From: gitlab@mg.gitlab.com (Ben Hutchings)
To: cip-dev@lists.cip-project.org
Subject: [cip-dev] [Git][cip-project/cip-kernel/cip-kernel-sec][master] 2 commits: Fill in and correct commit lists for various issues
Date: Sat, 08 Dec 2018 18:32:46 +0000 [thread overview]
Message-ID: <5c0c0e4e396d3_35563fbebd4ef4881483f7@sidekiq-asap-03-sv-gprd.mail> (raw)
Ben Hutchings pushed to branch master at cip-project / cip-kernel / cip-kernel-sec
Commits:
ce17def7 by Ben Hutchings at 2018-12-08T18:30:21Z
Fill in and correct commit lists for various issues
- - - - -
d809002c by Ben Hutchings at 2018-12-08T18:32:07Z
Import data from stable
Record the fixes I backported for 4.9.144.
- - - - -
24 changed files:
- issues/CVE-2017-13166.yml
- issues/CVE-2017-18241.yml
- issues/CVE-2017-18249.yml
- issues/CVE-2018-1108.yml
- issues/CVE-2018-1120.yml
- issues/CVE-2018-1128.yml
- issues/CVE-2018-1129.yml
- issues/CVE-2018-13096.yml
- issues/CVE-2018-13097.yml
- issues/CVE-2018-13098.yml
- issues/CVE-2018-13100.yml
- issues/CVE-2018-14610.yml
- issues/CVE-2018-14611.yml
- issues/CVE-2018-14612.yml
- issues/CVE-2018-14613.yml
- issues/CVE-2018-14614.yml
- issues/CVE-2018-14615.yml
- issues/CVE-2018-18281.yml
- issues/CVE-2018-18690.yml
- issues/CVE-2018-18955.yml
- issues/CVE-2018-3620.yml
- issues/CVE-2018-3639.yml
- issues/CVE-2018-5848.yml
- issues/CVE-2018-7740.yml
Changes:
=====================================
issues/CVE-2017-13166.yml
=====================================
@@ -37,6 +37,12 @@ fixed-by:
2b14d31a951e1af276077d40e000638fa469185e, 1cc643ab48ee22b71679db6453475de299c0ac83,
11fe1040030e703340a7c6c91330314e1129cdc1, 76db969a3bbf598bdfaa1c957a54586c2bb61fb8,
d971cb5f5fbd4af3b35a4addb850fb4b2aa8d720]
+ linux-4.4.y: [15e3780a8add9d5cd6bdc9df9cdc4e0d9b8e55dd, 4a85bbbcb5d5d3afb66b6c9a9ba54d02e30f8b4f,
+ 04d632236ad250f527ff9d7e3b2696783e82409c, 56a4fbdf5092d64f1f29a1e45508f18f3072f316,
+ 57f0817a6dd82cf0b3188f36df191abd629555c8, c6cbc2c3539fd68d37dff300870f56869d21bb82,
+ d64d203f201975604578f71982ba13fe71bd86d6, 4c8ba4d5ad2fc0d2c11ade4997571f654a573f87,
+ edbc67ef654b4abf14e7de391ce286a722bfda13, af41ce9e1304db4008356d36236d4f85199ecf87,
+ e87f9596660622f01ed8f90b7088615933dca320, 8fbc22b34365bfeb72b1e3a63ba9239d327137dc]
linux-4.9.y: [e78d9fdf5ecce2830d76d54017c3d8531bf9b119, f294548da6455cae64456a9dfeff1e96390171c0,
02129c9bc23582a48194e89cbbeb15169115b8b9, 81e0acf07015dbd3e0b45e8f8a053d64b804bb46,
daff4d009f4f7fb3b1f041b76c0782cb96d99d56, eec955463de3259c0db5b38952f79c3e39e03f65,
=====================================
issues/CVE-2017-18241.yml
=====================================
@@ -5,4 +5,5 @@ references:
- https://github.com/torvalds/linux/commit/d4fdf8ba0e5808ba9ad6b44337783bd9935e0982
fixed-by:
linux-3.16.y: [1f0db424c8770c7b31296d5c66a52fffdec1d24c]
+ linux-4.9.y: [3b19f961d260d1ae12b497e5eb77e5ecc1039fac]
mainline: [d4fdf8ba0e5808ba9ad6b44337783bd9935e0982]
=====================================
issues/CVE-2017-18249.yml
=====================================
@@ -6,4 +6,5 @@ references:
comments:
Debian-bwh: So far I've failed to backport this even to 4.9.
