All of lore.kernel.org
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: "Srivatsa S. Bhat" <srivatsa@csail.mit.edu>
Cc: "Dave Hansen" <dave@sr71.net>,
	catalin.marinas@arm.com, "Wanpeng Li" <kernellwp@gmail.com>,
	"Andi Kleen" <ak@linux.intel.com>,
	linux-tip-commits@vger.kernel.org,
	"Piotr Luc" <piotr.luc@intel.com>, "Mel Gorman" <mgorman@suse.de>,
	"Van De Ven, Arjan" <arjan.van.de.ven@intel.com>,
	xen-devel <xen-devel@lists.xenproject.org>,
	"Alexander Sergeyev" <sergeev917@gmail.com>,
	"Brian Gerst" <brgerst@gmail.com>,
	"Andy Lutomirski" <luto@kernel.org>,
	MickaëlSalaün <mic@digikod.net>,
	"Thomas Gleixner" <tglx@linutronix.de>,
	"Joe Konno" <joe.konno@linux.intel.com>,
	"Laura Abbott" <labbott@fedoraproject.org>,
	"Will Drewry" <wad@chromium.org>,
	LKML <linux-kernel@vger.kernel.org>,
	"Jia Zhang" <qianyue.zj@alibaba-inc.com>,
	"Andrew Morton" <akpm@linux-foundation.org>,
	"Linus Torvalds" <torvalds@linux-foundation.org>,
	"David Woodhouse" <dwmw@amazon.co.uk>,
	srinidhir@vmware.com
Subject: Re: [RESEND] Spectre-v2 (IBPB/IBRS) and SSBD fixes for 4.4.y
Date: Tue, 7 Aug 2018 21:15:31 +0200	[thread overview]
Message-ID: <20180807191531.GA28682@kroah.com> (raw)
In-Reply-To: <824c77d3-93d8-fb90-6eb0-afa4aeef6644@csail.mit.edu>

On Tue, Aug 07, 2018 at 12:08:07PM -0700, Srivatsa S. Bhat wrote:
> Also, upstream commit e01e80634ecdde1 (fork: unconditionally clear
> stack on fork) applies cleanly on 4.14 stable, so it would be great to
> cherry-pick it to 4.14 stable as well.

It is already in the 4.14.60 release, did I somehow mess up the
backport?

