]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commit
4.15-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 4 Feb 2018 13:02:48 +0000 (14:02 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 4 Feb 2018 13:02:48 +0000 (14:02 +0100)
commit8b237e86b69dad8c65a407c3192e0487f11580bf
tree4d5291475f0cd110fdde755165fed968b74742c6
parentfbbba5ef3e84d01fb35ea92c24b8fc2b3c1e8f87
4.15-stable patches

added patches:
KVM_VMX_Make_indirect_call_speculation_safe.patch
KVM_x86_Make_indirect_calls_in_emulator_speculation_safe.patch
moduleretpoline_Warn_about_missing_retpoline_in_module.patch
x86alternative_Print_unadorned_pointers.patch
x86bugs_Drop_one_mitigation_from_dmesg.patch
x86cpubugs_Make_retpoline_module_warning_conditional.patch
x86cpufeature_Blacklist_SPEC_CTRLPRED_CMD_on_early_Spectre_v2_microcodes.patch
x86cpufeatures_Add_AMD_feature_bits_for_Speculation_Control.patch
x86cpufeatures_Add_CPUID_7_EDX_CPUID_leaf.patch
x86cpufeatures_Add_Intel_feature_bits_for_Speculation_Control.patch
x86cpufeatures_Clean_up_Spectre_v2_related_CPUID_flags.patch
x86msr_Add_definitions_for_new_speculation_control_MSRs.patch
x86nospec_Fix_header_guards_names.patch
x86pti_Do_not_enable_PTI_on_CPUs_which_are_not_vulnerable_to_Meltdown.patch
x86retpoline_Simplify_vmexit_fill_RSB().patch
x86speculation_Add_basic_IBPB_(Indirect_Branch_Prediction_Barrier)_support.patch
x86speculation_Simplify_indirect_branch_prediction_barrier().patch
18 files changed:
queue-4.15/KVM_VMX_Make_indirect_call_speculation_safe.patch [new file with mode: 0644]
queue-4.15/KVM_x86_Make_indirect_calls_in_emulator_speculation_safe.patch [new file with mode: 0644]
queue-4.15/moduleretpoline_Warn_about_missing_retpoline_in_module.patch [new file with mode: 0644]
queue-4.15/series
queue-4.15/x86alternative_Print_unadorned_pointers.patch [new file with mode: 0644]
queue-4.15/x86bugs_Drop_one_mitigation_from_dmesg.patch [new file with mode: 0644]
queue-4.15/x86cpubugs_Make_retpoline_module_warning_conditional.patch [new file with mode: 0644]
queue-4.15/x86cpufeature_Blacklist_SPEC_CTRLPRED_CMD_on_early_Spectre_v2_microcodes.patch [new file with mode: 0644]
queue-4.15/x86cpufeatures_Add_AMD_feature_bits_for_Speculation_Control.patch [new file with mode: 0644]
queue-4.15/x86cpufeatures_Add_CPUID_7_EDX_CPUID_leaf.patch [new file with mode: 0644]
queue-4.15/x86cpufeatures_Add_Intel_feature_bits_for_Speculation_Control.patch [new file with mode: 0644]
queue-4.15/x86cpufeatures_Clean_up_Spectre_v2_related_CPUID_flags.patch [new file with mode: 0644]
queue-4.15/x86msr_Add_definitions_for_new_speculation_control_MSRs.patch [new file with mode: 0644]
queue-4.15/x86nospec_Fix_header_guards_names.patch [new file with mode: 0644]
queue-4.15/x86pti_Do_not_enable_PTI_on_CPUs_which_are_not_vulnerable_to_Meltdown.patch [new file with mode: 0644]
queue-4.15/x86retpoline_Simplify_vmexit_fill_RSB().patch [new file with mode: 0644]
queue-4.15/x86speculation_Add_basic_IBPB_(Indirect_Branch_Prediction_Barrier)_support.patch [new file with mode: 0644]
queue-4.15/x86speculation_Simplify_indirect_branch_prediction_barrier().patch [new file with mode: 0644]