Message ID | 20200131110644.37755-1-cascardo@canonical.com |
---|---|
Headers | show |
Series | CVE-2019-3016 | expand |
Tyler brought to my attention that CVE-2020-3016 is not a valid ID. I submitted patches with both CVE-2020-3016 and CVE-2019-3016, assuming both were assigned. Please, remove any references to CVE-2020-3016 from the commit messages. Running the following before applying should work: sed -i /CVE-2020-3016/d *{patch,mbox} Or after applying, before pushing: rm -rf .git/refs/original/ git filter-branch --msg-filter 'sed /CVE-2020-3016/d' origin/master-next..HEAD
On Fri, Jan 31, 2020 at 08:06:39AM -0300, Thadeu Lima de Souza Cascardo wrote: > This has been built on all platforms and smoke tested as a host on x86 and > ppc64el. > > Boris Ostrovsky (5): > UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit > UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn() > UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation > UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not > missed > UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure > > arch/x86/include/asm/kvm_host.h | 4 +- > arch/x86/kvm/x86.c | 67 ++++++++++++------- > include/linux/kvm_host.h | 5 ++ > include/linux/kvm_types.h | 9 ++- > virt/kvm/kvm_main.c | 113 +++++++++++++++++++++++++++----- > 5 files changed, 153 insertions(+), 45 deletions(-) > > -- > 2.24.0 > > > -- > kernel-team mailing list > kernel-team@lists.ubuntu.com > https://lists.ubuntu.com/mailman/listinfo/kernel-team Acked-by: Sultan Alsawaf <sultan.alsawaf@canonical.com>
On 31.01.20 12:06, Thadeu Lima de Souza Cascardo wrote: > This has been built on all platforms and smoke tested as a host on x86 and > ppc64el. > > Boris Ostrovsky (5): > UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit (? commit 8c6de56a42e0c657955e12b882a81ef07d1d073e) > UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn() (? commit 1eff70a9abd46f175defafd29bc17ad456f398a7) > UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation (? commit 917248144db5d7320655dbb41d3af0b8a0f3d589) > UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not > missed (? commit b043138246a41064527cf019a3d51d9f015e9796) > UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure (? commit a6bd811f1209fe1c64c9f6fd578101d6436c6b6e) All those patches seem to be upstream now. I would suggest to cherry-pick / backport those into Eoan instead of picking the SAUCE patches. Acked-by: Stefan Bader <stefan.bader@canonical.com> > > arch/x86/include/asm/kvm_host.h | 4 +- > arch/x86/kvm/x86.c | 67 ++++++++++++------- > include/linux/kvm_host.h | 5 ++ > include/linux/kvm_types.h | 9 ++- > virt/kvm/kvm_main.c | 113 +++++++++++++++++++++++++++----- > 5 files changed, 153 insertions(+), 45 deletions(-) >
On 31.01.20 12:06, Thadeu Lima de Souza Cascardo wrote: > This has been built on all platforms and smoke tested as a host on x86 and > ppc64el. > > Boris Ostrovsky (5): > UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit > UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn() > UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation > UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not > missed > UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure > > arch/x86/include/asm/kvm_host.h | 4 +- > arch/x86/kvm/x86.c | 67 ++++++++++++------- > include/linux/kvm_host.h | 5 ++ > include/linux/kvm_types.h | 9 ++- > virt/kvm/kvm_main.c | 113 +++++++++++++++++++++++++++----- > 5 files changed, 153 insertions(+), 45 deletions(-) > Applied to eoan/linux, cherry-picking/backporting the patches from mainline as noted by Stefan. Thanks, Kleber