From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 34EE9C6FD18 for ; Wed, 19 Apr 2023 07:17:23 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231431AbjDSHRW (ORCPT ); Wed, 19 Apr 2023 03:17:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41644 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229633AbjDSHRU (ORCPT ); Wed, 19 Apr 2023 03:17:20 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0096B46B1; Wed, 19 Apr 2023 00:17:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8B99F61F4D; Wed, 19 Apr 2023 07:17:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EE072C433D2; Wed, 19 Apr 2023 07:17:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1681888638; bh=WfsfEA+C45EUPKy/+wp1HfM/3wu+373l0SAHQL/9jGA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=I+aqmSpXVTqfTyLnNLfbmugTVG3uBnD9QK/0C/KdhJ/ofvNZFnUImiDIns8Hy651R jybhmGswZCJoQSFUxYcUyujaFKO4MQcke028UsShvgCTNQqqJ9eLGodlVHYoY8bi/d XAOs6ylBKtymt3IdqHjGhB2PSnqStPbmkBKKG88VCBOdLUBlJ33TEl9GyzrBQiAHkQ zAwKbS4HrSOF2qDHT8HKPJWzL6dIrKyKN5Ka5p5iQNNUZZ8ktjpi4IVuYxFilJKTcL K1eql1Ic7f//cfeNfCTzWeR0srDUpiDJ1CdB/SfMwFc5l63fq+3k23XbCsRNW/11LP /dNp+cObCpOSQ== Date: Wed, 19 Apr 2023 08:17:11 +0100 From: Lee Jones To: "gregkh@linuxfoundation.org" Cc: "Bhatnagar, Rishabh" , "stable@vger.kernel.org" , "Jitindar Singh, Suraj" , "Bacco, Mike" , "bp@alien8.de" , "mingo@redhat.com" , "tglx@linutronix.de" , "pbonzini@redhat.com" , "seanjc@google.com" , "vkuznets@redhat.com" , "wanpengli@tencent.com" , "jmattson@google.com" , "joro@8bytes.org" , kvm@vger.kernel.org Subject: Re: [PATCH 0/9] KVM backports to 5.10 Message-ID: <20230419071711.GA493399@google.com> References: <20220909185557.21255-1-risbhat@amazon.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org On Wed, 21 Sep 2022, gregkh@linuxfoundation.org wrote: > On Tue, Sep 20, 2022 at 06:19:26PM +0200, gregkh@linuxfoundation.org wrote: > > On Tue, Sep 20, 2022 at 03:34:04PM +0000, Bhatnagar, Rishabh wrote: > > > Gentle reminder to review this patch series. > > > > Gentle reminder to never top-post :) > > > > Also, it's up to the KVM maintainers if they wish to review this or not. > > I can't make them care about old and obsolete kernels like 5.10.y. Why > > not just use 5.15.y or newer? > > Given the lack of responses here from the KVM developers, I'll drop this > from my mbox and wait for them to be properly reviewed and resend before > considering them for a stable release. KVM maintainers, Would someone be kind enough to take a look at this for Greg please? Note that at least one of the patches in this set has been identified as a fix for a serious security issue regarding the compromise of guest kernels due to the mishandling of flush operations. Please could someone confirm or otherwise that this is relevant for v5.10.y and older? Thank you. -- Lee Jones [李琼斯]