------- Comment From boris.m...@de.ibm.com 2022-03-03 05:34 EDT-------
Here is the action performed to arrive at the specific patch, respectively:

01. backport    e2c12909ae5f (selftests: kvm: add _vm_ioctl)
02. backport    a46f8a63cde8 (selftests: kvm: Introduce the TEST_FAIL macro)
03. cherry-pick 3e6b94126784 (KVM: selftests: Add GUEST_ASSERT variants to pass 
values to host)
04. cherry-pick 416e7f0c9d61 (KVM: s390: gaccess: Refactor gpa and length 
calculation)
05. cherry-pick 7faa543df19b (KVM: s390: gaccess: Refactor access address range 
check)
06. cherry-pick bad13799e030 (KVM: s390: gaccess: Cleanup access to guest pages)
07. backport    012a224e1fa3 (s390/uaccess: introduce bit field for OAC 
specifier)
08. backport    3d787b392d16 (s390/uaccess: fix compile error)
09. backport    1a82f6ab2365 (s390/uaccess: Add copy_from/to_user_key functions)
10. backport    e613d83454d7 (KVM: s390: Honor storage keys when accessing 
guest memory)
11. cherry-pick 61380a7adfce (KVM: s390: handle_tprot: Honor storage keys)
12. backport    c7ef9ebbed20 (KVM: s390: selftests: Test TEST PROTECTION 
emulation)
13. cherry-pick e9e9feebcbc1 (KVM: s390: Add optional storage key checking to 
MEMOP IOCTL)
14. backport    ef11c9463ae0 (KVM: s390: Add vm IOCTL for key checked guest 
absolute memory access)
15. cherry-pick 0e1234c02b77 (KVM: s390: Rename existing vcpu memop functions)
16. backport    d004079edc16 (KVM: s390: Add capability for storage key 
extension of MEM_OP IOCTL)
17. backport    5e35d0eb472b (KVM: s390: Update api documentation for memop 
ioctl)
18. backport    cbf9b8109d32 (KVM: s390: Clarify key argument for MEM_OP in api 
docs)
19. cherry-pick 3d9042f8b923 (KVM: s390: Add missing vm MEM_OP size check)

Notes on backport
01. resolve minor conflict due to additional includes
02. resolve minor conflict due to additional functionality
07. backport needs to use primary address space
08. resolve minor conflict, only move #define
09. resolve minor conflict caused by older base, e.g. use of primary address 
space
implement __copy_to/from_user_key by copying include/linux/uaccess.h (i.e. old 
code) implementation and adding key support
10. replace locking of current->mm
mark_page_dirty instead of mark_page_dirty_in_slot
12. replace aligned attribute
GUEST_ASSERT instead of GUEST_ASSERT_EQ,
fprintf instead of print_skip
14. replace locking of current->mm
16. resolve minor conflict caused by additional capabilities
ADJUST CAPABILITY NUMBER TO 211 TO ACCOUNT FOR MERGE COMMIT IN kvm-next THAT 
CHANGED IT
17. move documentation to api.txt
18. move documentation to api.txt

As 16. mentions, capability number was adjusted to 211

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction (Backport to focal)

Status in linux package in Ubuntu:
  New

Bug description:
  Description:
  KVM uses lazy storage key enablement as Linux does no longer make use of the 
storage keys. When the guest enters keyed mode, then KVM will save/restore the 
key during paging, provide change/reference tracking for guest and host and for 
all interpreted instructions will do key protection.
  If an instruction is intercepted and passed along to userspace (like QEMU) no 
storage key protection is checked, though. This is in violation of the 
architecture and it can result in misbehaving guests that rely on key 
protection for all instructions.
  This item will add the missing key checking to MEMOP ioctl.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1962831/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to