From: Greg Kroah-Hartman Date: Tue, 6 Feb 2018 10:29:57 +0000 (-0800) Subject: clean up the 4.14 and some 4.15 patches to play nicer with quilt X-Git-Tag: v3.18.94~7 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=b31579b2e4b669d34a9ccdaf0061799860b17506;p=thirdparty%2Fkernel%2Fstable-queue.git clean up the 4.14 and some 4.15 patches to play nicer with quilt --- diff --git a/queue-4.14/Documentation_Document_array_index_nospec.patch b/queue-4.14/Documentation_Document_array_index_nospec.patch index d6cfa4bc94b..7d924dcaf98 100644 --- a/queue-4.14/Documentation_Document_array_index_nospec.patch +++ b/queue-4.14/Documentation_Document_array_index_nospec.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: Documentation: Document array_index_nospec From: Mark Rutland mark.rutland@arm.com Date: Mon Jan 29 17:02:16 2018 -0800 diff --git a/queue-4.14/KVMSVM_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch b/queue-4.14/KVMSVM_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch index 3b996f999f7..f9660f8b8a8 100644 --- a/queue-4.14/KVMSVM_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch +++ b/queue-4.14/KVMSVM_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL From: KarimAllah Ahmed karahmed@amazon.de Date: Sat Feb 3 15:56:23 2018 +0100 diff --git a/queue-4.14/KVMVMX_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch b/queue-4.14/KVMVMX_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch index 93511142ab8..59a4ad8cad0 100644 --- a/queue-4.14/KVMVMX_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch +++ b/queue-4.14/KVMVMX_Allow_direct_access_to_MSR_IA32_SPEC_CTRL.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL From: KarimAllah Ahmed karahmed@amazon.de Date: Thu Feb 1 22:59:45 2018 +0100 diff --git a/queue-4.14/KVMVMX_Emulate_MSR_IA32_ARCH_CAPABILITIES.patch b/queue-4.14/KVMVMX_Emulate_MSR_IA32_ARCH_CAPABILITIES.patch index 33de208b6cd..c214a45fd2c 100644 --- a/queue-4.14/KVMVMX_Emulate_MSR_IA32_ARCH_CAPABILITIES.patch +++ b/queue-4.14/KVMVMX_Emulate_MSR_IA32_ARCH_CAPABILITIES.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES From: KarimAllah Ahmed karahmed@amazon.de Date: Thu Feb 1 22:59:44 2018 +0100 diff --git a/queue-4.14/KVM_VMX_Make_indirect_call_speculation_safe.patch b/queue-4.14/KVM_VMX_Make_indirect_call_speculation_safe.patch index 8bba9360b55..c20730a10f9 100644 --- a/queue-4.14/KVM_VMX_Make_indirect_call_speculation_safe.patch +++ b/queue-4.14/KVM_VMX_Make_indirect_call_speculation_safe.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM: VMX: Make indirect call speculation safe From: Peter Zijlstra peterz@infradead.org Date: Thu Jan 25 10:58:14 2018 +0100 diff --git a/queue-4.14/KVM_VMX_introduce_alloc_loaded_vmcs.patch b/queue-4.14/KVM_VMX_introduce_alloc_loaded_vmcs.patch index 48dd2474018..67d164bcfa8 100644 --- a/queue-4.14/KVM_VMX_introduce_alloc_loaded_vmcs.patch +++ b/queue-4.14/KVM_VMX_introduce_alloc_loaded_vmcs.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM: VMX: introduce alloc_loaded_vmcs From: Paolo Bonzini pbonzini@redhat.com Date: Thu Jan 11 12:16:15 2018 +0100 diff --git a/queue-4.14/KVM_VMX_make_MSR_bitmaps_per-VCPU.patch b/queue-4.14/KVM_VMX_make_MSR_bitmaps_per-VCPU.patch index 7ae3a985fa9..75195695050 100644 --- a/queue-4.14/KVM_VMX_make_MSR_bitmaps_per-VCPU.patch +++ b/queue-4.14/KVM_VMX_make_MSR_bitmaps_per-VCPU.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM: VMX: make MSR bitmaps per-VCPU From: Paolo Bonzini pbonzini@redhat.com Date: Tue Jan 16 16:51:18 2018 +0100 diff --git a/queue-4.14/KVM_nVMX_Eliminate_vmcs02_pool.patch b/queue-4.14/KVM_nVMX_Eliminate_vmcs02_pool.patch index 8882522bf94..72dd09e76cd 100644 --- a/queue-4.14/KVM_nVMX_Eliminate_vmcs02_pool.patch +++ b/queue-4.14/KVM_nVMX_Eliminate_vmcs02_pool.