stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-02-05 17:39:03 to 2018-02-05 19:26:59 UTC [more...]

[PATCH 4.4-stable v3] kaiser: Set _PAGE_NX only if supported
 2018-02-05 19:26 UTC  (3+ messages)
` [PATCH 3.16-stable 1/2] "

[PATCH 3.16-stable 0/5] Add PVCLOCK_FIXMAP user mapping
 2018-02-05 18:50 UTC  (4+ messages)
` [PATCH 3.16-stable 3/5] x86/kaiser: Fix segfaults caused by the "

[PATCH] rtlwifi: rtl8821ae: Fix connection lost problem correctly
 2018-02-05 18:38 UTC 

[PATCH 3.18 00/36] 3.18.94-stable review
 2018-02-05 18:24 UTC  (31+ messages)
` [PATCH 3.18 01/36] Input: do not emit unneeded EV_SYN when suspending
` [PATCH 3.18 02/36] um: link vmlinux with -no-pie
` [PATCH 3.18 03/36] um: Stop abusing __KERNEL__
` [PATCH 3.18 04/36] um: Remove copy&paste code from init.h
` [PATCH 3.18 06/36] ALSA: seq: Make ioctls race-free
` [PATCH 3.18 07/36] gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
` [PATCH 3.18 08/36] igb: Free IRQs when device is hotplugged
` [PATCH 3.18 12/36] bcache: check return value of register_shrinker
` [PATCH 3.18 13/36] mac80211: fix the update of path metric for RANN frame
` [PATCH 3.18 15/36] xen-netfront: remove warning when unloading module
` [PATCH 3.18 16/36] nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x>0)
` [PATCH 3.18 17/36] nfsd: check for use of the closed special stateid
` [PATCH 3.18 18/36] hwmon: (pmbus) Use 64bit math for DIRECT format values
` [PATCH 3.18 19/36] net: ethernet: xilinx: Mark XILINX_LL_TEMAC broken on 64-bit
` [PATCH 3.18 20/36] quota: Check for register_shrinker() failure
` [PATCH 3.18 21/36] scsi: ufs: ufshcd: fix potential NULL pointer dereference in ufshcd_config_vreg
` [PATCH 3.18 22/36] media: usbtv: add a new usbid
` [PATCH 3.18 23/36] usb: gadget: dont dereference g until after it has been null checked
` [PATCH 3.18 24/36] staging: rtl8188eu: Fix incorrect response to SIOCGIWESSID
` [PATCH 3.18 26/36] USB: cdc-acm: Do not log urb submission errors on disconnect
` [PATCH 3.18 27/36] CDC-ACM: apply quirk for card reader
` [PATCH 3.18 28/36] USB: serial: io_edgeport: fix possible sleep-in-atomic
` [PATCH 3.18 29/36] usbip: prevent bind loops on devices attached to vhci_hcd
` [PATCH 3.18 30/36] usbip: list: dont list "
` [PATCH 3.18 31/36] USB: serial: simple: add Motorola Tetra driver
` [PATCH 3.18 32/36] usb: f_fs: Prevent gadget unbind if it is already unbound
` [PATCH 3.18 33/36] usb: uas: unconditionally bring back host after reset
` [PATCH 3.18 34/36] selinux: general protection fault in sock_has_perm
` [PATCH 3.18 35/36] spi: imx: do not access registers while clocks disabled
` [PATCH 3.18 36/36] ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE

[PATCH 4.15 00/60] 4.15.2-stable review
 2018-02-05 18:23 UTC  (57+ messages)
` [PATCH 4.15 01/60] KVM: x86: Make indirect calls in emulator speculation safe
` [PATCH 4.15 02/60] KVM: VMX: Make indirect call "
` [PATCH 4.15 03/60] module/retpoline: Warn about missing retpoline in module
` [PATCH 4.15 04/60] x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
` [PATCH 4.15 05/60] x86/cpufeatures: Add Intel feature bits for Speculation Control
` [PATCH 4.15 06/60] x86/cpufeatures: Add AMD "
` [PATCH 4.15 07/60] x86/msr: Add definitions for new speculation control MSRs
` [PATCH 4.15 08/60] x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
` [PATCH 4.15 09/60] x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
` [PATCH 4.15 10/60] x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
` [PATCH 4.15 11/60] x86/alternative: Print unadorned pointers
` [PATCH 4.15 12/60] x86/nospec: Fix header guards names
` [PATCH 4.15 13/60] x86/bugs: Drop one "mitigation" from dmesg
` [PATCH 4.15 15/60] x86/cpufeatures: Clean up Spectre v2 related CPUID flags
` [PATCH 4.15 16/60] x86/retpoline: Simplify vmexit_fill_RSB()
` [PATCH 4.15 17/60] x86/speculation: Simplify indirect_branch_prediction_barrier()
` [PATCH 4.15 18/60] auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
` [PATCH 4.15 19/60] iio: adc/accel: Fix up module licenses
` [PATCH 4.15 20/60] pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
` [PATCH 4.15 21/60] ASoC: pcm512x: "
` [PATCH 4.15 23/60] KVM: VMX: introduce alloc_loaded_vmcs
` [PATCH 4.15 24/60] objtool: Improve retpoline alternative handling
` [PATCH 4.15 25/60] objtool: Add support for alternatives at the end of a section
` [PATCH 4.15 26/60] objtool: Warn on stripped section symbol
` [PATCH 4.15 27/60] x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP
` [PATCH 4.15 28/60] x86/spectre: Check CONFIG_RETPOLINE in command line parser
` [PATCH 4.15 29/60] x86/entry/64: Remove the SYSCALL64 fast path
` [PATCH 4.15 30/60] x86/entry/64: Push extra regs right away
` [PATCH 4.15 31/60] x86/asm: Move status from thread_struct to thread_info
` [PATCH 4.15 32/60] Documentation: Document array_index_nospec
` [PATCH 4.15 33/60] array_index_nospec: Sanitize speculative array de-references
` [PATCH 4.15 34/60] x86: Implement array_index_mask_nospec
` [PATCH 4.15 35/60] x86: Introduce barrier_nospec
` [PATCH 4.15 36/60] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 4.15 37/60] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
` [PATCH 4.15 38/60] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 4.15 39/60] x86/get_user: Use pointer masking to limit speculation
` [PATCH 4.15 40/60] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 4.15 41/60] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 4.15 42/60] nl80211: Sanitize array index in parse_txq_params
` [PATCH 4.15 43/60] x86/spectre: Report get_user mitigation for spectre_v1
` [PATCH 4.15 44/60] x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
` [PATCH 4.15 45/60] x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
` [PATCH 4.15 47/60] x86/paravirt: Remove noreplace-paravirt cmdline option
` [PATCH 4.15 48/60] KVM: VMX: make MSR bitmaps per-VCPU
` [PATCH 4.15 49/60] x86/kvm: Update spectre-v1 mitigation
` [PATCH 4.15 50/60] x86/retpoline: Avoid retpolines for built-in __init functions
` [PATCH 4.15 51/60] x86/spectre: Simplify spectre_v2 command line parsing
` [PATCH 4.15 52/60] x86/pti: Mark constant arrays as __initconst
` [PATCH 4.15 53/60] x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL
` [PATCH 4.15 55/60] KVM/x86: Add IBPB support
` [PATCH 4.15 56/60] KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
` [PATCH 4.15 57/60] KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
` [PATCH 4.15 58/60] KVM/SVM: "
` [PATCH 4.15 59/60] serial: core: mark port as initialized after successful IRQ change
` [PATCH 4.15 60/60] fpga: region: release of_parse_phandle nodes after use

