Re: [GIT PULL 0/2] KVM: s390: Fixes for 3.17

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Il 25/08/2014 15:10, Christian Borntraeger ha scritto:
> Paolo,
> 
> the following changes since commit 7d1311b93e58ed55f3a31cc8f94c4b8fe988a2b9:
> 
>   Linux 3.17-rc1 (2014-08-16 10:40:26 -0600)
> 
> are available in the git repository at:
> 
>   git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux.git  tags/kvm-s390-20140825
> 
> for you to fetch changes up to ab3f285f227fec62868037e9b1b1fd18294a83b8:
> 
>   KVM: s390/mm: try a cow on read only pages for key ops (2014-08-25 14:35:28 +0200)
> 
> ----------------------------------------------------------------
> Here are two fixes for s390 KVM code that prevent:
> 1. a malicious user to trigger a kernel BUG
> 2. a malicious user to change the storage key of read-only pages
> 
> ----------------------------------------------------------------
> Christian Borntraeger (2):
>       KVM: s390: Fix user triggerable bug in dead code
>       KVM: s390/mm: try a cow on read only pages for key ops
> 
>  arch/s390/kvm/kvm-s390.c | 13 -------------
>  arch/s390/mm/pgtable.c   | 10 ++++++++++
>  2 files changed, 10 insertions(+), 13 deletions(-)
> 

Thanks, pulled (for now locally).  Since the log message's about
malicious users, I assume there's no urgency in pushing this to Linus
and that normal guests work fine.

Paolo
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux