stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-05-21 21:11:42 to 2018-05-21 21:24:40 UTC [more...]

[PATCH 4.16 000/110] 4.16.11-stable review
 2018-05-21 21:12 UTC  (51+ messages)
` [PATCH 4.16 001/110] xhci: Fix USB3 NULL pointer dereference at logical disconnect
` [PATCH 4.16 002/110] usbip: usbip_host: refine probe and disconnect debug msgs to be useful
` [PATCH 4.16 006/110] usbip: usbip_host: fix bad unlock balance during stub_probe()
` [PATCH 4.16 010/110] ALSA: control: fix a redundant-copy issue
` [PATCH 4.16 011/110] spi: pxa2xx: Allow 64-bit DMA
` [PATCH 4.16 013/110] spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL
` [PATCH 4.16 015/110] KVM: arm/arm64: Properly protect VGIC locks from IRQs
` [PATCH 4.16 016/110] KVM: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity
` [PATCH 4.16 019/110] hwmon: (k10temp) Fix reading critical temperature register
` [PATCH 4.16 020/110] hwmon: (k10temp) Use API function to access System Management Network
` [PATCH 4.16 021/110] vfio: ccw: fix cleanup if cp_prefetch fails
` [PATCH 4.16 023/110] vsprintf: Replace memory barrier with static_key for random_ptr_key update
` [PATCH 4.16 026/110] netfilter: nf_tables: free set name in error path
` [PATCH 4.16 027/110] netfilter: nf_tables: cant fail after linking rule into active rule list
` [PATCH 4.16 029/110] ARM64: dts: marvell: armada-cp110: Add clocks for the xmdio node
` [PATCH 4.16 030/110] ARM64: dts: marvell: armada-cp110: Add mg_core_clk for ethernet node
` [PATCH 4.16 038/110] mm: dont allow deferred pages with NEED_PER_CPU_KM
` [PATCH 4.16 039/110] drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk
` [PATCH 4.16 040/110] s390/qdio: fix access to uninitialized qdio_q fields
` [PATCH 4.16 042/110] s390/qdio: dont release memory in qdio_setup_irq()
` [PATCH 4.16 043/110] s390: remove indirect branch from do_softirq_own_stack
` [PATCH 4.16 044/110] bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n
` [PATCH 4.16 045/110] x86/pkeys: Override pkey when moving away from PROT_EXEC
` [PATCH 4.16 046/110] x86/pkeys: Do not special case protection key 0
` [PATCH 4.16 047/110] efi: Avoid potential crashes, fix the struct efi_pci_io_protocol_32 definition for mixed mode
` [PATCH 4.16 048/110] ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr
` [PATCH 4.16 049/110] x86/apic/x2apic: Initialize cluster ID properly
` [PATCH 4.16 050/110] x86/mm: Drop TS_COMPAT on 64-bit exec() syscall
` [PATCH 4.16 051/110] tick/broadcast: Use for_each_cpu() specially on UP kernels
` [PATCH 4.16 052/110] ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed
` [PATCH 4.16 053/110] ARM: 8770/1: kprobes: Prohibit probing on optimized_callback
` [PATCH 4.16 054/110] ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions
` [PATCH 4.16 055/110] Btrfs: fix xattr loss after power failure
` [PATCH 4.16 056/110] Btrfs: send, fix invalid access to commit roots due to concurrent snapshotting
` [PATCH 4.16 057/110] btrfs: property: Set incompat flag if lzo/zstd compression is set
` [PATCH 4.16 058/110] btrfs: fix crash when trying to resume balance without the resume flag
` [PATCH 4.16 063/110] x86/bugs: Concentrate bug detection into a separate function
` [PATCH 4.16 064/110] x86/bugs: Concentrate bug reporting "
` [PATCH 4.16 069/110] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
` [PATCH 4.16 071/110] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.16 075/110] prctl: Add speculation control prctls
` [PATCH 4.16 079/110] proc: Provide details on speculation flaw mitigations
` [PATCH 4.16 081/110] x86/bugs: Make boot modes __ro_after_init
` [PATCH 4.16 086/110] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
` [PATCH 4.16 094/110] KVM: SVM: Move spec control call after restore of GS
