mbox series

[Focal,0/5] CVE-2019-3016

Message ID 20200131110530.37561-1-cascardo@canonical.com
Headers show
Series CVE-2019-3016 | expand

Message

Thadeu Lima de Souza Cascardo Jan. 31, 2020, 11:05 a.m. UTC
This has been built on all platforms and smoke tested as a host on x86 and
ppc64el.

Boris Ostrovsky (5):
  UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
  UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
  UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
  UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
    missed
  UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure

 arch/x86/include/asm/kvm_host.h |   4 +-
 arch/x86/kvm/x86.c              |  69 +++++++++++--------
 include/linux/kvm_host.h        |   5 ++
 include/linux/kvm_types.h       |   9 ++-
 virt/kvm/kvm_main.c             | 113 +++++++++++++++++++++++++++-----
 5 files changed, 154 insertions(+), 46 deletions(-)

Comments

Thadeu Lima de Souza Cascardo Jan. 31, 2020, 3:50 p.m. UTC | #1
Tyler brought to my attention that CVE-2020-3016 is not a valid ID.

I submitted patches with both CVE-2020-3016 and CVE-2019-3016, assuming both
were assigned.

Please, remove any references to CVE-2020-3016 from the commit messages.

Running the following before applying should work:

sed -i /CVE-2020-3016/d *{patch,mbox}

Or after applying, before pushing:

rm -rf .git/refs/original/
git filter-branch --msg-filter 'sed /CVE-2020-3016/d' origin/master-next..HEAD
Seth Forshee Feb. 6, 2020, 8:42 p.m. UTC | #2
On Fri, Jan 31, 2020 at 08:05:25AM -0300, Thadeu Lima de Souza Cascardo wrote:
> This has been built on all platforms and smoke tested as a host on x86 and
> ppc64el.

Applied to focal/master-next and unstable/master, thanks!