover comment from emulate_loadstore.c Mark Cave-Ayland (1): KVM: PPC: Book3S PR: Fix software breakpoints Paul Mackerras (7): KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts KVM: PPC: Book3S HV: Don't push XIVE context when not using XIVE device powerpc/xive: Implement get_irqchip_state method for XIVE to fix shutdown race Merge remote-tracking branch 'remotes/powerpc/topic/ppc-kvm' into kvm-ppc-next KVM: PPC: Book3S: Enable XIVE native capability only if OPAL has required functions KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores KVM: PPC: Book3S HV: Don't lose pending doorbell request on migration on P9 Paul Menzel (1): KVM: PPC: Book3S: Mark expected switch fall-through Suraj Jitindar Singh (1): KVM: PPC: Book3S HV: Define usage types for rmap array in guest memslot arch/powerpc/include/asm/kvm_host.h | 22 +++++++-- arch/powerpc/include/asm/kvm_ppc.h | 1 + arch/powerpc/include/asm/xive.h | 9 ++++ arch/powerpc/kvm/book3s.c | 8 +-- arch/powerpc/kvm/book3s_32_mmu.c | 1 + arch/powerpc/kvm/book3s_hv.c | 24 ++++++--- arch/powerpc/kvm/book3s_hv_rm_mmu.c | 2 +- arch/powerpc/kvm/book3s_hv_rmhandlers.S | 38 +++++++++----- arch/powerpc/kvm/book3s_xive.c | 60 +++++++++++++++++++---- arch/powerpc/kvm/book3s_xive.h | 2 + arch/powerpc/kvm/book3s_xive_native.c | 23 +++++++-- arch/powerpc/kvm/emulate.c | 1 + arch/powerpc/kvm/emulate_loadstore.c | 6 --- arch/powerpc/kvm/powerpc.c | 3 +- arch/powerpc/sysdev/xive/common.c | 87 ++++++++++++++++++++++++--------- arch/powerpc/sysdev/xive/native.c | 7 +++ 16 files changed, 223 insertions(+), 71 deletions(-)