ACK/Cmnt: [Disco 00/10] CVE-2019-3016

Stefan Bader stefan.bader at canonical.com
Fri Feb 14 13:58:36 UTC 2020


On 31.01.20 12:10, Thadeu Lima de Souza Cascardo wrote:
> This backports the guest mapping API and some followup fixes.
> 
> It has been built-tested on all platforms.
> 
> Boris Ostrovsky (5):
>   UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
>   UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
>   UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
>   UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
>     missed
>   UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure
> 
> Christian Borntraeger (1):
>   kvm: fix compile on s390 part 2
> 
> KarimAllah Ahmed (2):
>   KVM: Introduce a new guest mapping API
>   KVM: Properly check if "page" is valid in kvm_vcpu_unmap
> 
> Paolo Bonzini (2):
>   kvm: fix compilation on aarch64
>   kvm: fix compilation on s390
> 
>  arch/x86/include/asm/kvm_host.h |   4 +-
>  arch/x86/kvm/x86.c              |  67 ++++++++------
>  include/linux/kvm_host.h        |  33 +++++++
>  include/linux/kvm_types.h       |   9 +-
>  virt/kvm/kvm_main.c             | 149 +++++++++++++++++++++++++++++++-
>  5 files changed, 233 insertions(+), 29 deletions(-)
> 
As for the Eoan submission I would replace the SAUCE patches by the upstream
commits doing proper cherry-picking / backporting. Adding the right cve markup
and fixing it for the pre-reqs.
Oh and we should be able to do that when applying. I should have mentioned that
in the Eoan reply, too.

Acked-by: Stefan Bader <stefan.bader at canonical.com>

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20200214/e250f65e/attachment.sig>


More information about the kernel-team mailing list