ACK/Cmnt: [Eoan 0/5] CVE-2019-3016

Stefan Bader stefan.bader at canonical.com
Fri Feb 14 13:54:46 UTC 2020


On 31.01.20 12:06, Thadeu Lima de Souza Cascardo wrote:
> This has been built on all platforms and smoke tested as a host on x86 and
> ppc64el.
> 
> Boris Ostrovsky (5):
>   UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
(? commit 8c6de56a42e0c657955e12b882a81ef07d1d073e)
>   UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
(? commit 1eff70a9abd46f175defafd29bc17ad456f398a7)
>   UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
(? commit 917248144db5d7320655dbb41d3af0b8a0f3d589)
>   UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
>     missed
(? commit b043138246a41064527cf019a3d51d9f015e9796)
>   UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure
(? commit a6bd811f1209fe1c64c9f6fd578101d6436c6b6e)

All those patches seem to be upstream now. I would suggest to cherry-pick
/ backport those into Eoan instead of picking the SAUCE patches.

Acked-by: Stefan Bader <stefan.bader at canonical.com>
> 
>  arch/x86/include/asm/kvm_host.h |   4 +-
>  arch/x86/kvm/x86.c              |  67 ++++++++++++-------
>  include/linux/kvm_host.h        |   5 ++
>  include/linux/kvm_types.h       |   9 ++-
>  virt/kvm/kvm_main.c             | 113 +++++++++++++++++++++++++++-----
>  5 files changed, 153 insertions(+), 45 deletions(-)
> 


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20200214/93d2dc11/attachment.sig>


More information about the kernel-team mailing list