From patchwork Wed Nov 8 11:03:28 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Mackerras X-Patchwork-Id: 835763 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=kvm-ppc-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; secure) header.d=ozlabs.org header.i=@ozlabs.org header.b="Lqxiq+In"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3yX3Lv6Nkkz9sPs for ; Wed, 8 Nov 2017 22:03:35 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751352AbdKHLDe (ORCPT ); Wed, 8 Nov 2017 06:03:34 -0500 Received: from ozlabs.org ([103.22.144.67]:37123 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750760AbdKHLDd (ORCPT ); Wed, 8 Nov 2017 06:03:33 -0500 Received: by ozlabs.org (Postfix, from userid 1003) id 3yX3Lr12Jhz9sPm; Wed, 8 Nov 2017 22:03:31 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ozlabs.org; s=201707; t=1510139012; bh=U14JFrozjni7PBGbFNmWuhBkpeMWMWx4yBHgN5SAgao=; h=Date:From:To:Cc:Subject:From; b=Lqxiq+InDk65vHXxWCrtZIrg2VHRl8TtLbNrBXuUxbGUJob27X/S+SwFuaXumlxS/ Kz2rtfK061FGHmCcdmZHRqKfD452ewrr2QBHyEtA90wjQwRRR39jDaxMQ+/V7yiW+B 5yI9ulPdav3ZxjxSbQrQnNLi+ocP4vFQjbOq53dYa7RiEQCO9XEkzHu7L/PqKcg+eZ iLevlaZGcWk1NIBB8IFZGVr4bx2BUF9jkzinVUU+NOgmvGc5YwEK0NLKVGRy4dgosw Kvp9hXaANNKO7yvEHH31tfygp4tGKuXRXpaXorQQzySPvbjuYT6Li0P98iDsNV47rx evUBh4928ojNg== Date: Wed, 8 Nov 2017 22:03:28 +1100 From: Paul Mackerras To: Paolo Bonzini , kvm@vger.kernel.org Cc: kvm-ppc@vger.kernel.org Subject: [GIT PULL] Please pull paulus/powerpc kvm-ppc-fixes-4.14-2 tag Message-ID: <20171108110328.GC9689@fergus.ozlabs.ibm.com> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) Sender: kvm-ppc-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm-ppc@vger.kernel.org Hi Paolo, Please do a pull from my paulus/powerpc tree to get a fix for a bug that can cause the host to crash when a guest resizes its hashed page table. I would like this to go into 4.14 if that is still possible. I have done a signed tag this time. It is signed with a new signing sub-key (2C63719F) that I made today, so you will need to fetch it if you want to check the signature. It is a sub-key on my key EC9DBB8C which had expired, but I have set the expiry to "never" now, so you will need to re-fetch that one too. I am going to do an equivalent fix on my kvm-ppc-next branch also, but it will look different because the fix touches the same code that my recent HPT-on-radix patch series touches. Thanks, Paul. The following changes since commit ad98dd1a75ac6a8b68cd2f7bf4676b65734f2a43: KVM: PPC: Book3S HV: Add more barriers in XIVE load/unload code (2017-10-16 08:46:46 +1100) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc tags/kvm-ppc-fixes-4.14-2 for you to fetch changes up to 38c53af853069adf87181684370d7b8866d6387b: KVM: PPC: Book3S HV: Fix exclusion between HPT resizing and other HPT updates (2017-11-08 15:14:02 +1100) ---------------------------------------------------------------- PPC KVM fixes for 4.14 Just one fix here for a host crash that can occur with HV KVM as a result of resizing the guest hashed page table (HPT). ---------------------------------------------------------------- Paul Mackerras (1): KVM: PPC: Book3S HV: Fix exclusion between HPT resizing and other HPT updates arch/powerpc/kvm/book3s_64_mmu_hv.c | 10 ++++++++++ arch/powerpc/kvm/book3s_hv.c | 29 +++++++++++++++++++---------- 2 files changed, 29 insertions(+), 10 deletions(-) --- To unsubscribe from this list: send the line "unsubscribe kvm-ppc" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html