fixed-by:
+ linux-4.9.y: [cb9b1d4ec206702a4df1cb42ba8142f39acfdd91]
mainline: [30a61ddf8117c26ac5b295e1233eaa9629a94ca3]
=====================================
issues/CVE-2018-1108.yml
=====================================
@@ -18,6 +18,8 @@ comments:
it's unlikely user space will receive backports to support it.
reporters:
- Jann Horn
+introduced-by:
+ mainline: [e192be9d9a30555aae2ca1dc3aad37cba484cd4a]
fixed-by:
linux-4.14.y: [6e513bc20ca63f594632eca4e1968791240b8f18]
linux-4.16.y: [cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d]
=====================================
issues/CVE-2018-1120.yml
=====================================
@@ -13,5 +13,9 @@ fixed-by:
linux-4.16.y: [b7458b534b56b9b4d9297ba7a6708aa8071ac8ba]
linux-4.9.y: [6f1abf8628b750905606996fd5ff5ea22d149238]
mainline: [7f7ccc2ccc2e70c6054685f5e3522efa81556830]
+fix-depends-on:
+ 6347e8d5bcce33fc36e651901efefbe2c93a43ef: |-
+ Convert access_remote_vm to take flags. This in turn depends on
+ several preceding commits.
ignore:
linux-3.2.y: EOL
=====================================
issues/CVE-2018-1128.yml
=====================================
@@ -12,6 +12,9 @@ fixed-by:
linux-4.14.y: [2fd0d0f9bb59ec5b628622e30f22158cb564c4ea, 66abd96062b627f0ee20a684ebba48cec80233d7,
0858417b5c2e7bcc0b9e52c4b76e2af3d69e138b, a55056e1523990e1ef9d70531ffaf27fd1ddff55,
3fd73c8a71f299e30359a63add1f33e3fd834831]
+ linux-4.9.y: [08115452f865b39c9ecbd468201f606ff5434619, 2617cd5743c6d6207de26e51b95c3fcb171ff70e,
+ 9da9bb4a0ff67af49c1ca96a313c2cf8e079b46a, 2e901ea8b448a7f5899104a3917ecca2a5e8ab7f,
+ 06e925920d4de3da2114876bc607447e929604af]
mainline: [262614c4294d33b1f19e0d18c0091d9c329b544a, c0f56b483aa09c99bfe97409a43ad786f33b8a5a,
c571fe24d243bfe7017f0e67fe800b3cc2a1d1f7, 149cac4a50b0b4081b38b2f38de6ef71c27eaa85,
6daca13d2e72bedaaacfc08f873114c9307d5aea]
=====================================
issues/CVE-2018-1129.yml
=====================================
@@ -3,4 +3,5 @@ references:
- http://tracker.ceph.com/issues/24837
fixed-by:
linux-4.14.y: [b16d0c5d32468a0624505a7b6b211e20488295e9]
+ linux-4.9.y: [18a23fb2632030888fc56a7df73a80f57445718f]
mainline: [cc255c76c70f7a87d97939621eae04b600d9f4a1]
=====================================
issues/CVE-2018-13096.yml
=====================================
@@ -4,4 +4,5 @@ references:
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=8c9c95d5f4e68d22f22091546ce554ac9222689c
fixed-by:
linux-4.14.y: [b8321ccd045710ee04fd5322c34cadd13a5e58af]
+ linux-4.9.y: [1c87980591a1dc8c5eafdcc5f9953fca4e518465]
mainline: [e34438c903b653daca2b2a7de95aed46226f8ed3]
=====================================
issues/CVE-2018-13097.yml
=====================================
@@ -4,4 +4,5 @@ references:
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=d5c28acdb832800fbbcf831f20f75080cba54f04
fixed-by:
linux-4.14.y: [f9cf5462b51d98026275cc51437fc531e808b64a]
+ linux-4.9.y: [06e606acedaf8bb00c83c4cee43acdd264287a92]
mainline: [9dc956b2c8523aed39d1e6508438be9fea28c8fc]
=====================================
issues/CVE-2018-13098.yml
=====================================
@@ -2,6 +2,8 @@ description: Out-of-bound access in f2fs_iget() when mounting a corrupted f2fs i
references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200173
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=190286a242344d42aad83c8e70169d6d72a63d05
+introduced-by:
+ mainline: [7a2af766af15887754f7f7a0869b4603b390876a]
fixed-by:
linux-4.14.y: [0081c90ebacebb3a82d0d24bf0f42273ce2d902e]
linux-4.18.y: [b6f493453c78311598fdd204f7815e683818512a]
=====================================
issues/CVE-2018-13100.yml
=====================================
@@ -5,4 +5,5 @@ references:
fixed-by:
linux-4.14.y: [f3d6361a96a455c8ba12226a04efa67a0ada4966]
linux-4.18.y: [0342426f2bf7298a91efee659ddc033082f6918b]
+ linux-4.9.y: [a3dccfacd3a574365ab6c5118f8a944a4ba691fa]
mainline: [42bf546c1fe3f3654bdf914e977acbc2b80a5be5]
=====================================
issues/CVE-2018-14610.yml
=====================================
@@ -9,4 +9,5 @@ comments:
"btrfs: tree-checker: Verify block_group_item".
