ACK/Cmnt: [Eoan 0/5] CVE-2019-3016
Stefan Bader
stefan.bader at canonical.com
Fri Feb 14 13:54:46 UTC 2020
On 31.01.20 12:06, Thadeu Lima de Souza Cascardo wrote:
> This has been built on all platforms and smoke tested as a host on x86 and
> ppc64el.
>
> Boris Ostrovsky (5):
> UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
(? commit 8c6de56a42e0c657955e12b882a81ef07d1d073e)
> UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
(? commit 1eff70a9abd46f175defafd29bc17ad456f398a7)
> UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
(? commit 917248144db5d7320655dbb41d3af0b8a0f3d589)
> UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
> missed
(? commit b043138246a41064527cf019a3d51d9f015e9796)
> UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure
(? commit a6bd811f1209fe1c64c9f6fd578101d6436c6b6e)
All those patches seem to be upstream now. I would suggest to cherry-pick
/ backport those into Eoan instead of picking the SAUCE patches.
Acked-by: Stefan Bader <stefan.bader at canonical.com>
>
> arch/x86/include/asm/kvm_host.h | 4 +-
> arch/x86/kvm/x86.c | 67 ++++++++++++-------
> include/linux/kvm_host.h | 5 ++
> include/linux/kvm_types.h | 9 ++-
> virt/kvm/kvm_main.c | 113 +++++++++++++++++++++++++++-----
> 5 files changed, 153 insertions(+), 45 deletions(-)
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20200214/93d2dc11/attachment.sig>
More information about the kernel-team
mailing list