[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-04-19 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-04-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.4.0-109.123

---
linux (5.4.0-109.123) focal; urgency=medium

  * focal/linux: 5.4.0-109.123 -proposed tracker (LP: #1968290)

  * USB devices not detected during boot on USB 3.0 hubs (LP: #1968210)
- SAUCE: Revert "Revert "xhci: Set HCD flag to defer primary roothub
  registration""
- SAUCE: Revert "Revert "usb: core: hcd: Add support for deferring roothub
  registration""

linux (5.4.0-108.122) focal; urgency=medium

  * focal/linux: 5.4.0-108.122 -proposed tracker (LP: #1966740)

  * Packaging resync (LP: #1786013)
- [Packaging] resync dkms-build{,--nvidia-N} from LRMv5
- debian/dkms-versions -- update from kernel-versions (main/2022.03.21)

  * Low RX performance for 40G Solarflare NICs (LP: #1964512)
- SAUCE: sfc: The size of the RX recycle ring should be more flexible

  * [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction
(LP: #1962831)
- selftests: kvm: add _vm_ioctl
- selftests: kvm: Introduce the TEST_FAIL macro
- KVM: selftests: Add GUEST_ASSERT variants to pass values to host
- KVM: s390: gaccess: Refactor gpa and length calculation
- KVM: s390: gaccess: Refactor access address range check
- KVM: s390: gaccess: Cleanup access to guest pages
- s390/uaccess: introduce bit field for OAC specifier
- s390/uaccess: fix compile error
- s390/uaccess: Add copy_from/to_user_key functions
- KVM: s390: Honor storage keys when accessing guest memory
- KVM: s390: handle_tprot: Honor storage keys
- KVM: s390: selftests: Test TEST PROTECTION emulation
- KVM: s390: Add optional storage key checking to MEMOP IOCTL
- KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- KVM: s390: Rename existing vcpu memop functions
- KVM: s390: Add capability for storage key extension of MEM_OP IOCTL
- KVM: s390: Update api documentation for memop ioctl
- KVM: s390: Clarify key argument for MEM_OP in api docs
- KVM: s390: Add missing vm MEM_OP size check

  * 【sec-0911】 fail to reset sec module (LP: #1943301)
- crypto: hisilicon/sec2 - Add workqueue for SEC driver.
- crypto: hisilicon/sec2 - update SEC initialization and reset

  * Lots of hisi_qm zombie task slow down system after stress test
(LP: #1932117)
- crypto: hisilicon - Use one workqueue per qm instead of per qp

  * Lots of hisi_qm zombie task slow down system after stress test
(LP: #1932117) // 【sec-0911】 fail to reset sec module (LP: #1943301)
- crypto: hisilicon - Unify hardware error init/uninit into QM

  * [UBUNTU 20.04] Fix SIGP processing on KVM/s390 (LP: #1962578)
- KVM: s390: Simplify SIGP Set Arch handling
- KVM: s390: Add a routine for setting userspace CPU state

  * Move virtual graphics drivers from linux-modules-extra to linux-modules
(LP: #1960633)
- [Packaging] Move VM DRM drivers into modules

  * Focal update: v5.4.178 upstream stable release (LP: #1964634)
- audit: improve audit queue handling when "audit=1" on cmdline
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
- ALSA: usb-audio: Simplify quirk entries with a macro
- ALSA: hda/realtek: Add quirk for ASUS GU603
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220
  quirks
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer
  chipset)
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after
  reboot from Windows
- btrfs: fix deadlock between quota disable and qgroup rescan worker
- drm/nouveau: fix off by one in BIOS boundary checking
- mm/kmemleak: avoid scanning potential huge holes
- block: bio-integrity: Advance seed correctly for larger interval sizes
- memcg: charge fs_context and legacy_fs_context
- IB/rdmavt: Validate remote_addr during loopback atomic tests
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic.
- RDMA/mlx4: Don't continue event handler after memory allocation failure
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable()
- spi: bcm-qspi: check for valid cs before applying chip select
- spi: mediatek: Avoid NULL pointer crash in interrupt
- spi: meson-spicc: add IRQ check in meson_spicc_probe
- net: ieee802154: hwsim: Ensure proper channel selection at probe time
- net: ieee802154: mcr20a: Fix lifs/sifs periods
- net: ieee802154: ca8210: Stop leaking skb's
- net: ieee802154: Return meaningful error codes from the netlink helpers
- net: macsec: Verify that send_sci is on when setting Tx sci explicitly
- net: stmmac: dump gmac4 DMA registers correctly
- net: stmmac: ensure PTP time register reads are consistent
- 

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-25 Thread Frank Heimes
This bug was opened for focal, bionic was not really requested and is not 
marked as affected,
so I'm setting the verification-done-bionic tag to unblock further SRU 
processing.

** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-25 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
hwe-5.4/5.4.0-107.121~18.04.1 kernel in -proposed solves the problem.
Please test the kernel and update this bug with the results. If the
problem is solved, change the tag 'verification-needed-bionic' to
'verification-done-bionic'. If the problem still exists, change the tag
'verification-needed-bionic' to 'verification-failed-bionic'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-22 Thread bugproxy
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-21 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux/5.4.0-106.120 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-focal' to 'verification-done-focal'. If the problem
still exists, change the tag 'verification-needed-focal' to
'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-21 Thread Frank Heimes
This is Fix Released for jammy, since addressed at LP#1933179.

** Changed in: linux (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-20 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin2004

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-16 Thread Frank Heimes
** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Committed

** Changed in: ubuntu-z-systems
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-16 Thread Stefan Bader
** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Focal)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-07 Thread Frank Heimes
** Description changed:

  SRU Justification:
  ==
  
  [Impact]
  
  * KVM uses lazy storage key enablement as Linux does no longer make use of
-   the storage keys. When the guest enters keyed mode, then KVM will
-   save/restore the key during paging, provide change/reference tracking for
-   guest and host and for all interpreted instructions will do key protection.
+   the storage keys. When the guest enters keyed mode, then KVM will
+   save/restore the key during paging, provide change/reference tracking for
+   guest and host and for all interpreted instructions will do key protection.
  
  * If an instruction is intercepted and passed along to userspace (like QEMU)
-   no storage key protection is checked, though.
-   
+   no storage key protection is checked, though.
+ 
  * But this is in violation of the architecture and it can result in 
misbehaving
-   guests that rely on key protection for all instructions.
+   guests that rely on key protection for all instructions.
  
  * This item will improve the MEMOP ioctl to also add key checking.
-   In case of a key protection the right fault is injected in the guest.
+   In case of a key protection the right fault is injected in the guest.
  
  [Fix]
  
  * The following changes since commit dbdbd581976f9dfcc9e21a777273b55bdb9bf138:
-   UBUNTU: Ubuntu-5.4.0-102.115 (2022-02-23 15:32:05 +0100)
-   are available in the Git repository at:
-   https://git.launchpad.net/~fheimes/+git/lp1962831/ 
16c0809cf1012e68279a8936a482c1d63cc4d14c
-   for you to fetch changes up to 16c0809cf1012e68279a8936a482c1d63cc4d14c:
-   KVM: s390: Add missing vm MEM_OP size check (2022-03-03 22:45:50 +0100)
+   UBUNTU: Ubuntu-5.4.0-102.115 (2022-02-23 15:32:05 +0100)
+   are available in the Git repository at:
+   https://git.launchpad.net/~fheimes/+git/lp1962831/ 
16c0809cf1012e68279a8936a482c1d63cc4d14c
+   for you to fetch changes up to 16c0809cf1012e68279a8936a482c1d63cc4d14c:
+   KVM: s390: Add missing vm MEM_OP size check (2022-03-03 22:45:50 +0100)
  
- * All patches are upstream accepted (but some are as of today in linux-
- next).
+ * Patches are upstream accepted (but some are as of today still in
+ linux-next).
  
- * The backports are largely needed due to minor conflicts.
+ * Notes on why the backports are needed are included in the provenance
+ of the corresponding commit.
  
  [Test Case]
  
  * An IBM z13 or LinuxONE system is needed running Ubuntu Server 20.04
-   with QEMU/KVM setup.
+   with QEMU/KVM setup.
  
  * These modification here are covered by the following three tests:
  
  * [kvm-unit-tests,v2] s390x: Test effect of storage keys on some instructions
-   
https://patchwork.kernel.org/project/kvm/patch/20220301095059.3026178-1-s...@linux.ibm.com/
+   
https://patchwork.kernel.org/project/kvm/patch/20220301095059.3026178-1-s...@linux.ibm.com/
  
  * [PATCH v2 0/5] memop selftest for storage key checking
-   https://lore.kernel.org/kvm/20220225155311.3540514-1-s...@linux.ibm.com/
+   https://lore.kernel.org/kvm/20220225155311.3540514-1-s...@linux.ibm.com/
  
  * c7ef9ebbed20 "KVM: s390: selftests: Test TEST PROTECTION emulation"
  
  * The tests and the verification will be done by the IBM Z team.
  
  * On top a test build is available (see below).
  
  [Where problems could occur]
  
  * Issues with vm ioctl may occur due to the introduction of _vm_ioctl.
  