fixed-by:
linux-4.14.y: [34407a175a59b668a1a2bbf0d0e495d87a7777d8]
+ linux-4.9.y: [7a72f918825ddece7a4ed79583836f6f1e06e478]
mainline: [514c7dca85a0bf40be984dab0b477403a6db901f]
=====================================
issues/CVE-2018-14611.yml
=====================================
@@ -9,4 +9,5 @@ comments:
"Btrfs: add validadtion checks for chunk loading".
fixed-by:
linux-4.14.y: [f7eef132ccc95c9af50b647c5da0511d2b8492f8]
+ linux-4.9.y: [3c77b07dc365a7ed2644ca0dd38e6e40a9652d57]
mainline: [315409b0098fb2651d86553f0436b70502b29bb2]
=====================================
issues/CVE-2018-14612.yml
=====================================
@@ -11,4 +11,5 @@ comments:
that applies.
fixed-by:
linux-4.14.y: [c0dfb99847851fb830d1e8ea7d5e0571f50c325a, 895586ecb7a4528336d41f81d0ce3985e8abbed6]
+ linux-4.9.y: [6f33d3d8dca8683a4df94e9944296a1a1a2a6f10, 23eb2f435a07e1e09d48ea10c4a22bc96e16fde6]
mainline: [ba480dd4db9f1798541eb2d1c423fc95feee8d36, 7ef49515fa6727cb4b6f2f5b0ffbc5fc20a9f8c6]
=====================================
issues/CVE-2018-14613.yml
=====================================
@@ -5,4 +5,5 @@ references:
- https://patchwork.kernel.org/patch/10503147/
fixed-by:
linux-4.14.y: [9f268b5cf2d6a716779dfe11f4bc02d6461db693]
+ linux-4.9.y: [058e388e42c8dc5b6ce6248990c75a0459e20197]
mainline: [fce466eab7ac6baa9d2dcd88abcf945be3d4a089]
=====================================
issues/CVE-2018-14614.yml
=====================================
@@ -5,4 +5,5 @@ references:
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=bf2d987b270ed14fb205c83c6dcfbfa6dfcd9f8c
fixed-by:
linux-4.14.y: [30130700acfad8a705c109325379f5bbe21b3ccc]
+ linux-4.9.y: [91fe514bedf4c72ae8046fe4cfa98c5e201f6b84]
mainline: [e494c2f995d6181d6e29c4927d68e0f295ecf75b]
=====================================
issues/CVE-2018-14615.yml
=====================================
@@ -3,6 +3,8 @@ description: Buffer overrun in f2fs_truncate_inline_inode() when umounting an f2
references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200421
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=a80a2ff8e0a1265a4e92f4b8ae7caacc83a19503
+introduced-by:
+ mainline: [7a2af766af15887754f7f7a0869b4603b390876a]
fixed-by:
linux-4.14.y: [d7d9d29a837358636e12fe09c90a7882b53b2220]
mainline: [18dd6470c2d14d10f5a2dd926925dc80dbd3abfd]
=====================================
issues/CVE-2018-18281.yml
=====================================
@@ -5,5 +5,6 @@ references:
fixed-by:
linux-4.14.y: [541500abfe9eb30a89ff0a6eb42a21521996d68d]
linux-4.18.y: [d80183541e6006563334eaec9e8d1dc6e40efeb7]
+ linux-4.4.y: [2e3ae534fb98c7a6a5cf3e80a190181154328f80]
linux-4.9.y: [e34bd9a96704f7089ccad61b6e01ea985fa54dd6]
mainline: [eb66ae030829605d61fbef1909ce310e29f78821]
=====================================
issues/CVE-2018-18690.yml
=====================================
