ACK/Cmnt: [SRU][Xenial][PATCH v3 0/4] Fix corruption on blocked_vcpu_on_cpu list
Stefan Bader
stefan.bader at canonical.com
Thu Jan 21 09:18:31 UTC 2021
On 19.01.21 00:22, Ioanna Alifieraki wrote:
> BugLink: https://bugs.launchpad.net/bugs/1908428
>
> The following patches fix the bug reported in [1].
> The first patch bc22512bb24c(kvm: vmx: rename vmx_pre/post_block to pi_pre/post_block)
> is pulled into to facilitate the backport of the next 3 patches that fix the bug.
> Original patches come from [2] and have been accepted upstream.
>
> [1] https://marc.info/?l=kvm&m=149559827906211&w=2
> [2] https://lore.kernel.org/lkml/20170606105707.23207-1-pbonzini@redhat.com/
>
> Paolo Bonzini (3):
> KVM: VMX: extract __pi_post_block
> KVM: VMX: avoid double list add with VT-d posted interrupts
> KVM: VMX: simplify and fix vmx_vcpu_pi_load
>
> Yunhong Jiang (1):
> kvm: vmx: rename vmx_pre/post_block to pi_pre/post_block
>
> arch/x86/kvm/vmx.c | 190 ++++++++++++++++++++++++++++-------------------------
> 1 file changed, 100 insertions(+), 90 deletions(-)
>
Statements about the regression potential in the bug report still apply. What I
mean is that that section should describe what you think would be the symptoms
or areas where regressions would show up. So beside of the verification testing
by people affected, someone could say ok, we were covering this area and had no
issues so this might be ok.
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20210121/8967a6c1/attachment.sig>
More information about the kernel-team
mailing list