From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A6F4AC433F5 for ; Tue, 19 Oct 2021 15:39:16 +0000 (UTC) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 28BE0610A1 for ; Tue, 19 Oct 2021 15:39:16 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 28BE0610A1 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=nongnu.org Received: from localhost ([::1]:54846 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1mcrCs-0001J7-Te for qemu-devel@archiver.kernel.org; Tue, 19 Oct 2021 11:39:14 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:43764) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1mcqNX-00062c-Og for qemu-devel@nongnu.org; Tue, 19 Oct 2021 10:46:20 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:26741) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1mcqNQ-0005GM-Pd for qemu-devel@nongnu.org; Tue, 19 Oct 2021 10:46:10 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1634654763; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UHjIem1qDMxw8kjaOmcZ3E99icG0R3IRho+Ztf6dVY4=; b=XU/tyfrPg0/o1gOm+H/N01lSeozNZ1HUsN6M4AjAL9Ao/34cLYjow/3rg2G77woQ86inAf d9S5WWMRlh4IEicXyPM1ANsODyDgPnmkZfDT1x4MMpf6cJOr1w5sSmzq5nNZWi+PyWbxoh i13BTqDpprApiEGnhuFDkYq2nAGMgug= Received: from mail-ed1-f70.google.com (mail-ed1-f70.google.com [209.85.208.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-556-kRK66QCjNEuyOa4njLRWOg-1; Tue, 19 Oct 2021 10:46:01 -0400 X-MC-Unique: kRK66QCjNEuyOa4njLRWOg-1 Received: by mail-ed1-f70.google.com with SMTP id cy14-20020a0564021c8e00b003db8c9a6e30so17834883edb.1 for ; Tue, 19 Oct 2021 07:46:01 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=UHjIem1qDMxw8kjaOmcZ3E99icG0R3IRho+Ztf6dVY4=; b=T9Y8k65ILOFXYChUk+g0H0xWEWuPkpxYVlZdZMGZhOZ5Z4bpOtEkhsWVs+nrJioi5o eVsPpxVhWGoCjEbkIO2TL2HrtnrIfgSV9Z5KAcdb8mZWBYVOb7gr70g8ZovUeDqAMCnl al2hE7tCltVMiXxgbzcRBjoUCAhRZ7SLjhlkFxz7ZKusmNIKPIKsp6rSPRGBM8hNkb7W 8JMiiA8Iue1OBQyeezK2YpB06xCMk+xTnembSTGsOYygab+aXCWWnmg2a09+TZnMa8uV jwk+aogrozNtniPejv0AKKTpefafWObcxswFILLvcAjnFK3myuyNEUHoX4+t34kd6PL5 2eVA== X-Gm-Message-State: AOAM530aSBRFFgf6L4Mdb8oCoPFJg4z8H7S/4n2GO7X/I424zGx5X/Sx RyDvVh69/RPBlpaeiRYk56gIJy5W9VwZLlxBHFEirXg/SH+XEy8RfcdLJfGd0ukeaoL2nOk18Li YYGj/id5OoWou/FI= X-Received: by 2002:aa7:dbcf:: with SMTP id v15mr54704430edt.243.1634654760168; Tue, 19 Oct 2021 07:46:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwO4m+LxVme0xvQsb7Exqj1/M00ziewBqxxoi2//pMWkpvxWaNovCjmP6sGy66lfX2RIVkP4A== X-Received: by 2002:aa7:dbcf:: with SMTP id v15mr54704377edt.243.1634654759787; Tue, 19 Oct 2021 07:45:59 -0700 (PDT) Received: from redhat.com ([2.55.24.172]) by smtp.gmail.com with ESMTPSA id f12sm12071276edx.90.2021.10.19.07.45.