stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-07-12 17:02:54 to 2018-07-14 09:52:31 UTC [more...]

[PATCH 4.4.y 001/101] x86/cpufeature: Move some of the scattered feature bits to x86_capability
 2018-07-14  9:33 UTC  (55+ messages)
` [PATCH 4.4.y 002/101] x86/cpufeature: Cleanup get_cpu_cap()
` [PATCH 4.4.y 003/101] x86/cpu: Provide a config option to disable static_cpu_has
` [PATCH 4.4.y 004/101] x86/fpu: Add an XSTATE_OP() macro
` [PATCH 4.4.y 005/101] x86/fpu: Get rid of xstate_fault()
` [PATCH 4.4.y 006/101] x86/headers: Don't include asm/processor.h in asm/atomic.h
` [PATCH 4.4.y 007/101] x86/cpufeature: Carve out X86_FEATURE_*
` [PATCH 4.4.y 008/101] x86/cpufeature: Replace the old static_cpu_has() with safe variant
` [PATCH 4.4.y 009/101] x86/cpufeature: Get rid of the non-asm goto variant
` [PATCH 4.4.y 010/101] x86/alternatives: Add an auxilary section
` [PATCH 4.4.y 011/101] x86/alternatives: Discard dynamic check after init
` [PATCH 4.4.y 012/101] x86/vdso: Use static_cpu_has()
` [PATCH 4.4.y 013/101] x86/boot: Simplify kernel load address alignment check
` [PATCH 4.4.y 014/101] x86/cpufeature: Speed up cpu_feature_enabled()
` [PATCH 4.4.y 015/101] x86/cpufeature, x86/mm/pkeys: Add protection keys related CPUID definitions
` [PATCH 4.4.y 016/101] x86/mm/pkeys: Fix mismerge of protection keys CPUID bits
` [PATCH 4.4.y 017/101] x86/cpu: Add detection of AMD RAS Capabilities
` [PATCH 4.4.y 018/101] x86/cpufeature, x86/mm/pkeys: Fix broken compile-time disabling of pkeys
` [PATCH 4.4.y 019/101] x86/cpufeature: Update cpufeaure macros
` [PATCH 4.4.y 020/101] x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated
` [PATCH 4.4.y 021/101] x86/cpufeature: Add helper macro for mask check macros
` [PATCH 4.4.y 022/101] x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6
` [PATCH 4.4.y 023/101] x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
` [PATCH 4.4.y 024/101] x86/cpufeatures: Add Intel feature bits for Speculation Control
` [PATCH 4.4.y 025/101] x86/cpufeatures: Add AMD "
` [PATCH 4.4.y 026/101] x86/msr: Add definitions for new speculation control MSRs
` [PATCH 4.4.y 027/101] x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
` [PATCH 4.4.y 028/101] x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
` [PATCH 4.4.y 029/101] x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
` [PATCH 4.4.y 030/101] x86/cpufeatures: Clean up Spectre v2 related CPUID flags
` [PATCH 4.4.y 031/101] x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
` [PATCH 4.4.y 032/101] x86/pti: Mark constant arrays as __initconst
` [PATCH 4.4.y 033/101] x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs
` [PATCH 4.4.y 034/101] x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface
` [PATCH 4.4.y 035/101] x86/speculation: Update Speculation Control microcode blacklist
` [PATCH 4.4.y 036/101] x86/speculation: Correct Speculation Control microcode blacklist again
` [PATCH 4.4.y 037/101] x86/speculation: Clean up various Spectre related details
` [PATCH 4.4.y 038/101] x86/speculation: Fix up array_index_nospec_mask() asm constraint
` [PATCH 4.4.y 039/101] x86/speculation: Add <asm/msr-index.h> dependency
` [PATCH 4.4.y 040/101] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend
` [PATCH 4.4.y 041/101] x86/mm: Factor out LDT init from context init
` [PATCH 4.4.y 042/101] x86/mm: Give each mm TLB flush generation a unique ID
` [PATCH 4.4.y 043/101] x86/speculation: Use Indirect Branch Prediction Barrier in context switch
` [PATCH 4.4.y 044/101] x86/spectre_v2: Don't check microcode versions when running under hypervisors
` [PATCH 4.4.y 045/101] x86/speculation: Use IBRS if available before calling into firmware
` [PATCH 4.4.y 046/101] x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP
` [PATCH 4.4.y 047/101] x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist
` [PATCH 4.4.y 048/101] selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC
` [PATCH 4.4.y 049/101] selftest/seccomp: Fix the seccomp(2) signature
` [PATCH 4.4.y 050/101] xen: set cpu capabilities from xen_start_kernel()
` [PATCH 4.4.y 051/101] x86/amd: don't set X86_BUG_SYSRET_SS_ATTRS when running under Xen
` [PATCH 4.4.y 052/101] x86/nospec: Simplify alternative_msr_write()
` [PATCH 4.4.y 053/101] x86/bugs: Concentrate bug detection into a separate function
` [PATCH 4.4.y 054/101] x86/bugs: Concentrate bug reporting "
` [PATCH 4.4.y 055/101] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits

