Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp4273041ybf; Wed, 4 Mar 2020 00:26:33 -0800 (PST) X-Google-Smtp-Source: ADFU+vuF14N+gOFfWXU+0YrLQRjHOwR0u1X5K2a1fRzbDfcpht6PpDtSPjpil4K45DjV7ph+gfFx X-Received: by 2002:aca:33d5:: with SMTP id z204mr916351oiz.120.1583310392889; Wed, 04 Mar 2020 00:26:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583310392; cv=none; d=google.com; s=arc-20160816; b=TlsZ+Wt0r13K9e+3Lys0KwPqM8yZlRua76gVC4s536eReCPMKmCAdk20voyIWieIsK mPGKmlnRmdu7Ml0ig7YBmQz63E5g1MGpEJ5q/WbmMu3jMytpqARrDtcDW2cgsnI1q8Xd x27xlECR63CxC18CrwCd7oUjlJtcnBQOG0vIEzR5dLyQx3e+kVoU80pPmCO9cN/6bgnj +Uq1L7X33pzQwdJofoiLV/FJTqhMjD5YIZnNhwL5iRP+IVqduu/oKFdHWiit82Pq/Yi4 Pf4jUyhTi9FieJIMkG+i9j5TSV1D8b9kqMJeEef/exeDp1p7T+JOU2BxaCPojKfmb89f T0og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=hXWpq3mGJlmEZjFpiP5M7DkAcQRJQOsWVL6U9xkbNwc=; b=LStj8qy1z0V3MlyulPrSmaxQmdssHTKf16MAfCuvimtkINQb6WdBvYARkTyOmRx03G wL+GTjSOOTuW7FytYqT7wuaVWobabpa/W+jtbVJmIFgKF9Whv5QdcF9Yit7PqXccp1Mj xOqeHJwVqsSSfFLrU4RMBwo6BKrbFXpEiKZKYfmfZCOCl8IWXKy/s0a1mXRJk7lgLmVg FQlnJEckI9P72Dh+WL2IiLAgaGjKaqIT34XyDQEo4+H/lXIvNlhh6tCPd6bnY+/v/Cgc 4bk8ig5HvhC0OToxBxkffG9nl8ojGvgxwxAg0HbDaH25AtcCgWZhngeNpuo6aCaDoLlT PJgg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cQRFBtzy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d185si772281oig.189.2020.03.04.00.26.19; Wed, 04 Mar 2020 00:26:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cQRFBtzy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728482AbgCDI0Q (ORCPT + 99 others); Wed, 4 Mar 2020 03:26:16 -0500 Received: from mail.kernel.org ([198.145.29.99]:53024 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726137AbgCDI0P (ORCPT ); Wed, 4 Mar 2020 03:26:15 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E01D520726; Wed, 4 Mar 2020 08:26:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583310375; bh=x6wzgGIrSbAYLKLQSa5BAJp1UsDUYJF/rw2ZgyF37hs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=cQRFBtzytnMhUGKmVUPKTzMPi9FUSzZkjbHk7VBek6sf035SkspTgk40kf1YX9sa9 4TmPepphEuTEFZXZ/vqL98+AWyb+nd9+TVnKanKFGTrOtAJ4MoqBhEDmvP1NnRXiD+ sSSiT0dXbjB0kH+AZH3iM8gSQw7dTgntwKOXJgPE= Date: Wed, 4 Mar 2020 09:26:13 +0100 From: Greg Kroah-Hartman To: Paolo Bonzini Cc: Oliver Upton , Linux Kernel Mailing List , stable@vger.kernel.org Subject: Re: [PATCH 5.5 111/176] KVM: nVMX: Emulate MTF when performing instruction emulation Message-ID: <20200304082613.GA1407851@kroah.com> References: <20200303174304.593872177@linuxfoundation.org> <20200303174317.670749078@linuxfoundation.org> <8780cf08-374b-da06-0047-0fe8eeec0113@redhat.com> <20200304081001.GB1401372@kroah.com> <04e51276-1759-2793-3b45-168284cbaf67@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <04e51276-1759-2793-3b45-168284cbaf67@redhat.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 04, 2020 at 09:19:09AM +0100, Paolo Bonzini wrote: > On 04/03/20 09:10, Greg Kroah-Hartman wrote: > > I'll be glad to just put KVM into the "never apply any patches to > > stable unless you explicitly mark it as such", but the sad fact is that > > many recent KVM fixes for reported CVEs never had any "Cc: stable@vger" > > markings. > > Hmm, I did miss it in 433f4ba1904100da65a311033f17a9bf586b287e and > acff78477b9b4f26ecdf65733a4ed77fe837e9dc, but that's going back to > August 2018, so I can do better but it's not too shabby a record. :) 35a571346a94 ("KVM: nVMX: Check IO instruction VM-exit conditions") e71237d3ff1a ("KVM: nVMX: Refactor IO bitmap checks into helper function") Were both from a few weeks ago and needed to resolve CVE-2020-2732 :( > > They only had "Fixes:" tags and so I have had to dig them out > > of the tree and backport them myself in order to resolve those very > > public issues. > > > > So can I ask that you always properly tag things for stable? If so, I > > will be glad to ignore Fixes: tags for KVM patches in the future. > > > > I'll go drop this patch as well. Note, there are other KVM patches in > > this release cycle also, can someone verify that I did not overreach for > > them as well? > > I checked them and they are fine. Thank you for that. greg k-h