Message ID | 20240104193303.3175844-2-seanjc@google.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel+bounces-17162-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:6f82:b0:100:9c79:88ff with SMTP id tb2csp5823208dyb; Thu, 4 Jan 2024 11:33:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IHTg93ZFBPwfpe9Ey3S8lyWbDE1r8oEJMPSqVxawmD5ztcYryblI96aCq/xTAjZzxHWXCI9 X-Received: by 2002:a17:906:378c:b0:a23:2aa8:99fe with SMTP id n12-20020a170906378c00b00a232aa899femr647485ejc.9.1704396829401; Thu, 04 Jan 2024 11:33:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704396829; cv=none; d=google.com; s=arc-20160816; b=OUx6Xo89jXnK0rD1lonSvVnAFulXWZ+M8ivJ3S1H/mbcAJjaWfL45z9ED3bpxrYdCE +tEiNpabgn2f+0qKjC6M5hvEEILyv1Ot8gYT611dr1RMBrQKb2JA4UrqylRFv+PmYnEe gOs78YuIhw8P5svXeL3l6H0d+hefV9I3nFDQV3zX8FefZr9s7d/rrNgzMuALQAchBnXj 4UCqov9Be9qn3XexyWqNIpvkeClgcwL6+h5VUq1pMqXgg6n0AutEIhmMcHNARvdQcdR5 Z4AixA1XBPSHjXqwLdJiph7rUtakSUSLUOELDFPBMq6OhTgJFc2AkGI7SHYUlr0qlVQ7 zdwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:from:subject:message-id:references:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:in-reply-to:date :reply-to:dkim-signature; bh=FSDd+X5ZTaifU0WBy/goS6knyn7TCHcpTbMdTcRHCko=; fh=dogxdQWc7Q2U5Ekp9F18wEHwMgE3kRwQ/60KgTj3654=; b=TTvKBnp5iib7epw0g0pdAhU6jXzsa0vhfw3PObCcLd40lAONTlmRoSH4bSiVj2EaWD lP3YMNFyKJfwtAMAF/WrxMobhfzFPKJ2ryCjfwaS+Qqh8TsHTbEv24sQHf64OQFyTZFW gKcW1EdJTRcTE4CmlUqFPQTJvuZ4y1fcy4idIzkv0QrBcr2v8nSumDlrQNtrVl/0uEiY npD2EL8etTenRohYy8vAo3Tmd1UD/X83Z0GWzYyEypzwnOkvSX2qq+tHttJfsltyFaAU yGPlBZxY52NPVW3P6fhmM8/Fo9ZiyBjS8tA4lO0SDhU8WjBcjD5RC+jxkeXcQNs3zPjC VOaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=gbXGLFp2; spf=pass (google.com: domain of linux-kernel+bounces-17162-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-17162-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id s26-20020a170906c31a00b00a26a6339e00si2433ejz.86.2024.01.04.11.33.49 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Jan 2024 11:33:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-17162-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=gbXGLFp2; spf=pass (google.com: domain of linux-kernel+bounces-17162-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-17162-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 080E31F22F7D for <ouuuleilei@gmail.com>; Thu, 4 Jan 2024 19:33:49 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 736BA2C866; Thu, 4 Jan 2024 19:33:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="gbXGLFp2" X-Original-To: linux-kernel@vger.kernel.org Received: from mail-pl1-f201.google.com (mail-pl1-f201.google.com [209.85.214.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B43A52C698 for <linux-kernel@vger.kernel.org>; Thu, 4 Jan 2024 19:33:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Received: by mail-pl1-f201.google.com with SMTP id d9443c01a7336-1d4a9860225so5699905ad.3 for <linux-kernel@vger.kernel.org>; Thu, 04 Jan 2024 11:33:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1704396788; x=1705001588; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=FSDd+X5ZTaifU0WBy/goS6knyn7TCHcpTbMdTcRHCko=; b=gbXGLFp2/cDsjSakRjPTir7m5/vHhSde16CAYVeKUQE5j7LjrLvOg9Sf+Ihz34uggV g3MjDpEzAZ1i23B/Xs/ZMFcHRA6vF6/TaMCzE8Ly+kwT6G6/+2z9VgUvfcjm3TeBNA3Z xKESg+081UcLoUyV5OBbZw0rEYnNY7xeYEH/7Ogbjo1BT5HzEnQhXurl/nDNGbGvg37s EgbL4xzlm18N6yjGB5VkzCHs4zb7odnsQXYH1JxS7CE0L3wydII42E+1uygI8QsSaSd7 8i4zLl7L2srPUcaPHDhBQ4yb5A969t6qf0jOtySECmLXIN/3XWc2rxVPRZj8r3lpiKLi Y4NQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704396788; x=1705001588; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=FSDd+X5ZTaifU0WBy/goS6knyn7TCHcpTbMdTcRHCko=; b=go2oBrPEuqXGSYE5V4YH6L4xiSbsmJX/1fWS+n/zOS6pAO+EUD9ZYqpSmjet162gv/ jHXqZjnbphXrRNpIuNdk4wBgujaKMlUr/ucxBLirLEt++G0BFzDZbPM7Q83ruG+Hpr9k O0xQ59v5JIE7XMMAdkQoQsqkJfFtuOb4njsg8xtu3n8PaPplvglkFNDrjnPWnMUCVtud i9SAzXvEjGReeon7MCOIoxrYWQ/k4aOa4kqbsSmFSMNdPyrlbbAfGIi7FNKTaqi+WLFE 