Message ID | 20200131111035.38050-1-cascardo@canonical.com |
---|---|
Headers | show |
Series | CVE-2019-3016 | expand |
Tyler brought to my attention that CVE-2020-3016 is not a valid ID. I submitted patches with both CVE-2020-3016 and CVE-2019-3016, assuming both were assigned. Please, remove any references to CVE-2020-3016 from the commit messages. Running the following before applying should work: sed -i /CVE-2020-3016/d *{patch,mbox} Or after applying, before pushing: rm -rf .git/refs/original/ git filter-branch --msg-filter 'sed /CVE-2020-3016/d' origin/master-next..HEAD
On Fri, Jan 31, 2020 at 08:10:25AM -0300, Thadeu Lima de Souza Cascardo wrote: > This backports the guest mapping API and some followup fixes. > > It has been built-tested on all platforms. > > Boris Ostrovsky (5): > UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit > UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn() > UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation > UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not > missed > UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure > > Christian Borntraeger (1): > kvm: fix compile on s390 part 2 > > KarimAllah Ahmed (2): > KVM: Introduce a new guest mapping API > KVM: Properly check if "page" is valid in kvm_vcpu_unmap > > Paolo Bonzini (2): > kvm: fix compilation on aarch64 > kvm: fix compilation on s390 > > arch/x86/include/asm/kvm_host.h | 4 +- > arch/x86/kvm/x86.c | 67 ++++++++------ > include/linux/kvm_host.h | 33 +++++++ > include/linux/kvm_types.h | 9 +- > virt/kvm/kvm_main.c | 149 +++++++++++++++++++++++++++++++- > 5 files changed, 233 insertions(+), 29 deletions(-) > > -- > 2.24.0 > > > -- > kernel-team mailing list > kernel-team@lists.ubuntu.com > https://lists.ubuntu.com/mailman/listinfo/kernel-team Acked-by: Sultan Alsawaf <sultan.alsawaf@canonical.com>
On 31.01.20 12:10, Thadeu Lima de Souza Cascardo wrote: > This backports the guest mapping API and some followup fixes. > > It has been built-tested on all platforms. > > Boris Ostrovsky (5): > UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit > UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn() > UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation > UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not > missed > UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure > > Christian Borntraeger (1): > kvm: fix compile on s390 part 2 > > KarimAllah Ahmed (2): > KVM: Introduce a new guest mapping API > KVM: Properly check if "page" is valid in kvm_vcpu_unmap > > Paolo Bonzini (2): > kvm: fix compilation on aarch64 > kvm: fix compilation on s390 > > arch/x86/include/asm/kvm_host.h | 4 +- > arch/x86/kvm/x86.c | 67 ++++++++------ > include/linux/kvm_host.h | 33 +++++++ > include/linux/kvm_types.h | 9 +- > virt/kvm/kvm_main.c | 149 +++++++++++++++++++++++++++++++- > 5 files changed, 233 insertions(+), 29 deletions(-) > As for the Eoan submission I would replace the SAUCE patches by the upstream commits doing proper cherry-picking / backporting. Adding the right cve markup and fixing it for the pre-reqs. Oh and we should be able to do that when applying. I should have mentioned that in the Eoan reply, too. Acked-by: Stefan Bader <stefan.bader@canonical.com>
On 31.01.20 12:10, Thadeu Lima de Souza Cascardo wrote: > This backports the guest mapping API and some followup fixes. > > It has been built-tested on all platforms. > > Boris Ostrovsky (5): > UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit > UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn() > UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation > UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not > missed > UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure > > Christian Borntraeger (1): > kvm: fix compile on s390 part 2 > > KarimAllah Ahmed (2): > KVM: Introduce a new guest mapping API > KVM: Properly check if "page" is valid in kvm_vcpu_unmap > > Paolo Bonzini (2): > kvm: fix compilation on aarch64 > kvm: fix compilation on s390 > > arch/x86/include/asm/kvm_host.h | 4 +- > arch/x86/kvm/x86.c | 67 ++++++++------ > include/linux/kvm_host.h | 33 +++++++ > include/linux/kvm_types.h | 9 +- > virt/kvm/kvm_main.c | 149 +++++++++++++++++++++++++++++++- > 5 files changed, 233 insertions(+), 29 deletions(-) > Applied to disco/linux, removing the CVE-2020-3016 reference and cherry-picking/backporting the SAUCE patches as noted by Stefan. Thanks, Kleber