Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp551768pxb; Sat, 6 Mar 2021 08:20:52 -0800 (PST) X-Google-Smtp-Source: ABdhPJy43BhYcxYFfUoCnWtYrjyyOWdBUnKClAYK0CggQUzxyah21hTrfG65Cw6vX4ZacMK3++Dk X-Received: by 2002:aa7:cdcf:: with SMTP id h15mr14355244edw.28.1615047651958; Sat, 06 Mar 2021 08:20:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615047651; cv=none; d=google.com; s=arc-20160816; b=wgOirthtr8RkhtprFvQekHh4W6Qq1Fzsbsi1WHadnqgsEwd4HMw8Y6leEoaJQFNrQU UMK/MKF4CvW1r1i0Im+g2oOmHVBHxreKcjms0VQGBqkdge4d2cttZT3UogOD809YSyYs QxEql8PT7OCUWciP7GEnFcLtLfHDKqv68y56NrX/nGfXN4THjwLKBK51a4gieL4Gtial Eda05mZGM4XJSjjcDViXqzf41yLe/VQ+/kDTbTiTKmPv96eugfVWX/zcGaja0dRCRBPQ tY6fa+f0cjki50l9xyfzsCc6sGaEWgYx046+tewGO1Ry7HDyioz/EE/GkmbMgLCBV5hQ nCsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=8J1qAdHunz+tmbQ9/r5zGTbgmDsvG9L+i6KEmaXahyU=; b=md7w2BgKP6Mj3P93SlwJkyqT4/fq16OA/QT7+30j9AB3wxDKVuUXsS2wf9Xgqn5LAF pMWG1pub79S35IBaqKfvojPdCMEAa8JA1vWDZCD2yyiASKNsZB68eX1UEYKrtQAH2T8t rxGvAGjH92eEULpNGpKZX1HSL7LBcwi9X5B61IXLKHpOlinROVMMirWN/lbkv5kWygGH ITBLmDkiUvudxhTP02A5stNrfgqjFZ4fjnY0bGY6hHAX/sZaElc7yCTLj6V4jlbkejsa GZamoth7bPLF/AJ1qGssScyij5/tMraHPtMItoU5S2Y1D0OyYPSqcoYy/78j3zhCh4/o +1CQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=GbHI37Qp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r9si3894403edy.4.2021.03.06.08.20.29; Sat, 06 Mar 2021 08:20:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=GbHI37Qp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231278AbhCFQTJ (ORCPT + 99 others); Sat, 6 Mar 2021 11:19:09 -0500 Received: from mx2.suse.de ([195.135.220.15]:39330 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230449AbhCFQSg (ORCPT ); Sat, 6 Mar 2021 11:18:36 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1615047515; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=8J1qAdHunz+tmbQ9/r5zGTbgmDsvG9L+i6KEmaXahyU=; b=GbHI37Qp2DIWCj2DDCYa8vhoXGGZy59OCOoz24/s+MnE62esSHkcr80s9p6Cyt1yw6+uWJ Hy7jV1MpQww0MrpBWSNmxhvJ84UTYK9D2cdLc9uP1Z2hnokvYBtB72NGy0ZOglaGl47lHi vO4oNHGV2YZsIAPwuQnpBTR9ldXAJWc= Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 894A6ACBF; Sat, 6 Mar 2021 16:18:35 +0000 (UTC) From: Juergen Gross To: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org Cc: Juergen Gross , Boris Ostrovsky , Stefano Stabellini , stable@vger.kernel.org Subject: [PATCH v4 0/3] xen/events: bug fixes and some diagnostic aids Date: Sat, 6 Mar 2021 17:18:30 +0100 Message-Id: <20210306161833.4552-1-jgross@suse.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Those are fixes for XSA-332. The rest of the V3 patches have been applied already. There is one additional fix in patch 2 which addresses network outages when a guest is doing reboot loops. Juergen Gross (3): xen/events: reset affinity of 2-level event when tearing it down xen/events: don't unmask an event channel when an eoi is pending xen/events: avoid handling the same event on two cpus at the same time drivers/xen/events/events_2l.c | 22 +++-- drivers/xen/events/events_base.c | 130 ++++++++++++++++++++------- drivers/xen/events/events_fifo.c | 7 -- drivers/xen/events/events_internal.h | 14 +-- 4 files changed, 123 insertions(+), 50 deletions(-) -- 2.26.2