From mboxrd@z Thu Jan 1 00:00:00 1970 From: Christian Borntraeger Subject: Re: [GIT PULL 0/2] KVM: s390: Fixes for 3.17 Date: Mon, 25 Aug 2014 15:47:00 +0200 Message-ID: <53FB3E54.3040209@de.ibm.com> References: <1408972211-27122-1-git-send-email-borntraeger@de.ibm.com> <53FB3D4A.6000906@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Transfer-Encoding: 7bit Cc: KVM , Gleb Natapov , Alexander Graf , Cornelia Huck , Jens Freimann , linux-s390 To: Paolo Bonzini Return-path: Received: from e06smtp10.uk.ibm.com ([195.75.94.106]:60610 "EHLO e06smtp10.uk.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753582AbaHYNrH (ORCPT ); Mon, 25 Aug 2014 09:47:07 -0400 Received: from /spool/local by e06smtp10.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 25 Aug 2014 14:47:06 +0100 In-Reply-To: <53FB3D4A.6000906@redhat.com> Sender: kvm-owner@vger.kernel.org List-ID: On 25/08/14 15:42, Paolo Bonzini wrote: > Il 25/08/2014 15:10, Christian Borntraeger ha scritto: >> Paolo, >> >> the following changes since commit 7d1311b93e58ed55f3a31cc8f94c4b8fe988a2b9: >> >> Linux 3.17-rc1 (2014-08-16 10:40:26 -0600) >> >> are available in the git repository at: >> >> git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux.git tags/kvm-s390-20140825 >> >> for you to fetch changes up to ab3f285f227fec62868037e9b1b1fd18294a83b8: >> >> KVM: s390/mm: try a cow on read only pages for key ops (2014-08-25 14:35:28 +0200) >> >> ---------------------------------------------------------------- >> Here are two fixes for s390 KVM code that prevent: >> 1. a malicious user to trigger a kernel BUG >> 2. a malicious user to change the storage key of read-only pages >> >> ---------------------------------------------------------------- >> Christian Borntraeger (2): >> KVM: s390: Fix user triggerable bug in dead code >> KVM: s390/mm: try a cow on read only pages for key ops >> >> arch/s390/kvm/kvm-s390.c | 13 ------------- >> arch/s390/mm/pgtable.c | 10 ++++++++++ >> 2 files changed, 10 insertions(+), 13 deletions(-) >> > > Thanks, pulled (for now locally). Since the log message's about > malicious users, I assume there's no urgency in pushing this to Linus > and that normal guests work fine. Yes.