Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp4262116ybf; Wed, 4 Mar 2020 00:11:47 -0800 (PST) X-Google-Smtp-Source: ADFU+vtJChaEh4Ij8N9EYrQLUJAJGutpT2V4x3RSSyIjlNB1ZFwYUvTicaNY7786ygL73zhV9UUc X-Received: by 2002:a9d:6b87:: with SMTP id b7mr1470025otq.248.1583309507015; Wed, 04 Mar 2020 00:11:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583309507; cv=none; d=google.com; s=arc-20160816; b=MBBf4vfjjhalYVBNUWun/5BlHjdN73LU/1FJ0vLqOmKoCiZG3cxdMyFm2EjtnfpEny VdKuOvUrsWZb9G09ymiXOcUGpuOLkGj30K4RcEbIi1nxlSPdoxZLqq58kv7e3nWZSNdj kub3m7lbJZiR2dnNO+B0jLz//iquT7iHKRXTQR/LV4/WPpOVn7ZK8RsUuL0Bj55VVm9F 0HlbL2klouUyiebshnWgBwYhm7jelciqGC3i8v8O9blyNmAd88NFxUdwXG3wY59Re+2j 6CjlGwCb3KC5HPhuKzluo3cfBW5q5tNQSF1XXLMmN42YRDgRf112w0xcvgyiDlNTMiCE 7tug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Dn2ERxi63p8WAImlICeU7qvjzzSCGk4/D/52AFW9Pl8=; b=fbtJ/o6sywyWc/D12jlKWYFPgtMI7TvmnQaybQX1KhqDqmD7tpVzXVOIVtJAaNHoc9 0g38T4ycvw5DVyYru3Nrbq5N4+N5Rk6au3ttjAC3aaYWly71cc7Oa5swl8pxoteaYtMC tMFgEahnO2bO2n9e5objkxrEAToS6Y5q/FSLlt+d/sI9GKUbX/PqxVDGvboNIG+RQaub 4PTsRzNDeG882dP+HGErrHjhLiELB7YTglKtjAktMyA0Fem5TwhOrtfK2tfJXHFkJyoc n6PHUGKSXq/PtBd9WDPu3Ga+1VM0Ay+1W3b/m9lRPsx+4XHX4jLBQ+7UpXrNpggHz2cL e5dw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=D4Pdvpzx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m6si724283oim.30.2020.03.04.00.11.35; Wed, 04 Mar 2020 00:11:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=D4Pdvpzx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728635AbgCDIKG (ORCPT + 99 others); Wed, 4 Mar 2020 03:10:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:50044 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726957AbgCDIKF (ORCPT ); Wed, 4 Mar 2020 03:10:05 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 164502166E; Wed, 4 Mar 2020 08:10:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583309403; bh=1YrwTCj3XBWbFrhCAMXtkFQ1x10evEuvmD/owQ7q17A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=D4PdvpzxhaRLCz25gwPPpfHUHtEjNdHB+jSF/ktZlEQVqWSuei9rdcT0NQo1GP+Mt z4kEYk+KJpIywFAoh1bPhwOro3DuRvOzCbO2PxDDPS6gTfMdWRSYEMCfN9QsWd3V9o jsDKVAH6G3bfWXwGLHPh8txEFcNoItskBrA9L4uM= Date: Wed, 4 Mar 2020 09:10:01 +0100 From: Greg Kroah-Hartman To: Oliver Upton , Paolo Bonzini Cc: Linux Kernel Mailing List , stable@vger.kernel.org Subject: Re: [PATCH 5.5 111/176] KVM: nVMX: Emulate MTF when performing instruction emulation Message-ID: <20200304081001.GB1401372@kroah.com> References: <20200303174304.593872177@linuxfoundation.org> <20200303174317.670749078@linuxfoundation.org> <8780cf08-374b-da06-0047-0fe8eeec0113@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 03, 2020 at 11:39:35PM -0800, Oliver Upton wrote: > On Tue, Mar 3, 2020 at 11:23 PM Paolo Bonzini wrote: > > > > On 03/03/20 18:42, Greg Kroah-Hartman wrote: > > > From: Oliver Upton > > > > > > commit 5ef8acbdd687c9d72582e2c05c0b9756efb37863 upstream. > > > > > > Since commit 5f3d45e7f282 ("kvm/x86: add support for > > > MONITOR_TRAP_FLAG"), KVM has allowed an L1 guest to use the monitor trap > > > flag processor-based execution control for its L2 guest. KVM simply > > > forwards any MTF VM-exits to the L1 guest, which works for normal > > > instruction execution. > > > > > > However, when KVM needs to emulate an instruction on the behalf of an L2 > > > guest, the monitor trap flag is not emulated. Add the necessary logic to > > > kvm_skip_emulated_instruction() to synthesize an MTF VM-exit to L1 upon > > > instruction emulation for L2. > > > > > > Fixes: 5f3d45e7f282 ("kvm/x86: add support for MONITOR_TRAP_FLAG") > > > Signed-off-by: Oliver Upton > > > Signed-off-by: Paolo Bonzini > > > Signed-off-by: Greg Kroah-Hartman > > > > Why is this included in a stable release? It was part of a series of > > four patches and the prerequisites as far as I can see are not part of 5.5. > > It looks like these commits were already picked from upstream: > > 684c0422da71 ("KVM: nVMX: Handle pending #DB when injecting INIT VM-exit") > 307f1cfa2696 ("KVM: x86: Mask off reserved bit from #DB exception payload") > > Which were bug fixes in their own right and were sensible for > backporting (though I didn't cc stable if I'm not mistaken). > > but not: > > a06230b62b89 ("KVM: x86: Deliver exception payload on KVM_GET_VCPU_EVENTS") > > which this patch absolutely depends on. > > Otherwise, I'll defer discussions regarding the suitability of this > patch for stable to Paolo. I picked this patch up solely because of the Fixes: tag showed that this ommit resolved something from a previous commit. The interdependancies were not obvious, especially as it all seemed to build just fine here. > > I have already said half a dozen times that I don't want any of the > > autopick stuff for KVM. Is a Fixes tag sufficient to get patches into > > stable now? Yes, it can happen that a Fixes tag does cause a patch to get into stable because I look out for that. I do that because a number of maintainers/developers only put that tag in there, and also to catch patches for when we backport stuff and then need to take a fix for that backport (not the case here though). I'll be glad to just put KVM into the "never apply any patches to stable unless you explicitly mark it as such", but the sad fact is that many recent KVM fixes for reported CVEs never had any "Cc: stable@vger" markings. They only had "Fixes:" tags and so I have had to dig them out of the tree and backport them myself in order to resolve those very public issues. So can I ask that you always properly tag things for stable? If so, I will be glad to ignore Fixes: tags for KVM patches in the future. I'll go drop this patch as well. Note, there are other KVM patches in this release cycle also, can someone verify that I did not overreach for them as well? thanks, greg k-h