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM: nVMX: Eliminate vmcs02 pool From: Jim Mattson jmattson@google.com Date: Mon Nov 27 17:22:25 2017 -0600 diff --git a/queue-4.14/KVM_x86_Make_indirect_calls_in_emulator_speculation_safe.patch b/queue-4.14/KVM_x86_Make_indirect_calls_in_emulator_speculation_safe.patch index 2c43bc68684..7b5a4806913 100644 --- a/queue-4.14/KVM_x86_Make_indirect_calls_in_emulator_speculation_safe.patch +++ b/queue-4.14/KVM_x86_Make_indirect_calls_in_emulator_speculation_safe.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM: x86: Make indirect calls in emulator speculation safe From: Peter Zijlstra peterz@infradead.org Date: Thu Jan 25 10:58:13 2018 +0100 diff --git a/queue-4.14/KVMx86_Add_IBPB_support.patch b/queue-4.14/KVMx86_Add_IBPB_support.patch index 23531f75da2..221bdad9586 100644 --- a/queue-4.14/KVMx86_Add_IBPB_support.patch +++ b/queue-4.14/KVMx86_Add_IBPB_support.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM/x86: Add IBPB support From: Ashok Raj ashok.raj@intel.com Date: Thu Feb 1 22:59:43 2018 +0100 diff --git a/queue-4.14/KVMx86_Update_the_reverse_cpuid_list_to_include_CPUID_7_EDX.patch b/queue-4.14/KVMx86_Update_the_reverse_cpuid_list_to_include_CPUID_7_EDX.patch index 80fe6e32539..5c8ec7b9dc9 100644 --- a/queue-4.14/KVMx86_Update_the_reverse_cpuid_list_to_include_CPUID_7_EDX.patch +++ b/queue-4.14/KVMx86_Update_the_reverse_cpuid_list_to_include_CPUID_7_EDX.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX From: KarimAllah Ahmed karahmed@amazon.de Date: Thu Feb 1 22:59:42 2018 +0100 diff --git a/queue-4.14/array_index_nospec_Sanitize_speculative_array_de-references.patch b/queue-4.14/array_index_nospec_Sanitize_speculative_array_de-references.patch index ecddc6d9db2..b23d8152271 100644 --- a/queue-4.14/array_index_nospec_Sanitize_speculative_array_de-references.patch +++ b/queue-4.14/array_index_nospec_Sanitize_speculative_array_de-references.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: array_index_nospec: Sanitize speculative array de-references From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:02:22 2018 -0800 diff --git a/queue-4.14/moduleretpoline_Warn_about_missing_retpoline_in_module.patch b/queue-4.14/moduleretpoline_Warn_about_missing_retpoline_in_module.patch index 19d88c73de9..fc86869a0c2 100644 --- a/queue-4.14/moduleretpoline_Warn_about_missing_retpoline_in_module.patch +++ b/queue-4.14/moduleretpoline_Warn_about_missing_retpoline_in_module.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: module/retpoline: Warn about missing retpoline in module From: Andi Kleen ak@linux.intel.com Date: Thu Jan 25 15:50:28 2018 -0800 diff --git a/queue-4.14/nl80211_Sanitize_array_index_in_parse_txq_params.patch b/queue-4.14/nl80211_Sanitize_array_index_in_parse_txq_params.patch index 9bf5b8ace49..52335952f7d 100644 --- a/queue-4.14/nl80211_Sanitize_array_index_in_parse_txq_params.patch +++ b/queue-4.14/nl80211_Sanitize_array_index_in_parse_txq_params.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: nl80211: Sanitize array index in parse_txq_params From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:03:15 2018 -0800 diff --git a/queue-4.14/objtool_Add_support_for_alternatives_at_the_end_of_a_section.patch b/queue-4.14/objtool_Add_support_for_alternatives_at_the_end_of_a_section.patch index 4c284abeb2f..33c681a6fe3 100644 --- a/queue-4.14/objtool_Add_support_for_alternatives_at_the_end_of_a_section.patch +++ b/queue-4.14/objtool_Add_support_for_alternatives_at_the_end_of_a_section.