thanks,

greg k-h

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

WARNING: multiple messages have this Message-ID (diff)
From: Greg KH <gregkh@linuxfoundation.org>
To: "Srivatsa S. Bhat" <srivatsa@csail.mit.edu>
Cc: "Kees Cook" <keescook@chromium.org>,
	"Jiri Kosina" <jikos@kernel.org>,
	"# 3.4.x" <stable@vger.kernel.org>,
	"Denys Vlasenko" <dvlasenk@redhat.com>,
	"Bo Gan" <ganb@vmware.com>,
	"Konrad Rzeszutek Wilk" <konrad.wilk@oracle.com>,
	"Borislav Petkov" <bp@suse.de>,
	"Thomas Gleixner" <tglx@linutronix.de>,
	"Ricardo Neri" <ricardo.neri-calderon@linux.intel.com>,
	"Tom Lendacky" <thomas.lendacky@amd.com>,
	"Andi Kleen" <ak@linux.intel.com>,
	linux-tip-commits@vger.kernel.org,
	"Jia Zhang" <qianyue.zj@alibaba-inc.com>,
	"Josh Poimboeuf" <jpoimboe@redhat.com>,
	xen-devel <xen-devel@lists.xenproject.org>,
	Krčmář <rkrcmar@redhat.com>,
	"Peter Zijlstra" <peterz@infradead.org>,
	"Andy Lutomirski" <luto@amacapital.net>,
	"Arnaldo Carvalho de Melo" <acme@redhat.com>,
	"Sherry Hurwitz" <sherry.hurwitz@amd.com>,
	LKML <linux-kernel@vger.kernel.org>,
	"Shuah Khan" <shuahkh@osg.samsung.com>,
	"Oleg Nesterov" <oleg@redhat.com>,
	"Linus Torvalds" <torvalds@linux-foundation.org>,
	"David Woodhouse" <dwmw@amazon.co.uk>,
	"KarimAllah Ahmed" <karahmed@amazon.de>,
	"Borislav Petkov" <bp@alien8.de>,
	"Dave Hansen" <dave.hansen@linux.intel.com>,
	"Dominik Brodowski" <linux@dominikbrodowski.net>,
	"Quentin Casasnovas" <quentin.casasnovas@oracle.com>,
	"Joerg Roedel" <joro@8bytes.org>,
	"Alexander Shishkin" <alexander.shishkin@linux.intel.com>,
	"Kyle Huey" <me@kylehuey.com>, "Will Drewry" <wad@chromium.org>,
	"Andrey Ryabinin" <ryabinin.a.a@gmail.com>,
	"H. Peter Anvin" <hpa@zytor.com>,
	"Brian Gerst" <brgerst@gmail.com>,
	"Kristen Carlson Accardi" <kristen@linux.intel.com>,
	"Thomas Garnier" <thgarnie@google.com>,
	"Andrew Morton" <akpm@linux-foundation.org>,
	"Joe Konno" <joe.konno@linux.intel.com>,
	kvm <kvm@vger.kernel.org>, "Piotr Luc" <piotr.luc@intel.com>,
	"Boris Ostrovsky" <boris.ostrovsky@oracle.com>,
	"Jan Beulich" <jbeulich@suse.com>,
	"Arjan van de Ven" <arjan@linux.intel.com>,
	"Alexander Kuleshov" <kuleshovmail@gmail.com>,
	"Juergen Gross" <jgross@suse.com>,
	"Ross Zwisler" <ross.zwisler@linux.intel.com>,
	"Jörg Otte" <jrg.otte@gmail.com>,
	"Tim Chen" <tim.c.chen@linux.intel.com>,
	"Alexander Sergeyev" <sergeev917@gmail.com>,
	"Josh Triplett" <josh@joshtriplett.org>,
	"Alan Cox" <gnomes@lxorguk.ukuu.org.uk>,
	"Tony Luck" <tony.luck@intel.com>,
	"Laura Abbott" <labbott@fedoraproject.org>,
	"Dave Hansen" <dave.hansen@intel.com>,
	"Ingo Molnar" <mingo@kernel.org>,
	"Mike Galbraith" <efault@gmx.de>,
	"Rik van Riel" <riel@redhat.com>,
	"Kirill A. Shutemov" <kirill.shutemov@linux.intel.com>,
	"Alexey Makhalov" <amakhalov@vmware.com>,
	"Dave Hansen" <dave@sr71.net>,
	ashok.raj@intel.com, "Mel Gorman" <mgorman@suse.de>,
	MickaëlSalaün <mic@digikod.net>,
	"Fenghua Yu" <fenghua.yu@intel.com>,
	"Matt Helsley (VMware)" <matt.helsley@gmail.com>,
	"Vince Weaver" <vincent.weaver@maine.edu>,
	"Prarit Bhargava" <prarit@redhat.com>,
	"Steven Rostedt" <rostedt@goodmis.org>,
	"Dan Williams" <dan.j.williams@intel.com>,
	"Jim Mattson" <jmattson@google.com>,
	"Dave Young" <dyoung@redhat.com>,
	linux-edac <linux-edac@vger.kernel.org>,
	"Jon Masters" <jcm@redhat.com>,
	"Andy Lutomirski" <luto@kernel.org>,
	"Paolo Bonzini" <pbonzini@redhat.com>,
	"Arnd Bergmann" <arnd@arndb.de>, Linux-MM <linux-mm@kvack.org>,
	"Jiri Olsa" <jolsa@redhat.com>,
	"Van De Ven, Arjan" <arjan.van.de.ven@intel.com>,
	sironi@amazon.de, "Frederic Weisbecker" <fweisbec@gmail.com>,
	"Kyle Huey" <khuey@kylehuey.com>,
	"Alexander Popov" <alpopov@ptsecurity.com>,
	"Andy Shevchenko" <andriy.shevchenko@linux.intel.com>,
	"Nadav Amit" <nadav.amit@gmail.com>,
	"Yazen Ghannam" <Yazen.Ghannam@amd.com>,
	"Wanpeng Li" <kernellwp@gmail.com>,
	"Stephane Eranian" <eranian@google.com>,
	"David Woodhouse" <dwmw2@infradead.org>,
	srivatsab@vmware.com, srinidhir@vmware.com,
	khlebnikov@yandex-team.ru, catalin.marinas@arm.com
Subject: Re: [RESEND] Spectre-v2 (IBPB/IBRS) and SSBD fixes for 4.4.y
Date: Tue, 7 Aug 2018 21:15:31 +0200	[thread overview]
Message-ID: <20180807191531.GA28682@kroah.com> (raw)
In-Reply-To: <824c77d3-93d8-fb90-6eb0-afa4aeef6644@csail.mit.edu>

On Tue, Aug 07, 2018 at 12:08:07PM -0700, Srivatsa S. Bhat wrote:
> Also, upstream commit e01e80634ecdde1 (fork: unconditionally clear
> stack on fork) applies cleanly on 4.14 stable, so it would be great to
> cherry-pick it to 4.14 stable as well.