3my9ao0mkzIavJ8g+hLD/XIAZJ58Bg1Dd+j4NRu3XhthOPenbXSBxdf4LtenOJ96WqKc urXQ== X-Gm-Message-State: AOJu0Yy0V0JRuTMM8kiPGzXLr0HFP1BbqVo1ylWFwnPcAxhn7uiu66cA kHJW4yPSlJNvGLP1t6uOwqWbvpRxFnlclUbRiA== X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a17:902:f0c4:b0:1d3:4343:7b0 with SMTP id v4-20020a170902f0c400b001d3434307b0mr5618pla.2.1704396788013; Thu, 04 Jan 2024 11:33:08 -0800 (PST) Reply-To: Sean Christopherson <seanjc@google.com> Date: Thu, 4 Jan 2024 11:32:56 -0800 In-Reply-To: <20240104193303.3175844-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> Mime-Version: 1.0 References: <20240104193303.3175844-1-seanjc@google.com> X-Mailer: git-send-email 2.43.0.472.g3155946c3a-goog Message-ID: <20240104193303.3175844-2-seanjc@google.com> Subject: [GIT PULL] KVM: non-x86 changes for 6.8 From: Sean Christopherson <seanjc@google.com> To: Paolo Bonzini <pbonzini@redhat.com> Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Sean Christopherson <seanjc@google.com> Content-Type: text/plain; charset="UTF-8" X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1787189609999691883 X-GMAIL-MSGID: 1787189609999691883 |
Series |
[GIT,PULL] KVM: non-x86 changes for 6.8
|
|
Pull-request
https://github.com/kvm-x86/linux.git tags/kvm-x86-generic-6.8Message
Sean Christopherson
Jan. 4, 2024, 7:32 p.m. UTC
Please pull a few minor changes that aren't (just) x86. The vmemdup_array_user() patches were sent as a series, and the s390 folks were quick on the draw with acks, so it was easiest for all involved to just grab everything in one shot. The following changes since commit e9e60c82fe391d04db55a91c733df4a017c28b2f: selftests/kvm: fix compilation on non-x86_64 platforms (2023-11-21 11:58:25 -0500) are available in the Git repository at: https://github.com/kvm-x86/linux.git tags/kvm-x86-generic-6.8 for you to fetch changes up to 1f829359c8c37f77a340575957686ca8c4bca317: KVM: Harden copying of userspace-array against overflow (2023-12-01 08:00:53 -0800) ---------------------------------------------------------------- Common KVM changes for 6.8: - Use memdup_array_user() to harden against overflow. - Unconditionally advertise KVM_CAP_DEVICE_CTRL for all architectures. ---------------------------------------------------------------- Philipp Stanner (3): KVM: x86: Harden copying of userspace-array against overflow KVM: s390: Harden copying of userspace-array against overflow KVM: Harden copying of userspace-array against overflow Wei Wang (1): KVM: move KVM_CAP_DEVICE_CTRL to the generic check arch/arm64/kvm/arm.c | 1 - arch/powerpc/kvm/powerpc.c | 1 - arch/riscv/kvm/vm.c | 1 - arch/s390/kvm/guestdbg.c | 4 ++-- arch/s390/kvm/kvm-s390.c | 1 - arch/x86/kvm/cpuid.c | 4 ++-- virt/kvm/kvm_main.c | 6 +++--- 7 files changed, 7 insertions(+), 11 deletions(-)
Comments
On Thu, Jan 4, 2024 at 8:33 PM Sean Christopherson <seanjc@google.com> wrote: > > Please pull a few minor changes that aren't (just) x86. The > vmemdup_array_user() patches were sent as a series, and the s390 folks were > quick on the draw with acks, so it was easiest for all involved to just grab > everything in one shot. > > The following changes since commit e9e60c82fe391d04db55a91c733df4a017c28b2f: > > selftests/kvm: fix compilation on non-x86_64 platforms (2023-11-21 11:58:25 -0500) > > are available in the Git repository at: > > https://github.com/kvm-x86/linux.git tags/kvm-x86-generic-6.8 > > for you to fetch changes up to 1f829359c8c37f77a340575957686ca8c4bca317: > > KVM: Harden copying of userspace-array against overflow (2023-12-01 08:00:53 -0800) Pulled, thanks. Paolo > ---------------------------------------------------------------- > Common KVM changes for 6.8: > > - Use memdup_array_user() to harden against overflow. > > - Unconditionally advertise KVM_CAP_DEVICE_CTRL for all architectures. > > ----------------------------------------------------------------