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: objtool: Add support for alternatives at the end of a section From: Josh Poimboeuf jpoimboe@redhat.com Date: Mon Jan 29 22:00:40 2018 -0600 diff --git a/queue-4.14/objtool_Improve_retpoline_alternative_handling.patch b/queue-4.14/objtool_Improve_retpoline_alternative_handling.patch index b83517820db..4e9097539bb 100644 --- a/queue-4.14/objtool_Improve_retpoline_alternative_handling.patch +++ b/queue-4.14/objtool_Improve_retpoline_alternative_handling.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: objtool: Improve retpoline alternative handling From: Josh Poimboeuf jpoimboe@redhat.com Date: Mon Jan 29 22:00:39 2018 -0600 diff --git a/queue-4.14/objtool_Warn_on_stripped_section_symbol.patch b/queue-4.14/objtool_Warn_on_stripped_section_symbol.patch index 39f4cbf0662..618d1a515a7 100644 --- a/queue-4.14/objtool_Warn_on_stripped_section_symbol.patch +++ b/queue-4.14/objtool_Warn_on_stripped_section_symbol.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: objtool: Warn on stripped section symbol From: Josh Poimboeuf jpoimboe@redhat.com Date: Mon Jan 29 22:00:41 2018 -0600 diff --git a/queue-4.14/vfs_fdtable_Prevent_bounds-check_bypass_via_speculative_execution.patch b/queue-4.14/vfs_fdtable_Prevent_bounds-check_bypass_via_speculative_execution.patch index c47774b2369..13e375b9480 100644 --- a/queue-4.14/vfs_fdtable_Prevent_bounds-check_bypass_via_speculative_execution.patch +++ b/queue-4.14/vfs_fdtable_Prevent_bounds-check_bypass_via_speculative_execution.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: vfs, fdtable: Prevent bounds-check bypass via speculative execution From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:03:05 2018 -0800 diff --git a/queue-4.14/x86_Implement_array_index_mask_nospec.patch b/queue-4.14/x86_Implement_array_index_mask_nospec.patch index f12258f4edc..e1cd769e5ae 100644 --- a/queue-4.14/x86_Implement_array_index_mask_nospec.patch +++ b/queue-4.14/x86_Implement_array_index_mask_nospec.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86: Implement array_index_mask_nospec From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:02:28 2018 -0800 diff --git a/queue-4.14/x86_Introduce___uaccess_begin_nospec()_and_uaccess_try_nospec.patch b/queue-4.14/x86_Introduce___uaccess_begin_nospec()_and_uaccess_try_nospec.patch index 73d3c643bbe..63779559eba 100644 --- a/queue-4.14/x86_Introduce___uaccess_begin_nospec()_and_uaccess_try_nospec.patch +++ b/queue-4.14/x86_Introduce___uaccess_begin_nospec()_and_uaccess_try_nospec.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:02:39 2018 -0800 diff --git a/queue-4.14/x86_Introduce_barrier_nospec.patch b/queue-4.14/x86_Introduce_barrier_nospec.patch index ecae4045a9c..c643c7435ee 100644 --- a/queue-4.14/x86_Introduce_barrier_nospec.patch +++ b/queue-4.14/x86_Introduce_barrier_nospec.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86: Introduce barrier_nospec From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:02:33 2018 -0800 diff --git a/queue-4.14/x86alternative_Print_unadorned_pointers.patch b/queue-4.14/x86alternative_Print_unadorned_pointers.patch index f2627558937..f125cf9abf8 100644 --- a/queue-4.14/x86alternative_Print_unadorned_pointers.patch +++ b/queue-4.14/x86alternative_Print_unadorned_pointers.