From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:57662 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750879AbdJCLfL (ORCPT ); Tue, 3 Oct 2017 07:35:11 -0400 Subject: Patch "KVM: VMX: use cmpxchg64" has been added to the 4.13-stable tree To: pbonzini@redhat.com, gregkh@linuxfoundation.org Cc: , From: Date: Tue, 03 Oct 2017 13:35:20 +0200 Message-ID: <150703052020845@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=ANSI_X3.4-1968 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org List-ID: This is a note to let you know that I've just added the patch titled KVM: VMX: use cmpxchg64 to the 4.13-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: kvm-vmx-use-cmpxchg64.patch and it can be found in the queue-4.13 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let know about it. >>From c0a1666bcb2a33e84187a15eabdcd54056be9a97 Mon Sep 17 00:00:00 2001 From: Paolo Bonzini Date: Thu, 28 Sep 2017 17:58:41 +0200 Subject: KVM: VMX: use cmpxchg64 From: Paolo Bonzini commit c0a1666bcb2a33e84187a15eabdcd54056be9a97 upstream. This fixes a compilation failure on 32-bit systems. Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/vmx.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -2223,8 +2223,8 @@ static void vmx_vcpu_pi_load(struct kvm_ new.ndst = (dest << 8) & 0xFF00; new.sn = 0; - } while (cmpxchg(&pi_desc->control, old.control, - new.control) != old.control); + } while (cmpxchg64(&pi_desc->control, old.control, + new.control) != old.control); } static void decache_tsc_multiplier(struct vcpu_vmx *vmx) @@ -11428,8 +11428,8 @@ static void __pi_post_block(struct kvm_v /* set 'NV' to 'notification vector' */ new.nv = POSTED_INTR_VECTOR; - } while (cmpxchg(&pi_desc->control, old.control, - new.control) != old.control); + } while (cmpxchg64(&pi_desc->control, old.control, + new.control) != old.control); if (!WARN_ON_ONCE(vcpu->pre_pcpu == -1)) { spin_lock(&per_cpu(blocked_vcpu_on_cpu_lock, vcpu->pre_pcpu)); @@ -11498,8 +11498,8 @@ static int pi_pre_block(struct kvm_vcpu /* set 'NV' to 'wakeup vector' */ new.nv = POSTED_INTR_WAKEUP_VECTOR; - } while (cmpxchg(&pi_desc->control, old.control, - new.control) != old.control); + } while (cmpxchg64(&pi_desc->control, old.control, + new.control) != old.control); /* We should not block the vCPU if an interrupt is posted for it. */ if (pi_test_on(pi_desc) == 1) Patches currently in stable-queue which might be from pbonzini@redhat.com are queue-4.13/kvm-vmx-do-not-change-sn-bit-in-vmx_update_pi_irte.patch queue-4.13/kvm-vmx-simplify-and-fix-vmx_vcpu_pi_load.patch queue-4.13/kvm-vmx-avoid-double-list-add-with-vt-d-posted-interrupts.patch queue-4.13/genirq-fix-cpumask-check-in-__irq_startup_managed.patch queue-4.13/kvm-vmx-use-cmpxchg64.patch queue-4.13/kvm-nvmx-don-t-allow-l2-to-access-the-hardware-cr8.patch queue-4.13/kvm-x86-handle-async-pf-in-rcu-read-side-critical-sections.patch queue-4.13/kvm-vmx-extract-__pi_post_block.patch queue-4.13/kvm-nvmx-fix-host_cr3-host_cr4-cache.patch queue-4.13/kvm-vmx-do-not-bug-on-out-of-bounds-guest-irq.patch queue-4.13/kvm-vmx-remove-warn_on_once-in-kvm_vcpu_trigger_posted_interrupt.patch