@@ -5,4 +5,5 @@ references:
- https://bugzilla.suse.com/show_bug.cgi?id=1105025
fixed-by:
linux-4.14.y: [cb7ccb9924bb3596f211badf0d2becf131a979cd]
+ linux-4.9.y: [4ec44e98ab08c704d0ff1a35a21a0682a5562a27]
mainline: [7b38460dc8e4eafba06c78f8e37099d3b34d473c]
=====================================
issues/CVE-2018-18955.yml
=====================================
@@ -1,7 +1,7 @@
description: 'userns: also map extents in the reverse map to kernel IDs'
+introduced-by:
+ mainline: [6397fac4915ab3002dc15aae751455da1a852f25]
fixed-by:
linux-4.18.y: [bbfed258eb08070e051a1c086282623cc562ff24]
linux-4.19.y: [9a7a80fb02cc7515b273dbb4249374d6e6a35b70]
mainline: [d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd]
-introduced-by:
- mainline: [6397fac4915ab3002dc15aae751455da1a852f25]
=====================================
issues/CVE-2018-3620.yml
=====================================
@@ -43,6 +43,20 @@ fixed-by:
43b0b90df51125979137b4ca9debb5c479b8e7de, 9fc384dd5354b46ef967f7187764a485935b0dc6,
862b9e18a0a33b79635122857ee9c20733542271, 0ea75fa0f6bd8bb79bbccdeb77b313bb9463bde3,
2ff13cec042e5793bbcee126729c49d1a4869583, 22b734b0c850139bb0cd31dcaa37cde7f00ccbd6]
+ linux-4.4.y: [90a231c63cc28d896ab353b027011a949e9884d3, 614f5e84640e382b9916b6f606328191ed0264b3,
+ 9bbdab847fc9a0b8cf23fa7354e1210f0b492821, 9ee2d2da676c48a459a99f10f45c71ffca8761a8,
+ 52dc5c9f8eee1c569974308f0bb7be64ec63565c, bf0cca01b8736a5e146a980434ba36eb036e37ac,
+ d71af2dbacb5611c1dcdc16fd1d343821d61bd5e, 685b44483f077c949bd5016fdfe734b662b74aba,
+ fa86c208d22d8179ef3d295f6084fc87390c8366, df7fd6ccb358bd4aa3abc8a6ff995b1f3da1b0fb,
+ b55b06bd3b3c977da2c938d1a73d38674cb88086, e3dea38fc8528c9d04acd9a28bcdd7dab3b461fa,
+ 09049f022a9b96b0d09d90023d4f0a097a61a767, 8f2adf3d2118cc0822b83a7bb43475f9149a1d26,
+ 0aae5fe8413dfcd949d0df1c7d6b835efecd5b3b, 9feecdb6cb73feaa55b0135aee8777eaac848c78,
+ 02ff2769edbce2261e981effbc3c4b98fae4faf0, 6b06f36f07e2c91ad0126f17d0fc8f933c827da8,
+ 4b90ff885c6cc88795b678414aaf5d7b0153a5dc, fa86c208d22d8179ef3d295f6084fc87390c8366,
+ 6a56bd7f2ea31d4c86849b8f67d4e2dc1cb5b788, 7b69cd6fa088e473869512672969e6c490cac1b6,
+ 4cdedeefa38f45299b18ae692426d5baaff6b785, 9feecdb6cb73feaa55b0135aee8777eaac848c78,
+ 02ff2769edbce2261e981effbc3c4b98fae4faf0, 6b06f36f07e2c91ad0126f17d0fc8f933c827da8,
+ 72f6531162bd2f1b57e8114c8358fca507090f41, f46d2b99a6acd87d56822c600fd2587a37e4d56c]
linux-4.9.y: [bbd07cbb1076de03d896c9c3787081b1080e8c99, 2c9b57e4474d93222bcb6e7f901fd1e71ded699c,
60712274887fcd4ad5eb8e01796022b6b202143c, 33182fe97add6e83c195e9d0f7297a6499563b52,
5b2ec92f70f6d4084d23bf42391fd27fa03e8c4c, 432e99b34066099db62f87b2704654b1b23fd6be,
=====================================
issues/CVE-2018-3639.yml
=====================================
@@ -33,9 +33,8 @@ comments:
(and respective stable releases).
