ACK: [Cosmic][v2][PATCH 0/3] Fixes for lp1788563
Colin Ian King
colin.king at canonical.com
Mon Sep 10 19:58:02 UTC 2018
On 10/09/18 20:37, Joseph Salisbury wrote:
> BugLink: https://bugs.launchpad.net/bugs/1788563
>
> == SRU Justification ==
> This bug has been reported in multiple bugs and affects Trusty,
> Xenial and Bionic. All releases need different backports, so T and X
> will be sent in separate SRU requests.
>
> Due to this bug in the original L1TF patch set, L1TF mitigation not
> effective in certain CPU and installed RAM configurations.
>
> == Fixes ==
> 9df9516940a6 ("x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit")
> b0a182f87568 ("x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM")
> cc51e5428ea5 ("x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+")
>
> == Regression Potential ==
> Low. These are security fixes and have all been cc'd to upstream
> stable, so they have had additional upstream review.
>
> == Test Case ==
> A test kernel was built with these patches and tested by the original bug reporter.
> The bug reporter states the test kernel resolved the bug.
>
>
> Andi Kleen (1):
> x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+
>
> Vlastimil Babka (2):
> x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit
> x86/speculation/l1tf: Fix off-by-one error when warning that system
> has too much RAM
>
> arch/x86/include/asm/processor.h | 6 ++++--
> arch/x86/kernel/cpu/bugs.c | 46 +++++++++++++++++++++++++++++++++++-----
> arch/x86/kernel/cpu/common.c | 3 +++
> arch/x86/mm/init.c | 4 ++--
> arch/x86/mm/mmap.c | 2 +-
> 5 files changed, 51 insertions(+), 10 deletions(-)
>
Looks OK to me.
Acked-by: Colin Ian King <colin.king at canonical.com>
More information about the kernel-team
mailing list