  * Tests may fail or may report wrong states due to the new TEST_FAIL macro in
-   tests/utilities or due to new variants of GUEST_ASSERT in selftests.
+   tests/utilities or due to new variants of GUEST_ASSERT in selftests.
  
  * Problems on gaccess might be caused due to the refactoring of gpa, length
-   calculation, access address range check and the new access_guest_page helper
-   function.
+   calculation, access address range check and the new access_guest_page helper
+   function.
  
  * In uaccess issues may occur due to the introduction of the bit field for OAC
-   specifier, that causes lot's but relatively straight forward changes or due
-   to the new storage key checking functions copy_from/to_user_key functions.
+   specifier, that causes lot's but relatively straight forward changes or due
+   to the new storage key checking functions copy_from/to_user_key functions.
  
  * Compile issues may happen if the changes in uaccess.h bout z10 features
-   are erroneous.
+   are erroneous.
  
  * Instructions that are emulated by KVM might be impacted due to the expanded
-   storage key checking, that now covers intercepted instructions, too.
-   This is the most significant modification in terms of size and complexity
-   and therefore carries the highest risk.
+   storage key checking, that now covers intercepted instructions, too.
+   This is the most significant modification in terms of size and complexity
+   and therefore carries the highest risk.
  
  * MEM_OP IOCTL could be harmed due to the additional, but optional, storage
-   key extension and checking, or 

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-07 Thread Frank Heimes
Additional comment to #16: adjust capability number to 211 to account for an 
outstanding merge in kvm-next that changed it:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?h=next=4dfc4ec2b7f5a3a27d166ac42cf8a583fa2d328

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-04 Thread Frank Heimes
Btw. I had to slightly adjust the backport (commit #16) due to changed
context, that was caused by a diag 318 patch  that has landed meanwhile.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-04 Thread Frank Heimes
Pull request submitted to kernel team's mailing list:
https://lists.ubuntu.com/archives/kernel-team/2022-March/thread.html#128468
changing status to 'In Progress'.

** Description changed:

+ SRU Justification:
+ ==
+ 
+ [Impact]
+ 
+ * KVM uses lazy storage key enablement as Linux does no longer make use of
+   the storage keys. When the guest enters keyed mode, then KVM will
+   save/restore the key during paging, provide change/reference tracking for
+   guest and host and for all interpreted instructions will do key protection.
+ 
+ * If an instruction is intercepted and passed along to userspace (like QEMU)
+   no storage key protection is checked, though.
+   
+ * But this is in violation of the architecture and it can result in 
misbehaving
+   guests that rely on key protection for all instructions.
+ 
+ * This item will improve the MEMOP ioctl to also add key checking.
+   In case of a key protection the right fault is injected in the guest.
+ 
+ [Fix]
+ 
+ * The following changes since commit dbdbd581976f9dfcc9e21a777273b55bdb9bf138:
+   UBUNTU: Ubuntu-5.4.0-102.115 (2022-02-23 15:32:05 +0100)
+   are available in the Git repository at:
+   https://git.launchpad.net/~fheimes/+git/lp1962831/ 
16c0809cf1012e68279a8936a482c1d63cc4d14c
+   for you to fetch changes up to 16c0809cf1012e68279a8936a482c1d63cc4d14c:
+   KVM: s390: Add missing vm MEM_OP size check (2022-03-03 22:45:50 +0100)
+ 
+ * All patches are upstream accepted (but some are as of today in linux-
+ next).
+ 
+ * The backports are largely needed due to minor conflicts.
+ 
+ [Test Case]
+ 
+ * An IBM z13 or LinuxONE system is needed running Ubuntu Server 20.04
+   with QEMU/KVM setup.
+ 
+ * These modification here are covered by the following three tests:
+ 
+ * [kvm-unit-tests,v2] s390x: Test effect of storage keys on some instructions
+   
https://patchwork.kernel.org/project/kvm/patch/20220301095059.3026178-1-s...@linux.ibm.com/
+ 
+ * [PATCH v2 0/5] memop selftest for storage key checking
+   https://lore.kernel.org/kvm/20220225155311.3540514-1-s...@linux.ibm.com/
+ 
+ * c7ef9ebbed20 "KVM: s390: selftests: Test TEST PROTECTION emulation"
+ 
+ * The tests and the verification will be done by the IBM Z team.
+ 
+ * On top a test build is available (see below).
+ 
+ [Where problems could occur]
+ 
+ * Issues with vm ioctl may occur due to the introduction of _vm_ioctl.
+ 
+ * Tests may fail or may report wrong states due to the new TEST_FAIL macro in
+   tests/utilities or due to new variants of GUEST_ASSERT in selftests.
+ 
+ * Problems on gaccess might be caused due to the refactoring of gpa, length
+   calculation, access address range check and the new access_guest_page helper
+   function.
+ 
+ * In uaccess issues may occur due to the introduction of the bit field for OAC
+   specifier, that causes lot's but relatively straight forward changes or due
+   to the new storage key checking functions copy_from/to_user_key functions.
+ 
+ * Compile issues may happen if the changes in uaccess.h bout z10 features
+   are erroneous.
+ 
+ * Instructions that are emulated by KVM might be impacted due to the expanded
+   storage key checking, that now covers intercepted instructions, too.
+   This is the most significant modification in terms of size and complexity
+   and therefore carries the highest risk.
+ 
+ * MEM_OP IOCTL could be harmed due to the additional, but optional, storage
+   key extension and checking, or the new size check and I/O emulation can be
+   impacted due to the new vm IOCTL for key checked guest memory access.
+ 
+ * Some tests were added to mitigate this, like the selftests TEST
+ PROTECTION.
+ 
+ * The renaming of the existing vcpu memop functions shouldn't be very harmful,
+   since issues will already occur test build.
+ 
+ * The rest are API documentation updates and clarifications.
+ 
+ * Except two include/header changes and changes in tools/testing
+   all other modifications are s390x specific 
+ 
+ [Other]
+ 
+ * It was ensured that these changes are in jammy based on LP#1933179.
+ 
+ __
+ 
  Description:
  KVM uses lazy storage key enablement as Linux does no longer make use of the 
storage keys. When the guest enters keyed mode, then KVM will save/restore the 
key during paging, provide change/reference tracking for guest and host and for 
all interpreted instructions will do key protection.
  If an instruction is intercepted and passed along to userspace (like QEMU) no 
storage key protection is checked, though. This is in violation of the 
architecture and it can result in misbehaving guests that rely on key 
protection for all instructions.
  This item will add the missing key checking to MEMOP ioctl.