` [PATCH 4.16 096/110] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
` [PATCH 4.16 097/110] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.16 100/110] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
` [PATCH 4.16 101/110] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.16 109/110] x86/bugs: Rename SSBD_NO to SSB_NO

[PATCH 4.14 00/95] 4.14.43-stable review
 2018-05-21 21:12 UTC  (83+ messages)
` [PATCH 4.14 02/95] usbip: usbip_host: delete device from busid_table after rebind
` [PATCH 4.14 04/95] usbip: usbip_host: fix NULL-ptr deref and use-after-free errors
` [PATCH 4.14 05/95] usbip: usbip_host: fix bad unlock balance during stub_probe()
` [PATCH 4.14 06/95] ALSA: usb: mixer: volume quirk for CM102-A+/102S+
` [PATCH 4.14 07/95] ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist
` [PATCH 4.14 08/95] ALSA: control: fix a redundant-copy issue
` [PATCH 4.14 09/95] spi: pxa2xx: Allow 64-bit DMA
` [PATCH 4.14 10/95] spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master
` [PATCH 4.14 11/95] spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL
` [PATCH 4.14 12/95] KVM: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls
` [PATCH 4.14 14/95] powerpc: Dont preempt_disable() in show_cpuinfo()
` [PATCH 4.14 15/95] vfio: ccw: fix cleanup if cp_prefetch fails
` [PATCH 4.14 16/95] tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all}
` [PATCH 4.14 17/95] tee: shm: fix use-after-free via temporarily dropped reference
` [PATCH 4.14 18/95] netfilter: nf_tables: free set name in error path
` [PATCH 4.14 19/95] netfilter: nf_tables: cant fail after linking rule into active rule list
` [PATCH 4.14 20/95] netfilter: nf_socket: Fix out of bounds access in nf_sk_lookup_slow_v{4,6}
` [PATCH 4.14 23/95] drm: Match sysfs name in link removal to link creation
` [PATCH 4.14 24/95] lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly
` [PATCH 4.14 25/95] radix tree: fix multi-order iteration race
` [PATCH 4.14 26/95] mm: dont allow deferred pages with NEED_PER_CPU_KM
` [PATCH 4.14 27/95] drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk
` [PATCH 4.14 28/95] s390/qdio: fix access to uninitialized qdio_q fields
` [PATCH 4.14 29/95] s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero
` [PATCH 4.14 30/95] s390/qdio: dont release memory in qdio_setup_irq()
` [PATCH 4.14 34/95] efi: Avoid potential crashes, fix the struct efi_pci_io_protocol_32 definition for mixed mode
` [PATCH 4.14 35/95] ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr
` [PATCH 4.14 37/95] tick/broadcast: Use for_each_cpu() specially on UP kernels
` [PATCH 4.14 38/95] ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed
` [PATCH 4.14 39/95] ARM: 8770/1: kprobes: Prohibit probing on optimized_callback
` [PATCH 4.14 41/95] Btrfs: fix xattr loss after power failure
` [PATCH 4.14 42/95] Btrfs: send, fix invalid access to commit roots due to concurrent snapshotting
` [PATCH 4.14 43/95] btrfs: property: Set incompat flag if lzo/zstd compression is set
` [PATCH 4.14 44/95] btrfs: fix crash when trying to resume balance without the resume flag
` [PATCH 4.14 45/95] btrfs: Split btrfs_del_delalloc_inode into 2 functions
` [PATCH 4.14 47/95] btrfs: fix reading stale metadata blocks after degraded raid1 mounts
` [PATCH 4.14 48/95] x86/nospec: Simplify alternative_msr_write()
` [PATCH 4.14 49/95] x86/bugs: Concentrate bug detection into a separate function
` [PATCH 4.14 50/95] x86/bugs: Concentrate bug reporting "
` [PATCH 4.14 52/95] x86/bugs, KVM: Support the combination of guest and host IBRS
` [PATCH 4.14 53/95] x86/bugs: Expose /sys/../spec_store_bypass
` [PATCH 4.14 54/95] x86/cpufeatures: Add X86_FEATURE_RDS
` [PATCH 4.14 55/95] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