Spectre-v2 (IBPB/IBRS) and SSBD fixes for 4.4.y
 2018-07-14  9:17 UTC  (105+ messages)
` [PATCH 4.4.y 001/101] x86/cpufeature: Move some of the scattered feature bits to x86_capability
` [PATCH 4.4.y 002/101] x86/cpufeature: Cleanup get_cpu_cap()
` [PATCH 4.4.y 003/101] x86/cpu: Provide a config option to disable static_cpu_has
` [PATCH 4.4.y 004/101] x86/fpu: Add an XSTATE_OP() macro
` [PATCH 4.4.y 005/101] x86/fpu: Get rid of xstate_fault()
` [PATCH 4.4.y 006/101] x86/headers: Don't include asm/processor.h in asm/atomic.h
` [PATCH 4.4.y 007/101] x86/cpufeature: Carve out X86_FEATURE_*
` [PATCH 4.4.y 008/101] x86/cpufeature: Replace the old static_cpu_has() with safe variant
` [PATCH 4.4.y 009/101] x86/cpufeature: Get rid of the non-asm goto variant
` [PATCH 4.4.y 010/101] x86/alternatives: Add an auxilary section
` [PATCH 4.4.y 011/101] x86/alternatives: Discard dynamic check after init
` [PATCH 4.4.y 012/101] x86/vdso: Use static_cpu_has()
` [PATCH 4.4.y 013/101] x86/boot: Simplify kernel load address alignment check
` [PATCH 4.4.y 014/101] x86/cpufeature: Speed up cpu_feature_enabled()
` [PATCH 4.4.y 015/101] x86/cpufeature, x86/mm/pkeys: Add protection keys related CPUID definitions
` [PATCH 4.4.y 016/101] x86/mm/pkeys: Fix mismerge of protection keys CPUID bits
` [PATCH 4.4.y 017/101] x86/cpu: Add detection of AMD RAS Capabilities
` [PATCH 4.4.y 018/101] x86/cpufeature, x86/mm/pkeys: Fix broken compile-time disabling of pkeys
` [PATCH 4.4.y 019/101] x86/cpufeature: Update cpufeaure macros
` [PATCH 4.4.y 020/101] x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated
` [PATCH 4.4.y 021/101] x86/cpufeature: Add helper macro for mask check macros
` [PATCH 4.4.y 022/101] x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6
` [PATCH 4.4.y 023/101] x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
` [PATCH 4.4.y 024/101] x86/cpufeatures: Add Intel feature bits for Speculation Control
` [PATCH 4.4.y 025/101] x86/cpufeatures: Add AMD "
` [PATCH 4.4.y 026/101] x86/msr: Add definitions for new speculation control MSRs
` [PATCH 4.4.y 027/101] x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
` [PATCH 4.4.y 028/101] x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
` [PATCH 4.4.y 029/101] x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
` [PATCH 4.4.y 030/101] x86/cpufeatures: Clean up Spectre v2 related CPUID flags
` [PATCH 4.4.y 031/101] x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
` [PATCH 4.4.y 032/101] x86/pti: Mark constant arrays as __initconst
` [PATCH 4.4.y 033/101] x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs
` [PATCH 4.4.y 034/101] x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface
` [PATCH 4.4.y 035/101] x86/speculation: Update Speculation Control microcode blacklist
` [PATCH 4.4.y 036/101] x86/speculation: Correct Speculation Control microcode blacklist again
` [PATCH 4.4.y 037/101] x86/speculation: Clean up various Spectre related details
` [PATCH 4.4.y 038/101] x86/speculation: Fix up array_index_nospec_mask() asm constraint
` [PATCH 4.4.y 039/101] x86/speculation: Add <asm/msr-index.h> dependency
` [PATCH 4.4.y 040/101] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend
` [PATCH 4.4.y 041/101] x86/mm: Factor out LDT init from context init
` [PATCH 4.4.y 042/101] x86/mm: Give each mm TLB flush generation a unique ID
` [PATCH 4.4.y 043/101] x86/speculation: Use Indirect Branch Prediction Barrier in context switch
` [PATCH 4.4.y 044/101] x86/spectre_v2: Don't check microcode versions when running under hypervisors
` [PATCH 4.4.y 045/101] x86/speculation: Use IBRS if available before calling into firmware
` [PATCH 4.4.y 046/101] x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP
` [PATCH 4.4.y 047/101] x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist
` [PATCH 4.4.y 048/101] selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC
` [PATCH 4.4.y 049/101] selftest/seccomp: Fix the seccomp(2) signature
` [PATCH 4.4.y 050/101] xen: set cpu capabilities from xen_start_kernel()
` [PATCH 4.4.y 051/101] x86/amd: don't set X86_BUG_SYSRET_SS_ATTRS when running under Xen
` [PATCH 4.4.y 052/101] x86/nospec: Simplify alternative_msr_write()
` [PATCH 4.4.y 053/101] x86/bugs: Concentrate bug detection into a separate function
` [PATCH 4.4.y 054/101] x86/bugs: Concentrate bug reporting "
` [PATCH 4.4.y 055/101] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
` [PATCH 4.4.y 056/101] x86/bugs, KVM: Support the combination of guest and host IBRS
` [PATCH 4.4.y 057/101] x86/cpu: Rename Merrifield2 to Moorefield
` [PATCH 4.4.y 058/101] x86/cpu/intel: Add Knights Mill to Intel family
` [PATCH 4.4.y 059/101] x86/bugs: Expose /sys/../spec_store_bypass
` [PATCH 4.4.y 060/101] x86/cpufeatures: Add X86_FEATURE_RDS
` [PATCH 4.4.y 061/101] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
` [PATCH 4.4.y 062/101] x86/bugs/intel: Set proper CPU features and setup RDS
` [PATCH 4.4.y 063/101] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.4.y 064/101] x86/bugs/AMD: Add support to disable RDS on Fam[15, 16, 17]h if requested
` [PATCH 4.4.y 065/101] x86/speculation: Create spec-ctrl.h to avoid include hell
` [PATCH 4.4.y 066/101] prctl: Add speculation control prctls
` [PATCH 4.4.y 067/101] x86/process: Optimize TIF checks in __switch_to_xtra()
` [PATCH 4.4.y 068/101] x86/process: Correct and optimize TIF_BLOCKSTEP switch
` [PATCH 4.4.y 069/101] x86/process: Optimize TIF_NOTSC switch
` [PATCH 4.4.y 070/101] x86/process: Allow runtime control of Speculative Store Bypass
` [PATCH 4.4.y 071/101] x86/speculation: Add prctl for Speculative Store Bypass mitigation
` [PATCH 4.4.y 072/101] nospec: Allow getting/setting on non-current task
` [PATCH 4.4.y 073/101] proc: Provide details on speculation flaw mitigations
` [PATCH 4.4.y 074/101] seccomp: Enable "
` [PATCH 4.4.y 075/101] prctl: Add force disable speculation
` [PATCH 4.4.y 076/101] seccomp: Use PR_SPEC_FORCE_DISABLE
` [PATCH 4.4.y 077/101] seccomp: Add filter flag to opt-out of SSB mitigation
` [PATCH 4.4.y 078/101] seccomp: Move speculation migitation control to arch code
` [PATCH 4.4.y 079/101] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
` [PATCH 4.4.y 081/101] proc: Use underscores for SSBD in 'status'
` [PATCH 4.4.y 082/101] Documentation/spec_ctrl: Do some minor cleanups
` [PATCH 4.4.y 083/101] x86/bugs: Fix __ssb_select_mitigation() return type
` [PATCH 4.4.y 084/101] x86/bugs: Make cpu_show_common() static
` [PATCH 4.4.y 085/101] x86/bugs: Fix the parameters alignment and missing void
` [PATCH 4.4.y 086/101] x86/cpu: Make alternative_msr_write work for 32-bit code
` [PATCH 4.4.y 087/101] x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
` [PATCH 4.4.y 088/101] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
` [PATCH 4.4.y 089/101] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.4.y 090/101] x86/cpu/AMD: Fix erratum 1076 (CPB bit)
` [PATCH 4.4.y 091/101] x86/cpufeatures: Add FEATURE_ZEN
` [PATCH 4.4.y 092/101] x86/speculation: Handle HT correctly on AMD
` [PATCH 4.4.y 093/101] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
` [PATCH 4.4.y 094/101] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.4.y 095/101] x86/speculation: Rework speculative_store_bypass_update()
` [PATCH 4.4.y 096/101] x86/bugs: Unify x86_spec_ctrl_{set_guest, restore_host}
` [PATCH 4.4.y 097/101] x86/bugs: Expose x86_spec_ctrl_base directly
` [PATCH 4.4.y 098/101] x86/bugs: Remove x86_spec_ctrl_set()
` [PATCH 4.4.y 099/101] x86/bugs: Rework spec_ctrl base and mask logic
` [PATCH 4.4.y 100/101] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
` [PATCH 4.4.y 101/101] x86/bugs: Rename SSBD_NO to SSB_NO