Basically: 3b78ce4a34b761c7fe13520de822984019ff1a8f^2 ^1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f~1
Ubuntu-tyhicks: '"Variant 4"'
- bwh: |-
- linux-4.4.y, linux-4.9.y, linux-4.14.y are missing a backport of commit
- af86ca4e3088. linux-4.4.y is also missing KVM support for SSBD.
+ bwh: linux-4.4.y is missing a backport of commit af86ca4e3088 and KVM support for
+ SSBD.
reporters:
- Jann Horn
- Ken Johnson
@@ -114,6 +113,31 @@ fixed-by:
bd4b410bc5ea560107126a3df18e9233baaec9f3, 95271aeb93d4681c65e2f94969b23ef6070367a6,
7445962ff2d652bb957722ca1a08a92d09f3e5d7, 677af592349708498671b0d9290912acb2f203e4,
75e3417f898fe1d2451e7ceffe93db5c66772b0a]
+ linux-4.9.y: [741c026d1a0c594f7ad509f44488ef29582fed74, 88659d5fd9bea7f6afb227c6d404de750b368b45,
+ 3effee64a9993dc5587fb39f0da4455769e53d26, 0f5dd651397b264903e8becc511af6cf384c273e,
+ cf21f58ae6f264e0a10d9736be97342627cf9837, 24e4dd97af40afa4d45e85a32d9c2cc81425a62e,
+ a80714172abca6413d2d6505be64723ae73a903b, 6f70a553666dd8c4fa370eaaa41380eec593229c,
+ 19e3a2bec95e966921689ae39117f9dbbaffd99b, 99b13116965f16b2e608e7796cd59198eee5bf06,
+ f854434b37bbf8953900226acd6139081f60d3da, 99318eca2c7ab3250b9614043b9ac6077ff2cb46,
+ 7a2d2358ba9b6de29be0a98c8290479df32604b6, 4812ffbbfcac35270b82292e84e8e7187088c8b8,
+ 89c6e9b599c573802de1b2fff6a9ccd99c3c4e57, a078e3e81964c31079627dd32c3ea714d5b1531e,
+ 4272f528da381673a8e7845c93daa88b8aa4f4e9, 51ef9af2a35bbc21334c801fd15cbfe01210760f,
+ 0a112f104548667f5618477ff0f2a54ee626addd, ea055f7d43fb3a9d56e80d0116104555d6dde3f7,
+ 036608d62a838aeb63cae0adaf8ac773cb53148c, c71def81cd07e1bd74da468ae6abe1ce62e3157b,
+ ab677c2addbb128f334c4906f27a0285a67d2180, 094c2767c4f02c36eabc27309d78b04f4a216e88,
+ 05a85a396f3989e9ac953785d9dccfc7cd0110f2, bf3da841edae882de545d2d19b1fae205cab8d98,
+ f8cd89f5e05d49422315e60ec2db9fcb66d25aca, f79f0efe8e1816063f83926c946026d83b9b287f,
+ eb7b5624be3e6249a880310be486245db15a5f5c, dbb264a253c8b07259d55fb3373b783fcb641b04,
+ 6fdd277a9326c5ef3fe94999c9c319ad64333fdd, 3a684641619ff0e06b8d4cb8c2ffbef304c9bdb1,
+ 69e9b0b1e04001a743927489bb8b9a10344810d8, 4a58908fa1476c600548f82effc75bcfa890454a,
+ a7c343228e5c32802431e6cc5b855ae61eb4db72, f69e91f2c4ce59deb66bd30150e5153c08873ae9,
+ 53c434e735fffbf8715a1778ce44387131e0b080, d0cb78f5e4214db86b12a9448d8ccaa005f43cb9,
+ 1189cbf52ad35cfd04a715016200ea81dd4c708f, 7c0b2dc44956533c5aac95f07575feef7b63344c,
+ b7b84401576d3858e9573d69d8287e182444f8e9, ea99935b633bd4766a679e51b173197c750fb00b,
+ 599288ec9e20d9772e6e8a27aeae021f018c7336, ec90464d96c50f90bfe1bde6dea748a6c962313c,
+ 0ec827f974e198c609c2f258a5a1f11f9af48bb2, b0ef8c72b3d70505ba7fd72af6b1e3fc9b3ae9bc,
+ b965592a07a248ef254d9d421bd34a6b548db21f, 3394ef1a7efc08e3c185ac2446f06284847ccb37,
+ def8c1d045a0fb457a1136f7edcc5ed8b2d81af6]
mainline: [1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f, 4a28bfe3267b68e22c663ac26185aa16c9b879ef,
