lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 17 May 2022 18:46:03 +0200 From: Paolo Bonzini <pbonzini@...hat.com> To: "Maciej S. Szmigiero" <mail@...iej.szmigiero.name> Cc: Vitaly Kuznetsov <vkuznets@...hat.com>, Wanpeng Li <wanpengli@...cent.com>, Jim Mattson <jmattson@...gle.com>, Joerg Roedel <joro@...tes.org>, Maxim Levitsky <mlevitsk@...hat.com>, kvm@...r.kernel.org, linux-kernel@...r.kernel.org, Sean Christopherson <seanjc@...gle.com> Subject: Re: [PATCH v3 00/12] KVM: SVM: Fix soft int/ex re-injection On 5/17/22 14:28, Maciej S. Szmigiero wrote: > On 2.05.2022 00:07, Maciej S. Szmigiero wrote: >> This series is an updated version of Sean's SVM soft interrupt/exception >> re-injection fixes patch set, which in turn extended and generalized my >> nSVM L1 -> L2 event injection fixes series. > > @Paolo: > Can't see this series in kvm/queue, do you plan to merge it for 5.19? Yes, FWIW my list right now is (from most likely to less likely but still doable): * deadlock (5.18) * PMU filter patches from alewis (5.18?) * architectural LBR * Like's perf HW_EVENT series * cache refresh * this one * nested dirty-log selftest * x2AVIC * dirty quota * CMCI * pfn functions * Vitaly's Hyper-V TLB
Powered by blists - more mailing lists