[Disco,00/10] CVE-2019-3016
mbox series

Message ID 20200131111035.38050-1-cascardo@canonical.com
Headers show
Series
  • CVE-2019-3016
Related show

Message

Thadeu Lima de Souza Cascardo Jan. 31, 2020, 11:10 a.m. UTC
This backports the guest mapping API and some followup fixes.

It has been built-tested on all platforms.

Boris Ostrovsky (5):
  UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
  UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
  UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
  UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
    missed
  UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure

Christian Borntraeger (1):
  kvm: fix compile on s390 part 2

KarimAllah Ahmed (2):
  KVM: Introduce a new guest mapping API
  KVM: Properly check if "page" is valid in kvm_vcpu_unmap

Paolo Bonzini (2):
  kvm: fix compilation on aarch64
  kvm: fix compilation on s390

 arch/x86/include/asm/kvm_host.h |   4 +-
 arch/x86/kvm/x86.c              |  67 ++++++++------
 include/linux/kvm_host.h        |  33 +++++++
 include/linux/kvm_types.h       |   9 +-
 virt/kvm/kvm_main.c             | 149 +++++++++++++++++++++++++++++++-
 5 files changed, 233 insertions(+), 29 deletions(-)

Comments

Thadeu Lima de Souza Cascardo Jan. 31, 2020, 3:51 p.m. UTC | #1
Tyler brought to my attention that CVE-2020-3016 is not a valid ID.

I submitted patches with both CVE-2020-3016 and CVE-2019-3016, assuming both
were assigned.

Please, remove any references to CVE-2020-3016 from the commit messages.

Running the following before applying should work:

sed -i /CVE-2020-3016/d *{patch,mbox}

Or after applying, before pushing:

rm -rf .git/refs/original/
git filter-branch --msg-filter 'sed /CVE-2020-3016/d' origin/master-next..HEAD
Sultan Alsawaf Feb. 11, 2020, 12:44 a.m. UTC | #2
On Fri, Jan 31, 2020 at 08:10:25AM -0300, Thadeu Lima de Souza Cascardo wrote:
> This backports the guest mapping API and some followup fixes.
> 
> It has been built-tested on all platforms.
> 
> Boris Ostrovsky (5):
>   UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
>   UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
>   UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
>   UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
>     missed
>   UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure
> 
> Christian Borntraeger (1):
>   kvm: fix compile on s390 part 2
> 
> KarimAllah Ahmed (2):
>   KVM: Introduce a new guest mapping API
>   KVM: Properly check if "page" is valid in kvm_vcpu_unmap
> 
> Paolo Bonzini (2):
>   kvm: fix compilation on aarch64
>   kvm: fix compilation on s390
> 
>  arch/x86/include/asm/kvm_host.h |   4 +-
>  arch/x86/kvm/x86.c              |  67 ++++++++------
>  include/linux/kvm_host.h        |  33 +++++++
>  include/linux/kvm_types.h       |   9 +-
>  virt/kvm/kvm_main.c             | 149 +++++++++++++++++++++++++++++++-
>  5 files changed, 233 insertions(+), 29 deletions(-)
> 
> -- 
> 2.24.0
> 
> 
> -- 
> kernel-team mailing list
> kernel-team@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team

Acked-by: Sultan Alsawaf <sultan.alsawaf@canonical.com>
Stefan Bader Feb. 14, 2020, 1:58 p.m. UTC | #3
On 31.01.20 12:10, Thadeu Lima de Souza Cascardo wrote:
> This backports the guest mapping API and some followup fixes.
> 
> It has been built-tested on all platforms.
> 
> Boris Ostrovsky (5):
>   UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
>   UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
>   UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
>   UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
>     missed
>   UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure
> 
> Christian Borntraeger (1):
>   kvm: fix compile on s390 part 2
> 
> KarimAllah Ahmed (2):
>   KVM: Introduce a new guest mapping API
>   KVM: Properly check if "page" is valid in kvm_vcpu_unmap
> 
> Paolo Bonzini (2):
>   kvm: fix compilation on aarch64
>   kvm: fix compilation on s390
> 
>  arch/x86/include/asm/kvm_host.h |   4 +-
>  arch/x86/kvm/x86.c              |  67 ++++++++------
>  include/linux/kvm_host.h        |  33 +++++++
>  include/linux/kvm_types.h       |   9 +-
>  virt/kvm/kvm_main.c             | 149 +++++++++++++++++++++++++++++++-
>  5 files changed, 233 insertions(+), 29 deletions(-)
> 
As for the Eoan submission I would replace the SAUCE patches by the upstream
commits doing proper cherry-picking / backporting. Adding the right cve markup
and fixing it for the pre-reqs.
Oh and we should be able to do that when applying. I should have mentioned that
in the Eoan reply, too.

Acked-by: Stefan Bader <stefan.bader@canonical.com>
Kleber Souza Feb. 14, 2020, 3:35 p.m. UTC | #4
On 31.01.20 12:10, Thadeu Lima de Souza Cascardo wrote:
> This backports the guest mapping API and some followup fixes.
> 
> It has been built-tested on all platforms.
> 
> Boris Ostrovsky (5):
>   UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
>   UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
>   UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
>   UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
>     missed
>   UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure
> 
> Christian Borntraeger (1):
>   kvm: fix compile on s390 part 2
> 
> KarimAllah Ahmed (2):
>   KVM: Introduce a new guest mapping API
>   KVM: Properly check if "page" is valid in kvm_vcpu_unmap
> 
> Paolo Bonzini (2):
>   kvm: fix compilation on aarch64
>   kvm: fix compilation on s390
> 
>  arch/x86/include/asm/kvm_host.h |   4 +-
>  arch/x86/kvm/x86.c              |  67 ++++++++------
>  include/linux/kvm_host.h        |  33 +++++++
>  include/linux/kvm_types.h       |   9 +-
>  virt/kvm/kvm_main.c             | 149 +++++++++++++++++++++++++++++++-
>  5 files changed, 233 insertions(+), 29 deletions(-)
> 

Applied to disco/linux, removing the CVE-2020-3016 reference and
cherry-picking/backporting the SAUCE patches as noted by Stefan.

Thanks,
Kleber