` [PATCH 4.14 56/95] x86/bugs/intel: Set proper CPU features and setup RDS
` [PATCH 4.14 57/95] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.14 58/95] x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
` [PATCH 4.14 59/95] x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
` [PATCH 4.14 60/95] x86/speculation: Create spec-ctrl.h to avoid include hell
` [PATCH 4.14 61/95] prctl: Add speculation control prctls
` [PATCH 4.14 62/95] x86/process: Allow runtime control of Speculative Store Bypass
` [PATCH 4.14 63/95] x86/speculation: Add prctl for Speculative Store Bypass mitigation
` [PATCH 4.14 64/95] nospec: Allow getting/setting on non-current task
` [PATCH 4.14 65/95] proc: Provide details on speculation flaw mitigations
` [PATCH 4.14 66/95] seccomp: Enable "
` [PATCH 4.14 67/95] x86/bugs: Make boot modes __ro_after_init
` [PATCH 4.14 68/95] prctl: Add force disable speculation
` [PATCH 4.14 69/95] seccomp: Use PR_SPEC_FORCE_DISABLE
` [PATCH 4.14 70/95] seccomp: Add filter flag to opt-out of SSB mitigation
` [PATCH 4.14 71/95] seccomp: Move speculation migitation control to arch code
` [PATCH 4.14 72/95] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
` [PATCH 4.14 73/95] x86/bugs: Rename _RDS to _SSBD
` [PATCH 4.14 74/95] proc: Use underscores for SSBD in status
` [PATCH 4.14 75/95] Documentation/spec_ctrl: Do some minor cleanups
` [PATCH 4.14 76/95] x86/bugs: Fix __ssb_select_mitigation() return type
` [PATCH 4.14 77/95] x86/bugs: Make cpu_show_common() static
` [PATCH 4.14 78/95] x86/bugs: Fix the parameters alignment and missing void
` [PATCH 4.14 79/95] x86/cpu: Make alternative_msr_write work for 32-bit code
` [PATCH 4.14 80/95] KVM: SVM: Move spec control call after restore of GS
` [PATCH 4.14 82/95] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
` [PATCH 4.14 83/95] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.14 84/95] x86/cpufeatures: Add FEATURE_ZEN
` [PATCH 4.14 85/95] x86/speculation: Handle HT correctly on AMD
` [PATCH 4.14 86/95] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
` [PATCH 4.14 87/95] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.14 88/95] x86/speculation: Rework speculative_store_bypass_update()
` [PATCH 4.14 89/95] x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
` [PATCH 4.14 90/95] x86/bugs: Expose x86_spec_ctrl_base directly
` [PATCH 4.14 91/95] x86/bugs: Remove x86_spec_ctrl_set()
` [PATCH 4.14 92/95] x86/bugs: Rework spec_ctrl base and mask logic
` [PATCH 4.14 93/95] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
` [PATCH 4.14 94/95] KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
` [PATCH 4.14 95/95] x86/bugs: Rename SSBD_NO to SSB_NO

[PATCH 4.9 00/87] 4.9.102-stable review
 2018-05-21 21:12 UTC  (67+ messages)
` [PATCH 4.9 01/87] usbip: usbip_host: refine probe and disconnect debug msgs to be useful
` [PATCH 4.9 02/87] usbip: usbip_host: delete device from busid_table after rebind
` [PATCH 4.9 05/87] usbip: usbip_host: fix bad unlock balance during stub_probe()
` [PATCH 4.9 06/87] ALSA: usb: mixer: volume quirk for CM102-A+/102S+
` [PATCH 4.9 07/87] ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist
` [PATCH 4.9 08/87] ALSA: control: fix a redundant-copy issue
` [PATCH 4.9 09/87] spi: pxa2xx: Allow 64-bit DMA
` [PATCH 4.9 10/87] spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master
` [PATCH 4.9 11/87] spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL
` [PATCH 4.9 12/87] KVM: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock
` [PATCH 4.9 13/87] powerpc: Dont preempt_disable() in show_cpuinfo()
` [PATCH 4.9 14/87] signals: avoid unnecessary taking of sighand->siglock
` [PATCH 4.9 15/87] tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all}