d1059518b4789cabe34bb4b714d07e6089c82ca1, 1b86883ccb8d5d9506529d42dbe1a5257cb30b18,
5cf687548705412da47c9cec342fd952d71ed3d5, c456442cd3a59eeb1d60293c26cbe2ff2c4e42cf,
=====================================
issues/CVE-2018-5848.yml
=====================================
@@ -6,4 +6,5 @@ references:
- https://marc.info/?l=linux-wireless&m=151066597529493&w=2
fixed-by:
linux-4.14.y: [107b02c81a8761f1f7efc1e8b54d435324ccd13e]
+ linux-4.9.y: [35db4d1ed8a344899a87887fa7bf11be5b057bec]
mainline: [b5a8ffcae4103a9d823ea3aa3a761f65779fbe2a]
=====================================
issues/CVE-2018-7740.yml
=====================================
@@ -18,10 +18,13 @@ comments:
ff8c0c53c475 and 045c7a3f may also be needed for older
releases
introduced-by:
+ linux-4.9.y: [e5deaa544138b5b01531d06cfee05a969375a5f6]
mainline: [ff8c0c53c47530ffea82c22a0a6df6332b56c957]
fixed-by:
- linux-3.16.y: [363ed2044f82d8997e9ea8231dc1abeab4993755, 8cca49ea37415645203520bff04309c8a87f7677]
+ linux-3.16.y: [363ed2044f82d8997e9ea8231dc1abeab4993755, 8cca49ea37415645203520bff04309c8a87f7677,
+ b9beff69cd84917c7881c176c241db933a3f7f7d]
linux-3.2.y: [4cba2554682469496ff48536d50c399110d20043, 131802b8292d35e8a407469c485565b199ed79cf]
- linux-4.14.y: [1e8628443ede418464b0ab101b24fbb7030949b2]
- linux-4.15.y: [e0fdb5385c4bf26b4be60c0042344c315c039aeb]
- mainline: [63489f8e821144000e0bdca7e65a8d1cc23a7ee7]
+ linux-4.14.y: [1e8628443ede418464b0ab101b24fbb7030949b2, 61534984904eaf3604626170dc718556210642a2]
+ linux-4.15.y: [e0fdb5385c4bf26b4be60c0042344c315c039aeb, f6b213293ed95d8482769d3c496dfa8692a155b1]
+ linux-4.9.y: [447effd30f9d12f7925595ba9a6ffb01969d6cce, 0c82bca7cd1ae580dc34069d42edfd5102603e7e]
+ mainline: [63489f8e821144000e0bdca7e65a8d1cc23a7ee7, 5df63c2a149ae65a9ec239e7c2af44efa6f79beb]
View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/efeeb55f65f8bb4e27558d190d89c91515285abb...d809002c1c357902a2ed7bf38c1fa2efde5e1f74
--
View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/efeeb55f65f8bb4e27558d190d89c91515285abb...d809002c1c357902a2ed7bf38c1fa2efde5e1f74
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cip-project.org/pipermail/cip-dev/attachments/20181208/68419adc/attachment-0001.html>
next reply other threads:[~2018-12-08 18:32 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-12-08 18:32 Ben Hutchings [this message]
-- strict thread matches above, loose matches on Subject: below --
2018-12-06 14:22 [cip-dev] [Git][cip-project/cip-kernel/cip-kernel-sec][master] 2 commits: Fill in and correct commit lists for various issues Ben Hutchings
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5c0c0e4e396d3_35563fbebd4ef4881483f7@sidekiq-asap-03-sv-gprd.mail \
--to=gitlab@mg.gitlab.com \
--cc=cip-dev@lists.cip-project.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.