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Oct 2021 07:45:59 -0700 (PDT) Date: Tue, 19 Oct 2021 10:45:56 -0400 From: "Michael S. Tsirkin" To: Ani Sinha Subject: Re: [PATCH 00/64] Patch Round-up for stable 6.0.1, freeze on 2021-10-26 Message-ID: <20211019104542-mutt-send-email-mst@kernel.org> References: <20211019140944.152419-1-michael.roth@amd.com> MIME-Version: 1.0 In-Reply-To: Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mst@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=170.10.133.124; envelope-from=mst@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -27 X-Spam_score: -2.8 X-Spam_bar: -- X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Michael Roth , imammedo@redhat.com, qemu-devel@nongnu.org, qemu-stable@nongnu.org Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: "Qemu-devel" On Tue, Oct 19, 2021 at 08:13:52PM +0530, Ani Sinha wrote: > > > On Tue, 19 Oct 2021, Michael Roth wrote: > > > Hi everyone, > > > > The following new patches are queued for QEMU stable v6.0.1: > > > > https://gitlab.com/qemu-project/qemu/-/commits/stable-6.0-staging/ > > > > Patch freeze is 2021-10-26, and the release is planned for 2021-10-28: > > > > https://wiki.qemu.org/Planning/6.0 > > > > Please respond here or CC qemu-stable@nongnu.org on any additional patches > > you think should (or shouldn't) be included in the release. > > I believe we should also include this patch: > https://lore.kernel.org/qemu-devel/20210916132838.3469580-2-ani@anisinha.ca/T/ > > It is also CC'd to qemu-stable@ but the patch itself was not tagged so (my > apologies for that). I concur. > > > > > > Thanks! > > > > ---------------------------------------------------------------- > > David Hildenbrand (2): > > virtio-balloon: don't start free page hinting if postcopy is possible > > virtio-mem-pci: Fix memory leak when creating MEMORY_DEVICE_SIZE_CHANGE event > > > > Dr. David Alan Gilbert (1): > > audio: Never send migration section > > > > Gerd Hoffmann (3): > > uas: add stream number sanity checks. > > usb/redir: avoid dynamic stack allocation (CVE-2021-3527) > > usb: limit combined packets to 1 MiB (CVE-2021-3527) > > > > Giuseppe Musacchio (1): > > target/ppc: Fix load endianness for lxvwsx/lxvdsx > > > > Gollu Appalanaidu (1): > > hw/block/nvme: align with existing style > > > > Greg Kurz (1): > > docs/system: Document the removal of "compat" property for POWER CPUs > > > > Igor Mammedov (3): > > tests: acpi: prepare for changing DSDT tables > > acpi: pc: revert back to v5.2 PCI slot enumeration > > tests: acpi: pc: update expected DSDT blobs > > > > Jason Wang (2): > > vhost-vdpa: don't initialize backend_features > > virtio-net: fix use after unmap/free for sg > > > > Kevin Wolf (1): > > hmp: Fix loadvm to resume the VM on success instead of failure > > > > Klaus Jensen (2): > > hw/nvme: fix missing check for PMR capability > > hw/nvme: fix pin-based interrupt behavior (again) > > > > Kunkun Jiang (1): > > vfio: Fix unregister SaveVMHandler in vfio_migration_finalize > > > > Leonardo Bras (1): > > yank: Unregister function when using TLS migration > > > > Li Qiang (7): > > vhost-user-gpu: fix memory disclosure in virgl_cmd_get_capset_info (CVE-2021-3545) > > vhost-user-gpu: fix resource leak in 'vg_resource_create_2d' (CVE-2021-3544) > > vhost-user-gpu: fix memory leak in vg_resource_attach_backing (CVE-2021-3544) > > vhost-user-gpu: fix memory leak while calling 