[PATCH 4.14 00/64] 4.14.18-stable review
 2018-02-05 18:23 UTC  (61+ messages)
` [PATCH 4.14 01/64] scripts/faddr2line: fix CROSS_COMPILE unset error
` [PATCH 4.14 02/64] powerpc/64s: Wire up cpu_show_meltdown()
` [PATCH 4.14 03/64] powerpc/64s: Allow control of RFI flush via debugfs
` [PATCH 4.14 04/64] x86/retpoline: Remove the esp/rsp thunk
` [PATCH 4.14 05/64] KVM: x86: Make indirect calls in emulator speculation safe
` [PATCH 4.14 06/64] KVM: VMX: Make indirect call "
` [PATCH 4.14 07/64] module/retpoline: Warn about missing retpoline in module
` [PATCH 4.14 08/64] x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
` [PATCH 4.14 09/64] x86/cpufeatures: Add Intel feature bits for Speculation Control
` [PATCH 4.14 10/64] x86/cpufeatures: Add AMD "
` [PATCH 4.14 11/64] x86/msr: Add definitions for new speculation control MSRs
` [PATCH 4.14 12/64] x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
` [PATCH 4.14 13/64] x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
` [PATCH 4.14 14/64] x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
` [PATCH 4.14 15/64] x86/alternative: Print unadorned pointers
` [PATCH 4.14 16/64] x86/nospec: Fix header guards names
` [PATCH 4.14 17/64] x86/bugs: Drop one "mitigation" from dmesg
` [PATCH 4.14 19/64] x86/cpufeatures: Clean up Spectre v2 related CPUID flags
` [PATCH 4.14 20/64] x86/retpoline: Simplify vmexit_fill_RSB()
` [PATCH 4.14 21/64] x86/speculation: Simplify indirect_branch_prediction_barrier()
` [PATCH 4.14 22/64] auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
` [PATCH 4.14 23/64] iio: adc/accel: Fix up module licenses
` [PATCH 4.14 24/64] pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
` [PATCH 4.14 25/64] ASoC: pcm512x: "
` [PATCH 4.14 27/64] KVM: VMX: introduce alloc_loaded_vmcs
` [PATCH 4.14 28/64] objtool: Improve retpoline alternative handling
` [PATCH 4.14 29/64] objtool: Add support for alternatives at the end of a section
` [PATCH 4.14 30/64] objtool: Warn on stripped section symbol
` [PATCH 4.14 31/64] x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP
` [PATCH 4.14 32/64] x86/spectre: Check CONFIG_RETPOLINE in command line parser
` [PATCH 4.14 33/64] x86/entry/64: Remove the SYSCALL64 fast path
` [PATCH 4.14 34/64] x86/entry/64: Push extra regs right away
` [PATCH 4.14 35/64] x86/asm: Move status from thread_struct to thread_info
` [PATCH 4.14 36/64] Documentation: Document array_index_nospec
` [PATCH 4.14 37/64] array_index_nospec: Sanitize speculative array de-references
` [PATCH 4.14 38/64] x86: Implement array_index_mask_nospec
` [PATCH 4.14 39/64] x86: Introduce barrier_nospec
` [PATCH 4.14 40/64] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 4.14 41/64] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
` [PATCH 4.14 42/64] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 4.14 43/64] x86/get_user: Use pointer masking to limit speculation
` [PATCH 4.14 44/64] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 4.14 45/64] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 4.14 46/64] nl80211: Sanitize array index in parse_txq_params
` [PATCH 4.14 47/64] x86/spectre: Report get_user mitigation for spectre_v1
` [PATCH 4.14 48/64] x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
` [PATCH 4.14 49/64] x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
` [PATCH 4.14 51/64] x86/paravirt: Remove noreplace-paravirt cmdline option
` [PATCH 4.14 52/64] KVM: VMX: make MSR bitmaps per-VCPU
` [PATCH 4.14 53/64] x86/kvm: Update spectre-v1 mitigation
` [PATCH 4.14 54/64] x86/retpoline: Avoid retpolines for built-in __init functions
` [PATCH 4.14 55/64] x86/spectre: Simplify spectre_v2 command line parsing
` [PATCH 4.14 56/64] x86/pti: Mark constant arrays as __initconst
` [PATCH 4.14 57/64] x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL
` [PATCH 4.14 59/64] KVM/x86: Add IBPB support
` [PATCH 4.14 60/64] KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
` [PATCH 4.14 61/64] KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
` [PATCH 4.14 62/64] KVM/SVM: "
` [PATCH 4.14 63/64] serial: core: mark port as initialized after successful IRQ change
` [PATCH 4.14 64/64] fpga: region: release of_parse_phandle nodes after use

