ACK/Cmnt: [Disco 00/10] CVE-2019-3016
Stefan Bader
stefan.bader at canonical.com
Fri Feb 14 13:58:36 UTC 2020
On 31.01.20 12:10, Thadeu Lima de Souza Cascardo wrote:
> This backports the guest mapping API and some followup fixes.
>
> It has been built-tested on all platforms.
>
> Boris Ostrovsky (5):
> UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
> UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
> UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
> UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
> missed
> UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure
>
> Christian Borntraeger (1):
> kvm: fix compile on s390 part 2
>
> KarimAllah Ahmed (2):
> KVM: Introduce a new guest mapping API
> KVM: Properly check if "page" is valid in kvm_vcpu_unmap
>
> Paolo Bonzini (2):
> kvm: fix compilation on aarch64
> kvm: fix compilation on s390
>
> arch/x86/include/asm/kvm_host.h | 4 +-
> arch/x86/kvm/x86.c | 67 ++++++++------
> include/linux/kvm_host.h | 33 +++++++
> include/linux/kvm_types.h | 9 +-
> virt/kvm/kvm_main.c | 149 +++++++++++++++++++++++++++++++-
> 5 files changed, 233 insertions(+), 29 deletions(-)
>
As for the Eoan submission I would replace the SAUCE patches by the upstream
commits doing proper cherry-picking / backporting. Adding the right cve markup
and fixing it for the pre-reqs.
Oh and we should be able to do that when applying. I should have mentioned that
in the Eoan reply, too.
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20200214/e250f65e/attachment.sig>
More information about the kernel-team
mailing list