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/alternative: Print unadorned pointers From: Borislav Petkov bp@suse.de Date: Fri Jan 26 13:11:36 2018 +0100 diff --git a/queue-4.14/x86asm_Move_status_from_thread_struct_to_thread_info.patch b/queue-4.14/x86asm_Move_status_from_thread_struct_to_thread_info.patch index a700ab5c1e2..82987cfca18 100644 --- a/queue-4.14/x86asm_Move_status_from_thread_struct_to_thread_info.patch +++ b/queue-4.14/x86asm_Move_status_from_thread_struct_to_thread_info.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/asm: Move 'status' from thread_struct to thread_info From: Andy Lutomirski luto@kernel.org Date: Sun Jan 28 10:38:50 2018 -0800 diff --git a/queue-4.14/x86bugs_Drop_one_mitigation_from_dmesg.patch b/queue-4.14/x86bugs_Drop_one_mitigation_from_dmesg.patch index c936f1954f9..b5cb18621d3 100644 --- a/queue-4.14/x86bugs_Drop_one_mitigation_from_dmesg.patch +++ b/queue-4.14/x86bugs_Drop_one_mitigation_from_dmesg.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/bugs: Drop one "mitigation" from dmesg From: Borislav Petkov bp@suse.de Date: Fri Jan 26 13:11:39 2018 +0100 diff --git a/queue-4.14/x86cpubugs_Make_retpoline_module_warning_conditional.patch b/queue-4.14/x86cpubugs_Make_retpoline_module_warning_conditional.patch index b342b312ea0..f0852188b14 100644 --- a/queue-4.14/x86cpubugs_Make_retpoline_module_warning_conditional.patch +++ b/queue-4.14/x86cpubugs_Make_retpoline_module_warning_conditional.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/cpu/bugs: Make retpoline module warning conditional From: Thomas Gleixner tglx@linutronix.de Date: Sat Jan 27 15:45:14 2018 +0100 diff --git a/queue-4.14/x86cpufeature_Blacklist_SPEC_CTRLPRED_CMD_on_early_Spectre_v2_microcodes.patch b/queue-4.14/x86cpufeature_Blacklist_SPEC_CTRLPRED_CMD_on_early_Spectre_v2_microcodes.patch index 3d4d2c22ad3..7ab48991522 100644 --- a/queue-4.14/x86cpufeature_Blacklist_SPEC_CTRLPRED_CMD_on_early_Spectre_v2_microcodes.patch +++ b/queue-4.14/x86cpufeature_Blacklist_SPEC_CTRLPRED_CMD_on_early_Spectre_v2_microcodes.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes From: David Woodhouse dwmw@amazon.co.uk Date: Thu Jan 25 16:14:14 2018 +0000 diff --git a/queue-4.14/x86cpufeatures_Add_AMD_feature_bits_for_Speculation_Control.patch b/queue-4.14/x86cpufeatures_Add_AMD_feature_bits_for_Speculation_Control.patch index a5517287096..d3fb5a75769 100644 --- a/queue-4.14/x86cpufeatures_Add_AMD_feature_bits_for_Speculation_Control.patch +++ b/queue-4.14/x86cpufeatures_Add_AMD_feature_bits_for_Speculation_Control.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/cpufeatures: Add AMD feature bits for Speculation Control From: David Woodhouse dwmw@amazon.co.uk Date: Thu Jan 25 16:14:11 2018 +0000 diff --git a/queue-4.14/x86cpufeatures_Add_CPUID_7_EDX_CPUID_leaf.patch b/queue-4.14/x86cpufeatures_Add_CPUID_7_EDX_CPUID_leaf.patch index aa537c5df1f..6bfeef889a8 100644 --- a/queue-4.14/x86cpufeatures_Add_CPUID_7_EDX_CPUID_leaf.patch +++ b/queue-4.14/x86cpufeatures_Add_CPUID_7_EDX_CPUID_leaf.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/cpufeatures: Add CPUID_7_EDX CPUID leaf From: David Woodhouse dwmw@amazon.co.uk Date: Thu Jan 25 16:14:09 2018 +0000 diff --git a/queue-4.14/x86cpufeatures_Add_Intel_feature_bits_for_Speculation_Control.patch b/queue-4.14/x86cpufeatures_Add_Intel_feature_bits_for_Speculation_Control.patch index 5a845487e4d..d5bb05803e5 100644 --- a/queue-4.14/x86cpufeatures_Add_Intel_feature_bits_for_Speculation_Control.patch +++ b/queue-4.14/x86cpufeatures_Add_Intel_feature_bits_for_Speculation_Control.