[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20201105135157.72abcadb@w520.home>
Date: Thu, 5 Nov 2020 13:51:57 -0700
From: Alex Williamson <alex.williamson@...hat.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: <linux-kernel@...r.kernel.org>,
"kvm@...r.kernel.org" <kvm@...r.kernel.org>
Subject: [GIT PULL] VFIO fixes for v5.10-rc3
Hi Linus,
The following changes since commit 3cea11cd5e3b00d91caf0b4730194039b45c5891:
Linux 5.10-rc2 (2020-11-01 14:43:51 -0800)
are available in the Git repository at:
git://github.com/awilliam/linux-vfio.git tags/vfio-v5.10-rc3
for you to fetch changes up to e4eccb853664de7bcf9518fb658f35e748bf1f68:
vfio/pci: Bypass IGD init in case of -ENODEV (2020-11-03 11:07:40 -0700)
----------------------------------------------------------------
VFIO fixes for v5.10-rc3
- Remove code by using existing helper (Zenghui Yu)
- fsl-mc copy-user return and underflow fixes (Dan Carpenter)
- fsl-mc static function declaration (Diana Craciun)
- Fix ioeventfd sleeping under spinlock (Alex Williamson)
- Fix pm reference count leak in vfio-platform (Zhang Qilong)
- Allow opening IGD device w/o OpRegion support (Fred Gao)
----------------------------------------------------------------
Alex Williamson (1):
vfio/pci: Implement ioeventfd thread handler for contended memory lock
Dan Carpenter (2):
vfio/fsl-mc: return -EFAULT if copy_to_user() fails
vfio/fsl-mc: prevent underflow in vfio_fsl_mc_mmap()
Diana Craciun (1):
vfio/fsl-mc: Make vfio_fsl_mc_irqs_allocate static
Fred Gao (1):
vfio/pci: Bypass IGD init in case of -ENODEV
Zenghui Yu (1):
vfio/type1: Use the new helper to find vfio_group
Zhang Qilong (1):
vfio: platform: fix reference leak in vfio_platform_open
drivers/vfio/fsl-mc/vfio_fsl_mc.c | 10 +++++--
drivers/vfio/fsl-mc/vfio_fsl_mc_intr.c | 2 +-
drivers/vfio/pci/vfio_pci.c | 2 +-
drivers/vfio/pci/vfio_pci_rdwr.c | 43 ++++++++++++++++++++++------
drivers/vfio/platform/vfio_platform_common.c | 3 +-
drivers/vfio/vfio_iommu_type1.c | 17 ++++-------
6 files changed, 50 insertions(+), 27 deletions(-)
Powered by blists - more mailing lists