]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commit
4.14-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 5 Feb 2018 17:38:14 +0000 (09:38 -0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 5 Feb 2018 17:38:14 +0000 (09:38 -0800)
commitaba6eb3aac5cd83043108dd1929341ce7f1fe696
treedeecfe9c57d105d0ee9160fa9dece2c39e2770e1
parent1807312a184a8b88a12948b55b286f5f861aaccc
4.14-stable patches

added patches:
Documentation_Document_array_index_nospec.patch
KVMSVM_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch
KVMVMX_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch
KVMVMX_Emulate_MSR_IA32_ARCH_CAPABILITIES.patch
KVM_VMX_introduce_alloc_loaded_vmcs.patch
KVM_VMX_make_MSR_bitmaps_per-VCPU.patch
KVM_nVMX_Eliminate_vmcs02_pool.patch
KVMx86_Add_IBPB_support.patch
KVMx86_Update_the_reverse_cpuid_list_to_include_CPUID_7_EDX.patch
array_index_nospec_Sanitize_speculative_array_de-references.patch
nl80211_Sanitize_array_index_in_parse_txq_params.patch
objtool_Add_support_for_alternatives_at_the_end_of_a_section.patch
objtool_Improve_retpoline_alternative_handling.patch
objtool_Warn_on_stripped_section_symbol.patch
vfs_fdtable_Prevent_bounds-check_bypass_via_speculative_execution.patch
x86_Implement_array_index_mask_nospec.patch
x86_Introduce___uaccess_begin_nospec()_and_uaccess_try_nospec.patch
x86_Introduce_barrier_nospec.patch
x86asm_Move_status_from_thread_struct_to_thread_info.patch
x86cpuid_Fix_up_virtual_IBRSIBPBSTIBP_feature_bits_on_Intel.patch
x86entry64_Push_extra_regs_right_away.patch
x86entry64_Remove_the_SYSCALL64_fast_path.patch
x86get_user_Use_pointer_masking_to_limit_speculation.patch
x86kvm_Update_spectre-v1_mitigation.patch
x86mm_Fix_overlap_of_i386_CPU_ENTRY_AREA_with_FIX_BTMAP.patch
x86paravirt_Remove_noreplace-paravirt_cmdline_option.patch
x86pti_Mark_constant_arrays_as___initconst.patch
x86retpoline_Avoid_retpolines_for_built-in___init_functions.patch
x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch
x86spectre_Fix_spelling_mistake_vunerable-_vulnerable.patch
x86spectre_Report_get_user_mitigation_for_spectre_v1.patch
x86spectre_Simplify_spectre_v2_command_line_parsing.patch
x86speculation_Fix_typo_IBRS_ATT_which_should_be_IBRS_ALL.patch
x86speculation_Use_Indirect_Branch_Prediction_Barrier_in_context_switch.patch
x86syscall_Sanitize_syscall_table_de-references_under_speculation.patch
x86uaccess_Use___uaccess_begin_nospec()_and_uaccess_try_nospec.patch
x86usercopy_Replace_open_coded_stacclac_with___uaccess_begin_end.patch
38 files changed:
queue-4.14/Documentation_Document_array_index_nospec.patch [new file with mode: 0644]
queue-4.14/KVMSVM_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch [new file with mode: 0644]
queue-4.14/KVMVMX_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch [new file with mode: 0644]
queue-4.14/KVMVMX_Emulate_MSR_IA32_ARCH_CAPABILITIES.patch [new file with mode: 0644]
queue-4.14/KVM_VMX_introduce_alloc_loaded_vmcs.patch [new file with mode: 0644]
queue-4.14/KVM_VMX_make_MSR_bitmaps_per-VCPU.patch [new file with mode: 0644]
queue-4.14/KVM_nVMX_Eliminate_vmcs02_pool.patch [new file with mode: 0644]
queue-4.14/KVMx86_Add_IBPB_support.patch [new file with mode: 0644]
queue-4.14/KVMx86_Update_the_reverse_cpuid_list_to_include_CPUID_7_EDX.patch [new file with mode: 0644]
queue-4.14/array_index_nospec_Sanitize_speculative_array_de-references.patch [new file with mode: 0644]
queue-4.14/nl80211_Sanitize_array_index_in_parse_txq_params.patch [new file with mode: 0644]
queue-4.14/objtool_Add_support_for_alternatives_at_the_end_of_a_section.patch [new file with mode: 0644]
queue-4.14/objtool_Improve_retpoline_alternative_handling.patch [new file with mode: 0644]
queue-4.14/objtool_Warn_on_stripped_section_symbol.patch [new file with mode: 0644]
queue-4.14/series
queue-4.14/vfs_fdtable_Prevent_bounds-check_bypass_via_speculative_execution.patch [new file with mode: 0644]
queue-4.14/x86_Implement_array_index_mask_nospec.patch [new file with mode: 0644]
queue-4.14/x86_Introduce___uaccess_begin_nospec()_and_uaccess_try_nospec.patch [new file with mode: 0644]
queue-4.14/x86_Introduce_barrier_nospec.patch [new file with mode: 0644]
queue-4.14/x86asm_Move_status_from_thread_struct_to_thread_info.patch [new file with mode: 0644]
queue-4.14/x86cpuid_Fix_up_virtual_IBRSIBPBSTIBP_feature_bits_on_Intel.patch [new file with mode: 0644]
queue-4.14/x86entry64_Push_extra_regs_right_away.patch [new file with mode: 0644]
queue-4.14/x86entry64_Remove_the_SYSCALL64_fast_path.patch [new file with mode: 0644]
queue-4.14/x86get_user_Use_pointer_masking_to_limit_speculation.patch [new file with mode: 0644]
queue-4.14/x86kvm_Update_spectre-v1_mitigation.patch [new file with mode: 0644]
queue-4.14/x86mm_Fix_overlap_of_i386_CPU_ENTRY_AREA_with_FIX_BTMAP.patch [new file with mode: 0644]
queue-4.14/x86paravirt_Remove_noreplace-paravirt_cmdline_option.patch [new file with mode: 0644]
queue-4.14/x86pti_Mark_constant_arrays_as___initconst.patch [new file with mode: 0644]
queue-4.14/x86retpoline_Avoid_retpolines_for_built-in___init_functions.patch [new file with mode: 0644]
queue-4.14/x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch [new file with mode: 0644]
queue-4.14/x86spectre_Fix_spelling_mistake_vunerable-_vulnerable.patch [new file with mode: 0644]
queue-4.14/x86spectre_Report_get_user_mitigation_for_spectre_v1.patch [new file with mode: 0644]
queue-4.14/x86spectre_Simplify_spectre_v2_command_line_parsing.patch [new file with mode: 0644]
queue-4.14/x86speculation_Fix_typo_IBRS_ATT_which_should_be_IBRS_ALL.patch [new file with mode: 0644]
queue-4.14/x86speculation_Use_Indirect_Branch_Prediction_Barrier_in_context_switch.patch [new file with mode: 0644]
queue-4.14/x86syscall_Sanitize_syscall_table_de-references_under_speculation.patch [new file with mode: 0644]
queue-4.14/x86uaccess_Use___uaccess_begin_nospec()_and_uaccess_try_nospec.patch [new file with mode: 0644]
queue-4.14/x86usercopy_Replace_open_coded_stacclac_with___uaccess_begin_end.patch [new file with mode: 0644]