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/cpufeatures: Add Intel feature bits for Speculation Control From: David Woodhouse dwmw@amazon.co.uk Date: Thu Jan 25 16:14:10 2018 +0000 diff --git a/queue-4.14/x86cpufeatures_Clean_up_Spectre_v2_related_CPUID_flags.patch b/queue-4.14/x86cpufeatures_Clean_up_Spectre_v2_related_CPUID_flags.patch index feb8bdb8fff..77ce743f0c8 100644 --- a/queue-4.14/x86cpufeatures_Clean_up_Spectre_v2_related_CPUID_flags.patch +++ b/queue-4.14/x86cpufeatures_Clean_up_Spectre_v2_related_CPUID_flags.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/cpufeatures: Clean up Spectre v2 related CPUID flags From: David Woodhouse dwmw@amazon.co.uk Date: Sat Jan 27 16:24:32 2018 +0000 diff --git a/queue-4.14/x86cpuid_Fix_up_virtual_IBRSIBPBSTIBP_feature_bits_on_Intel.patch b/queue-4.14/x86cpuid_Fix_up_virtual_IBRSIBPBSTIBP_feature_bits_on_Intel.patch index df29d55a338..ec1f5c63492 100644 --- a/queue-4.14/x86cpuid_Fix_up_virtual_IBRSIBPBSTIBP_feature_bits_on_Intel.patch +++ b/queue-4.14/x86cpuid_Fix_up_virtual_IBRSIBPBSTIBP_feature_bits_on_Intel.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel From: David Woodhouse dwmw@amazon.co.uk Date: Tue Jan 30 14:30:23 2018 +0000 diff --git a/queue-4.14/x86entry64_Push_extra_regs_right_away.patch b/queue-4.14/x86entry64_Push_extra_regs_right_away.patch index e79133098f2..0627cd7598f 100644 --- a/queue-4.14/x86entry64_Push_extra_regs_right_away.patch +++ b/queue-4.14/x86entry64_Push_extra_regs_right_away.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/entry/64: Push extra regs right away From: Andy Lutomirski luto@kernel.org Date: Sun Jan 28 10:38:49 2018 -0800 diff --git a/queue-4.14/x86entry64_Remove_the_SYSCALL64_fast_path.patch b/queue-4.14/x86entry64_Remove_the_SYSCALL64_fast_path.patch index 59132a38404..b064fc2af61 100644 --- a/queue-4.14/x86entry64_Remove_the_SYSCALL64_fast_path.patch +++ b/queue-4.14/x86entry64_Remove_the_SYSCALL64_fast_path.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/entry/64: Remove the SYSCALL64 fast path From: Andy Lutomirski luto@kernel.org Date: Sun Jan 28 10:38:49 2018 -0800 diff --git a/queue-4.14/x86get_user_Use_pointer_masking_to_limit_speculation.patch b/queue-4.14/x86get_user_Use_pointer_masking_to_limit_speculation.patch index 8c70533768e..9482479d75f 100644 --- a/queue-4.14/x86get_user_Use_pointer_masking_to_limit_speculation.patch +++ b/queue-4.14/x86get_user_Use_pointer_masking_to_limit_speculation.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/get_user: Use pointer masking to limit speculation From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:02:54 2018 -0800 diff --git a/queue-4.14/x86kvm_Update_spectre-v1_mitigation.patch b/queue-4.14/x86kvm_Update_spectre-v1_mitigation.patch index 4e1b7b96ed0..d3a98d85cf7 100644 --- a/queue-4.14/x86kvm_Update_spectre-v1_mitigation.patch +++ b/queue-4.14/x86kvm_Update_spectre-v1_mitigation.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/kvm: Update spectre-v1 mitigation From: Dan Williams dan.j.williams@intel.com Date: Wed Jan 31 17:47:03 2018 -0800 diff --git a/queue-4.14/x86mm_Fix_overlap_of_i386_CPU_ENTRY_AREA_with_FIX_BTMAP.patch b/queue-4.14/x86mm_Fix_overlap_of_i386_CPU_ENTRY_AREA_with_FIX_BTMAP.patch index 71f794c0bc0..a919adb1c36 100644 --- a/queue-4.14/x86mm_Fix_overlap_of_i386_CPU_ENTRY_AREA_with_FIX_BTMAP.patch +++ b/queue-4.14/x86mm_Fix_overlap_of_i386_CPU_ENTRY_AREA_with_FIX_BTMAP.patch @@ -1,8 +1,9 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP From: William Grant william.grant@canonical.com Date: Tue Jan 30 22:22:55 2018 +1100 -From: William Grant william.grant@canonical.com +From: William Grant commit 55f49fcb879fbeebf2a8c1ac7c9e6d90df55f798 diff --git a/queue-4.14/x86msr_Add_definitions_for_new_speculation_control_MSRs.patch b/queue-4.14/x86msr_Add_definitions_for_new_speculation_control_MSRs.patch index 7f2d4601190..5fbca06b087 100644 --- a/queue-4.14/x86msr_Add_definitions_for_new_speculation_control_MSRs.patch +++ b/queue-4.14/x86msr_Add_definitions_for_new_speculation_control_MSRs.