Patch "serial: core: mark port as initialized after successful IRQ change" has been added to the 4.9-stable tree
 2018-02-05 18:01 UTC 

[PATCH 4.4 v2 0/2] Backports for fixes
 2018-02-05 18:01 UTC  (5+ messages)
` [PATCH 4.4 v2 1/2] usbip: vhci_hcd: clear just the USB_PORT_STAT_POWER bit
  ` Patch "usbip: vhci_hcd: clear just the USB_PORT_STAT_POWER bit" has been added to the 4.4-stable tree
` [PATCH 4.4 v2 2/2] usbip: fix 3eee23c3ec14 tcp_socket address still in the status file
  ` Patch "usbip: fix 3eee23c3ec14 tcp_socket address still in the status file" has been added to the 4.4-stable tree

Patch "serial: core: mark port as initialized after successful IRQ change" has been added to the 4.15-stable tree
 2018-02-05 18:00 UTC 

Patch "fpga: region: release of_parse_phandle nodes after use" has been added to the 4.15-stable tree
 2018-02-05 18:00 UTC 

Patch "serial: core: mark port as initialized after successful IRQ change" has been added to the 4.14-stable tree
 2018-02-05 18:00 UTC 

Patch "fpga: region: release of_parse_phandle nodes after use" has been added to the 4.14-stable tree
 2018-02-05 18:00 UTC 

[PATCH] net: cdc_ncm: initialize drvflags before usage
 2018-02-05 17:56 UTC  (2+ messages)

[PATCH 4.4.y] ASoC: simple-card: Fix misleading error message
 2018-02-05 17:53 UTC  (2+ messages)

Patch "x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/speculation: Use Indirect Branch Prediction Barrier in context switch" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/syscall: Sanitize syscall table de-references under speculation" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/retpoline: Avoid retpolines for built-in __init functions" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/spectre: Report get_user mitigation for spectre_v1" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/spectre: Simplify spectre_v2 command line parsing" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/spectre: Check CONFIG_RETPOLINE in command line parser" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/paravirt: Remove 'noreplace-paravirt' cmdline option" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/pti: Mark constant arrays as __initconst" has been added to the 4.15-stable tree
 2018-02-05 17:39 UTC 

Patch "x86/get_user: Use pointer masking to limit speculation" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "x86/entry/64: Push extra regs right away" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "x86/kvm: Update spectre-v1 mitigation" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "x86/entry/64: Remove the SYSCALL64 fast path" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "x86/asm: Move 'status' from thread_struct to thread_info" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "x86: Introduce barrier_nospec" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "x86: Implement array_index_mask_nospec" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "objtool: Warn on stripped section symbol" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "vfs, fdtable: Prevent bounds-check bypass via speculative execution" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "objtool: Add support for alternatives at the end of a section" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "objtool: Improve retpoline alternative handling" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "nl80211: Sanitize array index in parse_txq_params" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "array_index_nospec: Sanitize speculative array de-references" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "KVM/x86: Add IBPB support" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "KVM: VMX: make MSR bitmaps per-VCPU" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "KVM: nVMX: Eliminate vmcs02 pool" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "KVM: VMX: introduce alloc_loaded_vmcs" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 

Patch "Documentation: Document array_index_nospec" has been added to the 4.15-stable tree
 2018-02-05 17:38 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).