It is already in the 4.14.60 release, did I somehow mess up the
backport?

thanks,

greg k-h

  reply	other threads:[~2018-08-07 19:15 UTC|newest]

Thread overview: 143+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-07-14  9:25 [RESEND] Spectre-v2 (IBPB/IBRS) and SSBD fixes for 4.4.y Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 001/101] x86/cpufeature: Move some of the scattered feature bits to x86_capability Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 002/101] x86/cpufeature: Cleanup get_cpu_cap() Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 003/101] x86/cpu: Provide a config option to disable static_cpu_has Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 004/101] x86/fpu: Add an XSTATE_OP() macro Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 005/101] x86/fpu: Get rid of xstate_fault() Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 006/101] x86/headers: Don't include asm/processor.h in asm/atomic.h Srivatsa S. Bhat
2018-07-14  9:26 ` [PATCH 4.4.y 007/101] x86/cpufeature: Carve out X86_FEATURE_* Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 008/101] x86/cpufeature: Replace the old static_cpu_has() with safe variant Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 009/101] x86/cpufeature: Get rid of the non-asm goto variant Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 010/101] x86/alternatives: Add an auxilary section Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 011/101] x86/alternatives: Discard dynamic check after init Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 012/101] x86/vdso: Use static_cpu_has() Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 013/101] x86/boot: Simplify kernel load address alignment check Srivatsa S. Bhat
2018-07-14  9:27 ` [PATCH 4.4.y 014/101] x86/cpufeature: Speed up cpu_feature_enabled() Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 015/101] x86/cpufeature, x86/mm/pkeys: Add protection keys related CPUID definitions Srivatsa S. Bhat
2018-07-14  9:28   ` Srivatsa S. Bhat
2018-07-15 11:04   ` Patch "[PATCH 4.4.y 015/101] x86/cpufeature, x86/mm/pkeys: Add protection keys related CPUID definitions" has been added to the 4.4-stable tree gregkh
2018-07-14  9:28 ` [PATCH 4.4.y 016/101] x86/mm/pkeys: Fix mismerge of protection keys CPUID bits Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 018/101] x86/cpufeature, x86/mm/pkeys: Fix broken compile-time disabling of pkeys Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 019/101] x86/cpufeature: Update cpufeaure macros Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 020/101] x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 021/101] x86/cpufeature: Add helper macro for mask check macros Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 022/101] x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 023/101] x86/cpufeatures: Add CPUID_7_EDX CPUID leaf Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 024/101] x86/cpufeatures: Add Intel feature bits for Speculation Control Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 025/101] x86/cpufeatures: Add AMD " Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 026/101] x86/msr: Add definitions for new speculation control MSRs Srivatsa S. Bhat
2018-07-14  9:29 ` [PATCH 4.4.y 027/101] x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 028/101] x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 029/101] x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 030/101] x86/cpufeatures: Clean up Spectre v2 related CPUID flags Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 031/101] x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 032/101] x86/pti: Mark constant arrays as __initconst Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 033/101] x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs Srivatsa S. Bhat
2018-07-14  9:30 ` [PATCH 4.4.y 034/101] x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 035/101] x86/speculation: Update Speculation Control microcode blacklist Srivatsa S. Bhat
2018-07-14  9:31   ` Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 036/101] x86/speculation: Correct Speculation Control microcode blacklist again Srivatsa S. Bhat
2018-07-14  9:31   ` Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 037/101] x86/speculation: Clean up various Spectre related details Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 038/101] x86/speculation: Fix up array_index_nospec_mask() asm constraint Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 039/101] x86/speculation: Add <asm/msr-index.h> dependency Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 040/101] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend Srivatsa S. Bhat