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/msr: Add definitions for new speculation control MSRs From: David Woodhouse dwmw@amazon.co.uk Date: Thu Jan 25 16:14:12 2018 +0000 diff --git a/queue-4.14/x86nospec_Fix_header_guards_names.patch b/queue-4.14/x86nospec_Fix_header_guards_names.patch index fe2f5f3b831..13a67d09e7f 100644 --- a/queue-4.14/x86nospec_Fix_header_guards_names.patch +++ b/queue-4.14/x86nospec_Fix_header_guards_names.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/nospec: Fix header guards names From: Borislav Petkov bp@suse.de Date: Fri Jan 26 13:11:37 2018 +0100 diff --git a/queue-4.14/x86paravirt_Remove_noreplace-paravirt_cmdline_option.patch b/queue-4.14/x86paravirt_Remove_noreplace-paravirt_cmdline_option.patch index 132d6ec2b42..175da1fb097 100644 --- a/queue-4.14/x86paravirt_Remove_noreplace-paravirt_cmdline_option.patch +++ b/queue-4.14/x86paravirt_Remove_noreplace-paravirt_cmdline_option.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/paravirt: Remove 'noreplace-paravirt' cmdline option From: Josh Poimboeuf jpoimboe@redhat.com Date: Tue Jan 30 22:13:33 2018 -0600 diff --git a/queue-4.14/x86pti_Do_not_enable_PTI_on_CPUs_which_are_not_vulnerable_to_Meltdown.patch b/queue-4.14/x86pti_Do_not_enable_PTI_on_CPUs_which_are_not_vulnerable_to_Meltdown.patch index c4feb8a2019..6942e3bb0d9 100644 --- a/queue-4.14/x86pti_Do_not_enable_PTI_on_CPUs_which_are_not_vulnerable_to_Meltdown.patch +++ b/queue-4.14/x86pti_Do_not_enable_PTI_on_CPUs_which_are_not_vulnerable_to_Meltdown.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown From: David Woodhouse dwmw@amazon.co.uk Date: Thu Jan 25 16:14:13 2018 +0000 diff --git a/queue-4.14/x86pti_Mark_constant_arrays_as___initconst.patch b/queue-4.14/x86pti_Mark_constant_arrays_as___initconst.patch index de25ad3e0ff..54ec8a81316 100644 --- a/queue-4.14/x86pti_Mark_constant_arrays_as___initconst.patch +++ b/queue-4.14/x86pti_Mark_constant_arrays_as___initconst.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/pti: Mark constant arrays as __initconst From: Arnd Bergmann arnd@arndb.de Date: Fri Feb 2 22:39:23 2018 +0100 diff --git a/queue-4.14/x86retpoline_Avoid_retpolines_for_built-in___init_functions.patch b/queue-4.14/x86retpoline_Avoid_retpolines_for_built-in___init_functions.patch index 7175fecdf3c..2b9283135f8 100644 --- a/queue-4.14/x86retpoline_Avoid_retpolines_for_built-in___init_functions.patch +++ b/queue-4.14/x86retpoline_Avoid_retpolines_for_built-in___init_functions.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/retpoline: Avoid retpolines for built-in __init functions From: David Woodhouse dwmw@amazon.co.uk Date: Thu Feb 1 11:27:20 2018 +0000 diff --git a/queue-4.14/x86retpoline_Remove_the_esprsp_thunk.patch b/queue-4.14/x86retpoline_Remove_the_esprsp_thunk.patch index be0cac30a9a..f93d2976222 100644 --- a/queue-4.14/x86retpoline_Remove_the_esprsp_thunk.patch +++ b/queue-4.14/x86retpoline_Remove_the_esprsp_thunk.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/retpoline: Remove the esp/rsp thunk From: Waiman Long longman@redhat.com Date: Mon Jan 22 17:09:34 2018 -0500 diff --git a/queue-4.14/x86retpoline_Simplify_vmexit_fill_RSB().patch b/queue-4.14/x86retpoline_Simplify_vmexit_fill_RSB().patch index 28c4453f143..0fd24bdc199 100644 --- a/queue-4.14/x86retpoline_Simplify_vmexit_fill_RSB().patch +++ b/queue-4.14/x86retpoline_Simplify_vmexit_fill_RSB().patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/retpoline: Simplify vmexit_fill_RSB() From: Borislav Petkov bp@alien8.de Date: Sat Jan 27 16:24:33 2018 +0000 diff --git a/queue-4.14/x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch b/queue-4.14/x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch index 9070a8c4b05..0eae37a66df 100644 --- a/queue-4.14/x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch +++ b/queue-4.14/x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch @@ -1,8 +1,9 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/spectre: Check CONFIG_RETPOLINE in command line parser -From: Dou Liyang douly.fnst@cn.fujitsu.com +From: Dou Liyang Date: Tue Jan 30 14:13:50 2018 +0800 -From: Dou Liyang douly.fnst@cn.fujitsu.com +From: Dou Liyang commit 9471eee9186a46893726e22ebb54cade3f9bc043 @@ -17,7 +18,7 @@ Signed-off-by: Dou Liyang Signed-off-by: Thomas Gleixner Cc: ak@linux.intel.com Cc: peterz@infradead.org -Cc: Tomohiro" +Cc: Tomohiro Cc: dave.hansen@intel.com Cc: bp@alien8.de Cc: arjan@linux.intel.com diff --git a/queue-4.14/x86spectre_Fix_spelling_mistake_vunerable-_vulnerable.patch b/queue-4.14/x86spectre_Fix_spelling_mistake_vunerable-_vulnerable.patch index 6a86c2b67b4..f68e18784fb 100644 --- a/queue-4.14/x86spectre_Fix_spelling_mistake_vunerable-_vulnerable.patch +++ b/queue-4.14/x86spectre_Fix_spelling_mistake_vunerable-_vulnerable.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable" From: Colin Ian King colin.king@canonical.com Date: Tue Jan 30 19:32:18 2018 +0000 diff --git a/queue-4.14/x86spectre_Report_get_user_mitigation_for_spectre_v1.patch b/queue-4.14/x86spectre_Report_get_user_mitigation_for_spectre_v1.patch index e0e8d8b7de0..492b2c3fb0f 100644 --- a/queue-4.14/x86spectre_Report_get_user_mitigation_for_spectre_v1.patch +++ b/queue-4.14/x86spectre_Report_get_user_mitigation_for_spectre_v1.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/spectre: Report get_user mitigation for spectre_v1 From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:03:21 2018 -0800 diff --git a/queue-4.14/x86spectre_Simplify_spectre_v2_command_line_parsing.patch b/queue-4.14/x86spectre_Simplify_spectre_v2_command_line_parsing.patch index 764b4e18626..8ad70860766 100644 --- a/queue-4.14/x86spectre_Simplify_spectre_v2_command_line_parsing.patch +++ b/queue-4.14/x86spectre_Simplify_spectre_v2_command_line_parsing.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/spectre: Simplify spectre_v2 command line parsing From: KarimAllah Ahmed karahmed@amazon.de Date: Thu Feb 1 11:27:21 2018 +0000 diff --git a/queue-4.14/x86speculation_Add_basic_IBPB_(Indirect_Branch_Prediction_Barrier)_support.patch b/queue-4.14/x86speculation_Add_basic_IBPB_(Indirect_Branch_Prediction_Barrier)_support.patch index 034aba7d342..a03865f18e0 100644 --- a/queue-4.14/x86speculation_Add_basic_IBPB_(Indirect_Branch_Prediction_Barrier)_support.patch +++ b/queue-4.14/x86speculation_Add_basic_IBPB_(Indirect_Branch_Prediction_Barrier)_support.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support From: David Woodhouse dwmw@amazon.co.uk Date: Thu Jan 25 16:14:15 2018 +0000 diff --git a/queue-4.14/x86speculation_Fix_typo_IBRS_ATT_which_should_be_IBRS_ALL.patch b/queue-4.14/x86speculation_Fix_typo_IBRS_ATT_which_should_be_IBRS_ALL.patch index 1a5586e8ea9..a55525a3dd2 100644 --- a/queue-4.14/x86speculation_Fix_typo_IBRS_ATT_which_should_be_IBRS_ALL.patch +++ b/queue-4.14/x86speculation_Fix_typo_IBRS_ATT_which_should_be_IBRS_ALL.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL From: Darren Kenny darren.kenny@oracle.com Date: Fri Feb 2 19:12:20 2018 +0000 diff --git a/queue-4.14/x86speculation_Simplify_indirect_branch_prediction_barrier().patch b/queue-4.14/x86speculation_Simplify_indirect_branch_prediction_barrier().patch index 117ab9e881b..c2bc74d6a96 100644 --- a/queue-4.14/x86speculation_Simplify_indirect_branch_prediction_barrier().patch +++ b/queue-4.14/x86speculation_Simplify_indirect_branch_prediction_barrier().patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/speculation: Simplify indirect_branch_prediction_barrier() From: Borislav Petkov bp@suse.de Date: Sat Jan 27 16:24:34 2018 +0000 diff --git a/queue-4.14/x86speculation_Use_Indirect_Branch_Prediction_Barrier_in_context_switch.patch b/queue-4.14/x86speculation_Use_Indirect_Branch_Prediction_Barrier_in_context_switch.patch index 7565edf7b6d..6e0138276d3 100644 --- a/queue-4.14/x86speculation_Use_Indirect_Branch_Prediction_Barrier_in_context_switch.patch +++ b/queue-4.14/x86speculation_Use_Indirect_Branch_Prediction_Barrier_in_context_switch.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/speculation: Use Indirect Branch Prediction Barrier in context switch From: Tim Chen tim.c.chen@linux.intel.com Date: Mon Jan 29 22:04:47 2018 +0000 diff --git a/queue-4.14/x86syscall_Sanitize_syscall_table_de-references_under_speculation.patch b/queue-4.14/x86syscall_Sanitize_syscall_table_de-references_under_speculation.patch index dcc1025facd..b4850fc7057 100644 --- a/queue-4.14/x86syscall_Sanitize_syscall_table_de-references_under_speculation.patch +++ b/queue-4.14/x86syscall_Sanitize_syscall_table_de-references_under_speculation.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/syscall: Sanitize syscall table de-references under speculation From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:02:59 2018 -0800 diff --git a/queue-4.14/x86uaccess_Use___uaccess_begin_nospec()_and_uaccess_try_nospec.patch b/queue-4.14/x86uaccess_Use___uaccess_begin_nospec()_and_uaccess_try_nospec.patch index 1bdc2c073b4..252db2432f9 100644 --- a/queue-4.14/x86uaccess_Use___uaccess_begin_nospec()_and_uaccess_try_nospec.patch +++ b/queue-4.14/x86uaccess_Use___uaccess_begin_nospec()_and_uaccess_try_nospec.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:02:49 2018 -0800 diff --git a/queue-4.14/x86usercopy_Replace_open_coded_stacclac_with___uaccess_begin_end.patch b/queue-4.14/x86usercopy_Replace_open_coded_stacclac_with___uaccess_begin_end.patch index 68a6fcec4ab..7a24731d692 100644 --- a/queue-4.14/x86usercopy_Replace_open_coded_stacclac_with___uaccess_begin_end.patch +++ b/queue-4.14/x86usercopy_Replace_open_coded_stacclac_with___uaccess_begin_end.patch @@ -1,3 +1,4 @@ +From foo@baz Mon Feb 5 10:12:24 PST 2018 Subject: x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} From: Dan Williams dan.j.williams@intel.com Date: Mon Jan 29 17:02:44 2018 -0800 diff --git a/queue-4.15/x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch b/queue-4.15/x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch index 9070a8c4b05..d1bd9bb0451 100644 --- a/queue-4.15/x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch +++ b/queue-4.15/x86spectre_Check_CONFIG_RETPOLINE_in_command_line_parser.patch @@ -17,7 +17,7 @@ Signed-off-by: Dou Liyang Signed-off-by: Thomas Gleixner Cc: ak@linux.intel.com Cc: peterz@infradead.org -Cc: Tomohiro" +Cc: Tomohiro Cc: dave.hansen@intel.com Cc: bp@alien8.de Cc: arjan@linux.intel.com