ACK: [SRU][Xenial][PATCH 0/3] Fixes for LP:1788563

Joseph Salisbury joseph.salisbury at canonical.com
Mon Sep 10 22:18:36 UTC 2018


On 09/10/2018 03:38 PM, Tyler Hicks wrote:
> BugLink: https://launchpad.net/bugs/1788563
>
> == SRU Justification ==
> This regression has been reported in multiple bugs and affects Trusty,
> Xenial and Bionic.  All releases need different backports. jsalisbury
> will provide the backports for Bionic.
>
> Due to this bug in the original L1TF patch set, L1TF mitigation not
> effective in certain CPU and installed RAM configurations.
>
> == Fixes ==
> 9df9516940a6 ("x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit")
> b0a182f87568 ("x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM")
> cc51e5428ea5 ("x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+")
>
> == Regression Potential ==
> Low.  These are security fixes and have all been cc'd to upstream
> stable, so they have had additional upstream review.
>
> == Test Case ==
> A test kernel was built with these patches and tested by the original
> bug reporter. The bug reporter states the test kernel resolved the bug.
>
> Tyler
>
>
Acked-by: Joseph Salisbury <joseph.salisbury at canonical.com>





More information about the kernel-team mailing list