** Changed in: linux (Ubuntu)
   Status: New => In Progress

** Changed in: ubuntu-z-systems
   Status: New => In Progress

** Changed in: linux (Ubuntu)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => Canonical Kernel 
Team (canonical-kernel-team)

-- 

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

2022-03-04 Thread Frank Heimes
** Summary changed:

- [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction 
(Backport to focal)
+ [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction (Backport to focal)

2022-03-04 Thread Frank Heimes
A test build is now available at the PPA here:
https://launchpad.net/~fheimes/+archive/ubuntu/lp1962831

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction (Backport to focal)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction (Backport to focal)

2022-03-03 Thread Frank Heimes
Some stats in the changes:

patches.tar.gz:
 Documentation/virt/kvm/api.txt|2 
 arch/s390/include/asm/uaccess.h   |   26 +
 arch/s390/kvm/gaccess.c   |  424 +-
 arch/s390/kvm/gaccess.h   |9 
 arch/s390/kvm/kvm-s390.c  |  134 +-
 arch/s390/lib/uaccess.c   |   82 +++-
 b/Documentation/virt/kvm/api.txt  |  127 --
 b/arch/s390/include/asm/ctl_reg.h |2 
 b/arch/s390/include/asm/page.h|2 
 b/arch/s390/include/asm/uaccess.h |  122 +++---
 b/arch/s390/kvm/gaccess.c |   32 -
 b/arch/s390/kvm/gaccess.h |   77 +++
 b/arch/s390/kvm/intercept.c   |   12 
 b/arch/s390/kvm/kvm-s390.c|4 
 b/arch/s390/kvm/priv.c|   66 +--
 b/arch/s390/lib/uaccess.c |   26 +
 b/include/uapi/linux/kvm.h|6 
 b/tools/testing/selftests/kvm/.gitignore  |1 
 b/tools/testing/selftests/kvm/Makefile|1 
 b/tools/testing/selftests/kvm/include/kvm_util.h  |1 
 b/tools/testing/selftests/kvm/include/test_util.h |3 
 b/tools/testing/selftests/kvm/lib/kvm_util.c  |7 
 b/tools/testing/selftests/kvm/s390x/tprot.c   |  228 +++
 include/uapi/linux/kvm.h  |5 
 tools/testing/selftests/kvm/include/kvm_util.h|   25 +
 25 files changed, 1145 insertions(+), 279 deletions(-)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction (Backport to focal)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1962831] Re: [UBUNTU 20.04] KVM: Enable storage key checking for intercepted instruction (Backport to focal)

2022-03-03 Thread Frank Heimes
** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Importance: Undecided => High

** Changed in: ubuntu-z-systems
   Importance: Undecided => High

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962831

Title:
  [UBUNTU 20.04] KVM: Enable storage key checking for intercepted
  instruction (Backport to focal)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1962831/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs