Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6305578rwb; Sun, 11 Dec 2022 23:18:25 -0800 (PST) X-Google-Smtp-Source: AA0mqf47VexTNaP3d8Z9LovmTU/apJmxYzLEdK5/656RLJphMGalob0GnanSifAhjlmZGoPdh+Uf X-Received: by 2002:a17:902:ed94:b0:186:b1bf:be87 with SMTP id e20-20020a170902ed9400b00186b1bfbe87mr16350970plj.51.1670829504778; Sun, 11 Dec 2022 23:18:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670829504; cv=none; d=google.com; s=arc-20160816; b=ugqPHliseso5uc5MuxV6heXMkyrrlv29r56zXfl77JHkyxtUUgvOIK0T6zjz1hDWdk D3g2i/horAgtfxrzC2hOfwTVf7XJyI8Y1fnPdW68HK2JprcGa/zUk79tjndWXNTP1aWi KXHMY9cF5JMWZV45j20Myf+3gBZcHsxIdhlsMnvB/CrO3RC983UVyF3Ho//Y9ktgu/LI gxysYh/lvpVkS6PM/un0IdCfYHavsOzF6HIU77MRFtt9hdk2VuMnB5aRg+K1gC9mTUF6 v+1rAswR6zSm9PsFgAb19ldlrKz8Tatznf9QqzkoYNaEFHsMbspjJlUh9wObUmaHpdS4 1tpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=PDleQvRrvX4MednzmZMOBosn/u+w5VLSU4we6Gr6Rpg=; b=1LJL4M22BsI+4TFyHKPXL211lebMkustAHmR4effg9SRkiAfRWiacpI8l1mY9hUtyX sUS5Q72eK2S/hk0S4o7riOYh0CT9RQNo5i9iO8zMqngnFZ6aeCmQ16gVw1Bx3LUWlcsZ cN4fSfaCJiLkFRdkk+DJjoxJHeRz3pKTT34NoaNxkVnNXoUEMDPfdi2oEGK7jducxVgL xPWiJo9JmNhTtHKWLwu32nq0VgJnkOFl1y0JsRWMnW9ZL/7ZkKdD2im7GzKVs11avtDz gmyUYof+83Ps8+57ABqrd6jYYO3HC3MjZuCLkQ2UEZxWxa0+6kWM01V8YQzzygnFq6c7 05aw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=JeOvlfdV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y16-20020a170902b49000b00186ab03eebfsi8167636plr.418.2022.12.11.23.18.15; Sun, 11 Dec 2022 23:18:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=JeOvlfdV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231312AbiLLGYf (ORCPT + 75 others); Mon, 12 Dec 2022 01:24:35 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38034 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229697AbiLLGYd (ORCPT ); Mon, 12 Dec 2022 01:24:33 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5DAAFCE1F for ; Sun, 11 Dec 2022 22:24:32 -0800 (PST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id D084333895; Mon, 12 Dec 2022 06:24:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1670826270; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=PDleQvRrvX4MednzmZMOBosn/u+w5VLSU4we6Gr6Rpg=; b=JeOvlfdVQ0v0I9dzki2wi4tBTPrtVnpfK7fhFEf5ZClAg8Gc2aRgtHIna2pcEnPFObuod7 R86VxHPkycHHJpEM324Vo3EnvroKux4P7x7kgFVis2Rbi0fa3RHfAxX4DXFokOp8EJs7DK W2dmF+T2I3R0t2KMkA00IxcaVxp+Fcw= Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id A8DED13456; Mon, 12 Dec 2022 06:24:30 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id jEviJx7JlmNdVwAAMHmgww (envelope-from ); Mon, 12 Dec 2022 06:24:30 +0000 From: Juergen Gross To: torvalds@linux-foundation.org Cc: linux-kernel@vger.kernel.org, xen-devel@lists.xenproject.org, sstabellini@kernel.org Subject: [GIT PULL] xen: branch for v6.2-rc1 Date: Mon, 12 Dec 2022 07:24:30 +0100 Message-Id: <20221212062430.10263-1-jgross@suse.com> X-Mailer: git-send-email 2.35.3 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-6.2-rc1-tag xen: branch for v6.2-rc1 It contains: - 2 small minor fixes - a small series fixing memory leaks in error paths - a small series adding support for virtio PCI-devices in Xen guests on Arm Thanks. Juergen arch/arm/xen/enlighten.c | 2 +- arch/x86/xen/smp.c | 24 +++++----- arch/x86/xen/smp_pv.c | 12 ++--- arch/x86/xen/spinlock.c | 6 +-- drivers/xen/grant-dma-ops.c | 105 ++++++++++++++++++++++++-------------------- drivers/xen/privcmd.c | 2 +- include/xen/arm/xen-ops.h | 4 +- include/xen/xen-ops.h | 16 ------- include/xen/xen.h | 4 +- 9 files changed, 84 insertions(+), 91 deletions(-) Harshit Mogalapalli (1): xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() Jani Nikula (1): xen: fix xen.h build for CONFIG_XEN_PVH=y Oleksandr Tyshchenko (2): xen/virtio: Optimize the setup of "xen-grant-dma" devices xen/virtio: Handle PCI devices which Host controller is described in DT Xiu Jianfeng (2): x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() x86/xen: Fix memory leak in xen_init_lock_cpu()