'vg_resource_unref' (CVE-2021-3544) > > vhost-user-gpu: fix memory leak in 'virgl_cmd_resource_unref' (CVE-2021-3544) > > vhost-user-gpu: fix memory leak in 'virgl_resource_attach_backing' (CVE-2021-3544) > > vhost-user-gpu: fix OOB write in 'virgl_cmd_get_capset' (CVE-2021-3546) > > > > Li Zhijian (1): > > migration/rdma: Fix cm_event used before being initialized > > > > Marcel Apfelbaum (3): > > hw/rdma: Fix possible mremap overflow in the pvrdma device (CVE-2021-3582) > > pvrdma: Ensure correct input on ring init (CVE-2021-3607) > > pvrdma: Fix the ring init error flow (CVE-2021-3608) > > > > Mark Cave-Ayland (2): > > esp: only assert INTR_DC interrupt flag if selection fails > > esp: only set ESP_RSEQ at the start of the select sequence > > > > Markus Armbruster (1): > > hmp: Unbreak "change vnc" > > > > Max Filippov (1): > > target/xtensa: fix access ring in l32ex > > > > Nir Soffer (1): > > qemu-nbd: Change default cache mode to writeback > > > > Paolo Bonzini (7): > > vl: allow not specifying size in -m when using -M memory-backend > > qemu-option: support accept-any QemuOptsList in qemu_opts_absorb_qdict > > qemu-config: load modules when instantiating option groups > > qemu-config: parse configuration files to a QDict > > vl: plumb keyval-based options into -readconfig > > vl: plug -object back into -readconfig > > configure: fix detection of gdbus-codegen > > > > Pavel Pisa (1): > > hw/net/can: sja1000 fix buff2frame_bas and buff2frame_pel when dlc is out of std CAN 8 bytes > > > > Peng Liang (1): > > runstate: Initialize Error * to NULL > > > > Peter Maydell (1): > > target/arm: Don't skip M-profile reset entirely in user mode > > > > Philippe Mathieu-Daudé (11): > > hw/pci-host/q35: Ignore write of reserved PCIEXBAR LENGTH field > > block/nvme: Fix VFIO_MAP_DMA failed: No space left on device > > crypto/tlscreds: Introduce qcrypto_tls_creds_check_endpoint() helper > > block/nbd: Use qcrypto_tls_creds_check_endpoint() > > qemu-nbd: Use qcrypto_tls_creds_check_endpoint() > > chardev/socket: Use qcrypto_tls_creds_check_endpoint() > > migration/tls: Use qcrypto_tls_creds_check_endpoint() > > ui/vnc: Use qcrypto_tls_creds_check_endpoint() > > crypto: Make QCryptoTLSCreds* structures private > > hw/sd/sdcard: Document out-of-range addresses for SEND_WRITE_PROT > > hw/sd/sdcard: Fix assertion accessing out-of-range addresses with CMD30 > > > > Richard Henderson (4): > > linux-user/aarch64: Enable hwcap for RND, BTI, and MTE > > target/i386: Exit tb after wrmsr > > tcg/sparc: Fix temp_allocate_frame vs sparc stack bias > > tcg: Allocate sufficient storage in temp_allocate_frame > > > > Stefan Hajnoczi (1): > > sockets: update SOCKET_ADDRESS_TYPE_FD listen(2) backlog > > > > Stefan Reiter (1): > > monitor/qmp: fix race on CHR_EVENT_CLOSED without OOB > > > > Zenghui Yu (1): > > multi-process: Initialize variables declared with g_auto* > > > > Zhenzhong Duan (1): > > vl: Fix an assert failure in error path > > > > audio/audio.c | 10 +++ > > block/nbd.c | 6 +- > > block/nvme.c | 22 ++++++ > > blockdev-nbd.c | 6 +- > > chardev/char-socket.c | 18 ++--- > > configure | 4 +- > > contrib/vhost-user-gpu/vhost-user-gpu.c | 7 ++ > > contrib/vhost-user-gpu/virgl.c | 17 ++++- > > crypto/tls-cipher-suites.c | 7 ++ > > crypto/tlscreds.c | 12 +++ > > crypto/tlscredsanon.c | 2 + > > crypto/tlscredspriv.h | 45 +++++++++++ > > crypto/tlscredspsk.c | 2 + > > crypto/tlscredsx509.c | 1 + > > crypto/tlssession.c | 1 + > > docs/system/removed-features.rst | 6 ++ > > docs/tools/qemu-nbd.rst | 6 +- > > hw/block/nvme-ns.c | 2 +- > > hw/block/nvme.c | 89 ++++++++++++++-------- > > hw/block/nvme.h | 1 + > > hw/i386/acpi-build.c | 9 ++- > > hw/net/can/can_sja1000.c | 8 ++ > > hw/net/virtio-net.c | 39 ++++++++-- > > hw/pci-host/q35.c | 3 + > > hw/rdma/vmw/pvrdma_cmd.c | 7 ++ > > hw/rdma/vmw/pvrdma_dev_ring.c | 2 +- > > hw/rdma/vmw/pvrdma_main.c | 5 ++ > > hw/remote/memory.c | 5 +- > > hw/remote/proxy.c | 3 +- > > hw/scsi/esp.c | 13 +++- > > hw/sd/sd.c | 9 ++- > > hw/usb/combined-packet.c | 4 +- > > hw/usb/dev-uas.c | 11 +++ > > hw/usb/redirect.c | 6 +- > > hw/vfio/migration.c | 1 + > > hw/virtio/vhost-vdpa.c | 3 - > > hw/virtio/virtio-balloon.c | 13 ++++ > > hw/virtio/virtio-mem-pci.c | 7 +- > > include/block/nvme.h | 10 +-- > > include/block/qdict.h | 2 - > > include/crypto/tls-cipher-suites.h | 6 -- > > include/crypto/tlscreds.h | 30 ++++---- > > include/crypto/tlscredsanon.h | 12 --- > > include/crypto/tlscredspsk.h | 12 --- > > include/crypto/tlscredsx509.h | 10 --- > > include/qapi/qmp/qdict.h | 3 + > > include/qemu/config-file.h | 7 +- > > linux-user/elfload.c | 13 ++++ > > migration/channel.c | 26 ++++--- > > migration/multifd.c | 3 +- > > migration/qemu-file-channel.c | 4 +- > > migration/rdma.c | 1 - > > migration/tls.c | 6 +- > > monitor/hmp-cmds.c | 4 +- > > monitor/qmp.c | 40 +++++----- > > qemu-nbd.c | 25 +++--- > > softmmu/runstate.c | 2 +- > > softmmu/vl.c | 130 +++++++++++++++++++++++--------- > > stubs/meson.build | 1 + > > stubs/module-opts.c | 6 ++ > > target/arm/cpu.c | 19 +++++ > > target/i386/tcg/translate.c | 2 + > > target/ppc/translate/vsx-impl.c.inc | 4 +- > > target/xtensa/translate.c | 2 +- > > tcg/sparc/tcg-target.c.inc | 16 ++-- > > tcg/tcg.c | 40 +++++++--- > > tests/data/acpi/pc/DSDT | Bin 6002 -> 6002 bytes > > tests/data/acpi/pc/DSDT.acpihmat | Bin 7327 -> 7327 bytes > > tests/data/acpi/pc/DSDT.bridge | Bin 8668 -> 8668 bytes > > tests/data/acpi/pc/DSDT.cphp | Bin 6466 -> 6466 bytes > > tests/data/acpi/pc/DSDT.dimmpxm | Bin 7656 -> 7656 bytes > > tests/data/acpi/pc/DSDT.hpbridge | Bin 5969 -> 5969 bytes > > tests/data/acpi/pc/DSDT.ipmikcs | Bin 6074 -> 6074 bytes > > tests/data/acpi/pc/DSDT.memhp | Bin 7361 -> 7361 bytes > > tests/data/acpi/pc/DSDT.nohpet | Bin 5860 -> 5860 bytes > > tests/data/acpi/pc/DSDT.numamem | Bin 6008 -> 6008 bytes > > ui/vnc.c | 7 +- > > util/qemu-config.c | 99 ++++++++++++++++-------- > > util/qemu-option.c | 3 +- > > util/qemu-sockets.c | 29 +++++-- > > 80 files changed, 685 insertions(+), 301 deletions(-) > > create mode 100644 stubs/module-opts.c > > > > > > > >