[PATCH v6 00/13] mm: Teach memory_failure() about ZONE_DEVICE pages
 2018-07-14  4:50 UTC  (2+ messages)
` [PATCH v6 06/13] mm, dev_pagemap: Do not clear ->mapping on final put

[patch 09/11] mm: do not bug_on on incorrect length in __mm_populate()
 2018-07-13 23:59 UTC 

[patch 07/11] fs, elf: make sure to page align bss in load_elf_library
 2018-07-13 23:59 UTC 

[patch 06/11] x86/purgatory: add missing FORCE to Makefile target
 2018-07-13 23:59 UTC 

[patch 02/11] fs/proc/task_mmu.c: fix Locked field in /proc/pid/smaps*
 2018-07-13 23:58 UTC 

[patch 01/11] mm: do not drop unused pages when userfaultd is running
 2018-07-13 23:58 UTC 

+ thp-fix-data-loss-when-splitting-a-file-pmd.patch added to -mm tree
 2018-07-13 21:51 UTC 

+ fat-fix-memory-allocation-failure-handling-of-match_strdup.patch added to -mm tree
 2018-07-13 21:47 UTC 

[PATCH v2 1/2] drm/nouveau: Use drm_connector_list_iter_* for iterating connectors
 2018-07-13 17:06 UTC  (2+ messages)
` [PATCH v2 2/2] drm/nouveau: Avoid looping through fake MST connectors

[PATCH 0/2] drm/nouveau: Fix connector memory corruption issues
 2018-07-13 16:45 UTC  (4+ messages)
` [PATCH 1/2] drm/nouveau: Use drm_connector_list_iter_* for iterating connectors
` [PATCH 2/2] drm/nouveau: Avoid looping through fake MST connectors
  ` [Nouveau] "

[PATCH 1/3] [BUGFIX] tracing: Fix double free of event_trigger_data
 2018-07-13 16:28 UTC  (2+ messages)
` [PATCH 2/3] [BUGFIX] ring_buffer: tracing: Inherit the tracing setting to next ring buffer

[BACKPORT PATCH] nvme-pci: Remap CMB SQ entries on every controller reset
 2018-07-13 15:51 UTC  (4+ messages)

Backports that remove FPU lazy-mode deadcode for 4.9.y
 2018-07-13 14:58 UTC  (2+ messages)

Patch to consider for stable 3.18, 4.4 and 4.9
 2018-07-13 13:21 UTC  (2+ messages)

FAILED: patch "[PATCH] mmc: renesas_sdhi_internal_dmac: Fix missing unmap in error" failed to apply to 4.17-stable tree
 2018-07-13 12:05 UTC 

FAILED: patch "[PATCH] mmc: sdhci-esdhc-imx: allow 1.8V modes without 100/200MHz" failed to apply to 4.4-stable tree
 2018-07-13 12:04 UTC 

FAILED: patch "[PATCH] mmc: sdhci-esdhc-imx: allow 1.8V modes without 100/200MHz" failed to apply to 4.9-stable tree
 2018-07-13 12:04 UTC 

5845e6155d8f4a4a9bae2d4c1d1bb4a4d9a925c2 for stable
 2018-07-13 12:02 UTC  (4+ messages)

patch "uart: fix race between uart_put_char() and uart_shutdown()" added to tty-next
 2018-07-13 11:58 UTC 

patch "uart: fix race between uart_put_char() and uart_shutdown()" added to tty-testing
 2018-07-13  9:27 UTC 

[PATCH] xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code
 2018-07-13  8:41 UTC  (2+ messages)

[PATCH] MIPS: Change definition of cpu_relax() for Loongson-3
 2018-07-13  7:37 UTC 

[PATCH] mfd: hi655x: Fix regmap area declared size for hi655x
 2018-07-13  7:27 UTC  (2+ messages)

[PATCH 1/4] drm/amdgpu/pp/smu7: use a local variable for toc indexing
 2018-07-13  6:55 UTC  (2+ messages)

[PATCH] ARC: mm: allow mprotect to make stack mappings executable
 2018-07-12 22:16 UTC 

cx4 sriov problem in stable 4.14.47
 2018-07-12 18:01 UTC  (3+ messages)

[PATCH v2] xen: setup pv irq ops vector earlier
 2018-07-12 17:28 UTC  (2+ messages)

[PATCH v2 2/3] drm/nouveau: Fix runtime PM leak in nv50_disp_atomic_commit()
 2018-07-12 17:17 UTC  (3+ messages)
` [PATCH v2 3/3] drm/nouveau: Remove bogus crtc check in pmops_runtime_idle


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).