2018-07-23  9:22   ` Patch "x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend" has been added to the 4.4-stable tree gregkh
2018-07-14  9:31 ` [PATCH 4.4.y 040/101] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend Srivatsa S. Bhat
2018-07-14  9:31 ` [PATCH 4.4.y 041/101] x86/mm: Factor out LDT init from context init Srivatsa S. Bhat
2018-07-14  9:31   ` Srivatsa S. Bhat
2018-07-23  9:22   ` Patch "x86/mm: Factor out LDT init from context init" has been added to the 4.4-stable tree gregkh
2018-07-14  9:32 ` [PATCH 4.4.y 042/101] x86/mm: Give each mm TLB flush generation a unique ID Srivatsa S. Bhat
2018-07-14  9:32   ` Srivatsa S. Bhat
2018-07-23  9:22   ` Patch "x86/mm: Give each mm TLB flush generation a unique ID" has been added to the 4.4-stable tree gregkh
2018-07-14  9:32 ` [PATCH 4.4.y 043/101] x86/speculation: Use Indirect Branch Prediction Barrier in context switch Srivatsa S. Bhat
2018-07-14  9:32 ` [PATCH 4.4.y 044/101] x86/spectre_v2: Don't check microcode versions when running under hypervisors Srivatsa S. Bhat
2018-07-14  9:32 ` [PATCH 4.4.y 045/101] x86/speculation: Use IBRS if available before calling into firmware Srivatsa S. Bhat
2018-07-14  9:32 ` [PATCH 4.4.y 046/101] x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP Srivatsa S. Bhat
2018-07-14  9:32 ` [PATCH 4.4.y 047/101] x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 048/101] selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 049/101] selftest/seccomp: Fix the seccomp(2) signature Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 050/101] xen: set cpu capabilities from xen_start_kernel() Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 051/101] x86/amd: don't set X86_BUG_SYSRET_SS_ATTRS when running under Xen Srivatsa S. Bhat
2018-07-14 14:15   ` Juergen Gross
2018-07-16 19:59     ` Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 052/101] x86/nospec: Simplify alternative_msr_write() Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 053/101] x86/bugs: Concentrate bug detection into a separate function Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 054/101] x86/bugs: Concentrate bug reporting " Srivatsa S. Bhat
2018-07-14  9:33 ` [PATCH 4.4.y 055/101] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 056/101] x86/bugs, KVM: Support the combination of guest and host IBRS Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 057/101] x86/cpu: Rename Merrifield2 to Moorefield Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 058/101] x86/cpu/intel: Add Knights Mill to Intel family Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 059/101] x86/bugs: Expose /sys/../spec_store_bypass Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 060/101] x86/cpufeatures: Add X86_FEATURE_RDS Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 061/101] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation Srivatsa S. Bhat
2018-07-14  9:34 ` [PATCH 4.4.y 062/101] x86/bugs/intel: Set proper CPU features and setup RDS Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 063/101] x86/bugs: Whitelist allowed SPEC_CTRL MSR values Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 064/101] x86/bugs/AMD: Add support to disable RDS on Fam[15, 16, 17]h if requested Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 065/101] x86/speculation: Create spec-ctrl.h to avoid include hell Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 066/101] prctl: Add speculation control prctls Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 067/101] x86/process: Optimize TIF checks in __switch_to_xtra() Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 068/101] x86/process: Correct and optimize TIF_BLOCKSTEP switch Srivatsa S. Bhat
2018-07-14  9:35 ` [PATCH 4.4.y 069/101] x86/process: Optimize TIF_NOTSC switch Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 070/101] x86/process: Allow runtime control of Speculative Store Bypass Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 071/101] x86/speculation: Add prctl for Speculative Store Bypass mitigation Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 072/101] nospec: Allow getting/setting on non-current task Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 073/101] proc: Provide details on speculation flaw mitigations Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 074/101] seccomp: Enable " Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 075/101] prctl: Add force disable speculation Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 076/101] seccomp: Use PR_SPEC_FORCE_DISABLE Srivatsa S. Bhat
2018-07-14  9:36 ` [PATCH 4.4.y 077/101] seccomp: Add filter flag to opt-out of SSB mitigation Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 078/101] seccomp: Move speculation migitation control to arch code Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 079/101] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 081/101] proc: Use underscores for SSBD in 'status' Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 082/101] Documentation/spec_ctrl: Do some minor cleanups Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 083/101] x86/bugs: Fix __ssb_select_mitigation() return type Srivatsa S. Bhat
2018-07-14  9:37 ` [PATCH 4.4.y 084/101] x86/bugs: Make cpu_show_common() static Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 085/101] x86/bugs: Fix the parameters alignment and missing void Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 086/101] x86/cpu: Make alternative_msr_write work for 32-bit code Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 087/101] x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 088/101] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 089/101] x86/cpufeatures: Disentangle SSBD enumeration Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 090/101] x86/cpu/AMD: Fix erratum 1076 (CPB bit) Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 091/101] x86/cpufeatures: Add FEATURE_ZEN Srivatsa S. Bhat
2018-07-14  9:38 ` [PATCH 4.4.y 092/101] x86/speculation: Handle HT correctly on AMD Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 093/101] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 094/101] x86/speculation: Add virtualized speculative store bypass disable support Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 095/101] x86/speculation: Rework speculative_store_bypass_update() Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 096/101] x86/bugs: Unify x86_spec_ctrl_{set_guest, restore_host} Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 097/101] x86/bugs: Expose x86_spec_ctrl_base directly Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 098/101] x86/bugs: Remove x86_spec_ctrl_set() Srivatsa S. Bhat
2018-07-14  9:39 ` [PATCH 4.4.y 099/101] x86/bugs: Rework spec_ctrl base and mask logic Srivatsa S. Bhat
2018-07-14  9:40 ` [PATCH 4.4.y 100/101] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG Srivatsa S. Bhat
2018-07-14  9:40 ` [PATCH 4.4.y 101/101] x86/bugs: Rename SSBD_NO to SSB_NO Srivatsa S. Bhat
2018-07-15 11:26 ` [RESEND] Spectre-v2 (IBPB/IBRS) and SSBD fixes for 4.4.y Greg KH
2018-07-15 11:26   ` Greg KH
2018-07-16  8:02   ` Srivatsa S. Bhat
2018-07-16  8:02     ` Srivatsa S. Bhat
2018-07-23 11:26 ` Greg KH
2018-07-23 11:26   ` Greg KH
2018-07-23 17:27   ` Srivatsa S. Bhat
2018-07-23 17:27     ` Srivatsa S. Bhat
2018-07-23 22:06 ` Jiri Kosina
2018-07-24 20:13   ` Srivatsa S. Bhat
2018-07-24 20:13     ` Srivatsa S. Bhat
2018-07-24 22:02     ` Jiri Kosina
2018-07-24 22:02       ` Jiri Kosina
2018-07-26 23:09       ` Kees Cook
2018-07-26 23:09         ` Kees Cook
2018-08-02 19:22         ` Srivatsa S. Bhat
2018-08-02 19:22           ` Srivatsa S. Bhat
2018-08-02 22:22           ` Kees Cook
2018-08-02 22:22             ` Kees Cook
2018-08-03 23:20             ` Srivatsa S. Bhat
2018-08-03 23:20               ` Srivatsa S. Bhat
2018-08-07 13:49               ` Greg KH
2018-08-07 13:49                 ` Greg KH
2018-08-07 19:08                 ` Srivatsa S. Bhat
2018-08-07 19:08                   ` Srivatsa S. Bhat
2018-08-07 19:15                   ` Greg KH [this message]
2018-08-07 19:15                     ` Greg KH
2018-08-07 19:19                     ` Srivatsa S. Bhat
2018-08-07 19:19                       ` Srivatsa S. Bhat
  -- strict thread matches above, loose matches on Subject: below --
2018-07-14  9:28 [4.4.y,017/101] x86/cpu: Add detection of AMD RAS Capabilities Srivatsa S. Bhat
2018-07-14  9:28 ` [PATCH 4.4.y 017/101] " Srivatsa S. Bhat

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180807191531.GA28682@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=ak@linux.intel.com \
    --cc=akpm@linux-foundation.org \
    --cc=arjan.van.de.ven@intel.com \
    --cc=brgerst@gmail.com \
    --cc=catalin.marinas@arm.com \
    --cc=dave@sr71.net \
    --cc=dwmw@amazon.co.uk \
    --cc=joe.konno@linux.intel.com \
    --cc=kernellwp@gmail.com \
    --cc=labbott@fedoraproject.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-tip-commits@vger.kernel.org \
    --cc=luto@kernel.org \
    --cc=mgorman@suse.de \
    --cc=mic@digikod.net \
    --cc=piotr.luc@intel.com \
    --cc=qianyue.zj@alibaba-inc.com \
    --cc=sergeev917@gmail.com \
    --cc=srinidhir@vmware.com \
    --cc=srivatsa@csail.mit.edu \
    --cc=tglx@linutronix.de \
    --cc=torvalds@linux-foundation.org \
    --cc=wad@chromium.org \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.