` [PATCH 4.9 16/87] netfilter: nf_tables: cant fail after linking rule into active rule list
` [PATCH 4.9 19/87] mm: dont allow deferred pages with NEED_PER_CPU_KM
` [PATCH 4.9 20/87] s390/qdio: fix access to uninitialized qdio_q fields
` [PATCH 4.9 21/87] s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero
` [PATCH 4.9 22/87] s390/qdio: dont release memory in qdio_setup_irq()
` [PATCH 4.9 23/87] s390: remove indirect branch from do_softirq_own_stack
` [PATCH 4.9 26/87] efi: Avoid potential crashes, fix the struct efi_pci_io_protocol_32 definition for mixed mode
` [PATCH 4.9 28/87] tick/broadcast: Use for_each_cpu() specially on UP kernels
` [PATCH 4.9 29/87] ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed
` [PATCH 4.9 31/87] ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions
` [PATCH 4.9 32/87] Btrfs: fix xattr loss after power failure
` [PATCH 4.9 39/87] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
` [PATCH 4.9 40/87] x86/bugs, KVM: Support the combination of guest and host IBRS
` [PATCH 4.9 41/87] x86/bugs: Expose /sys/../spec_store_bypass
` [PATCH 4.9 42/87] x86/cpufeatures: Add X86_FEATURE_RDS
` [PATCH 4.9 43/87] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
` [PATCH 4.9 44/87] x86/bugs/intel: Set proper CPU features and setup RDS
` [PATCH 4.9 45/87] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.9 46/87] x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
` [PATCH 4.9 49/87] prctl: Add speculation control prctls
` [PATCH 4.9 51/87] x86/process: Correct and optimize TIF_BLOCKSTEP switch
` [PATCH 4.9 54/87] x86/speculation: Add prctl for Speculative Store Bypass mitigation
` [PATCH 4.9 55/87] nospec: Allow getting/setting on non-current task
` [PATCH 4.9 56/87] proc: Provide details on speculation flaw mitigations
` [PATCH 4.9 57/87] seccomp: Enable "
` [PATCH 4.9 58/87] x86/bugs: Make boot modes __ro_after_init
` [PATCH 4.9 59/87] prctl: Add force disable speculation
` [PATCH 4.9 61/87] seccomp: Add filter flag to opt-out of SSB mitigation
` [PATCH 4.9 62/87] seccomp: Move speculation migitation control to arch code
` [PATCH 4.9 63/87] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
` [PATCH 4.9 64/87] x86/bugs: Rename _RDS to _SSBD
` [PATCH 4.9 65/87] proc: Use underscores for SSBD in status
` [PATCH 4.9 66/87] Documentation/spec_ctrl: Do some minor cleanups
` [PATCH 4.9 67/87] x86/bugs: Fix __ssb_select_mitigation() return type
` [PATCH 4.9 68/87] x86/bugs: Make cpu_show_common() static
` [PATCH 4.9 69/87] x86/bugs: Fix the parameters alignment and missing void
` [PATCH 4.9 70/87] x86/cpu: Make alternative_msr_write work for 32-bit code
` [PATCH 4.9 71/87] KVM: SVM: Move spec control call after restore of GS
` [PATCH 4.9 73/87] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
` [PATCH 4.9 74/87] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.9 75/87] x86/cpu/AMD: Fix erratum 1076 (CPB bit)
` [PATCH 4.9 76/87] x86/cpufeatures: Add FEATURE_ZEN
` [PATCH 4.9 77/87] x86/speculation: Handle HT correctly on AMD
` [PATCH 4.9 78/87] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
` [PATCH 4.9 79/87] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.9 80/87] x86/speculation: Rework speculative_store_bypass_update()
` [PATCH 4.9 81/87] x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
` [PATCH 4.9 82/87] x86/bugs: Expose x86_spec_ctrl_base directly
` [PATCH 4.9 83/87] x86/bugs: Remove x86_spec_ctrl_set()
` [PATCH 4.9 84/87] x86/bugs: Rework spec_ctrl base and mask logic
` [PATCH 4.9 85/87] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
` [PATCH 4.9 86/87] KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
` [PATCH 4.9 87/87] x86/bugs: Rename SSBD_NO to SSB_NO


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).