]>
git.ipfire.org Git - thirdparty/kernel/stable-queue.git/log
Sasha Levin [Sat, 12 Mar 2022 08:51:02 +0000 (03:51 -0500)]
Fixes for 4.14
Signed-off-by: Sasha Levin <sashal@kernel.org>
Sasha Levin [Sat, 12 Mar 2022 08:51:01 +0000 (03:51 -0500)]
Fixes for 4.19
Signed-off-by: Sasha Levin <sashal@kernel.org>
Sasha Levin [Sat, 12 Mar 2022 08:51:01 +0000 (03:51 -0500)]
Fixes for 5.4
Signed-off-by: Sasha Levin <sashal@kernel.org>
Sasha Levin [Sat, 12 Mar 2022 08:51:00 +0000 (03:51 -0500)]
Fixes for 5.10
Signed-off-by: Sasha Levin <sashal@kernel.org>
Sasha Levin [Sat, 12 Mar 2022 08:50:59 +0000 (03:50 -0500)]
Fixes for 5.15
Signed-off-by: Sasha Levin <sashal@kernel.org>
Sasha Levin [Sat, 12 Mar 2022 08:50:59 +0000 (03:50 -0500)]
Fixes for 5.16
Signed-off-by: Sasha Levin <sashal@kernel.org>
Greg Kroah-Hartman [Fri, 11 Mar 2022 11:42:27 +0000 (12:42 +0100)]
Linux 5.16.14
Greg Kroah-Hartman [Fri, 11 Mar 2022 11:23:00 +0000 (12:23 +0100)]
Linux 5.15.28
Greg Kroah-Hartman [Fri, 11 Mar 2022 11:12:13 +0000 (12:12 +0100)]
Linux 5.10.105
Greg Kroah-Hartman [Fri, 11 Mar 2022 10:22:57 +0000 (11:22 +0100)]
Linux 5.4.184
Greg Kroah-Hartman [Fri, 11 Mar 2022 09:15:30 +0000 (10:15 +0100)]
Linux 4.19.234
Greg Kroah-Hartman [Fri, 11 Mar 2022 09:13:57 +0000 (10:13 +0100)]
Linux 4.14.271
Greg Kroah-Hartman [Fri, 11 Mar 2022 09:03:47 +0000 (10:03 +0100)]
Linux 4.9.306
Greg Kroah-Hartman [Fri, 11 Mar 2022 08:59:59 +0000 (09:59 +0100)]
fix up some arm64 patches to be bisectable
Greg Kroah-Hartman [Fri, 11 Mar 2022 08:36:08 +0000 (09:36 +0100)]
scripts/quilt_mail: use full kernel version for temp dir
Greg Kroah-Hartman [Thu, 10 Mar 2022 13:54:00 +0000 (14:54 +0100)]
5.4-stable patches
added patches:
revert-acpi-pm-s2idle-cancel-wakeup-before-dispatching-ec-gpe.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 13:52:38 +0000 (14:52 +0100)]
5.15-stable patches
added patches:
revert-acpi-pm-s2idle-cancel-wakeup-before-dispatching-ec-gpe.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 13:52:30 +0000 (14:52 +0100)]
5.10-stable patches
added patches:
revert-acpi-pm-s2idle-cancel-wakeup-before-dispatching-ec-gpe.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 13:50:32 +0000 (14:50 +0100)]
5.16-stable patches
added patches:
revert-acpi-pm-s2idle-cancel-wakeup-before-dispatching-ec-gpe.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 13:43:55 +0000 (14:43 +0100)]
drop queue-5.15/block-drop-unused-includes-in-linux-genhd.h.patch for now
Greg Kroah-Hartman [Thu, 10 Mar 2022 13:41:44 +0000 (14:41 +0100)]
4.14-stable patches
added patches:
xen-9p-use-alloc-free_pages_exact.patch
xen-blkfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-gntalloc-don-t-use-gnttab_query_foreign_access.patch
xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
xen-grant-table-add-gnttab_try_end_foreign_access.patch
xen-netfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref.patch
xen-remove-gnttab_query_foreign_access.patch
xen-scsifront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-xenbus-don-t-let-xenbus_grant_ring-remove-grants-in-error-case.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 13:41:34 +0000 (14:41 +0100)]
4.9-stable patches
added patches:
xen-blkfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-gntalloc-don-t-use-gnttab_query_foreign_access.patch
xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
xen-grant-table-add-gnttab_try_end_foreign_access.patch
xen-netfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref.patch
xen-remove-gnttab_query_foreign_access.patch
xen-scsifront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-xenbus-don-t-let-xenbus_grant_ring-remove-grants-in-error-case.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 13:39:54 +0000 (14:39 +0100)]
4.19-stable patches
added patches:
xen-9p-use-alloc-free_pages_exact.patch
xen-blkfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-gntalloc-don-t-use-gnttab_query_foreign_access.patch
xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
xen-grant-table-add-gnttab_try_end_foreign_access.patch
xen-netfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref.patch
xen-pvcalls-use-alloc-free_pages_exact.patch
xen-remove-gnttab_query_foreign_access.patch
xen-scsifront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-xenbus-don-t-let-xenbus_grant_ring-remove-grants-in-error-case.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 13:37:43 +0000 (14:37 +0100)]
5.4-stable patches
added patches:
xen-9p-use-alloc-free_pages_exact.patch
xen-blkfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-gntalloc-don-t-use-gnttab_query_foreign_access.patch
xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
xen-grant-table-add-gnttab_try_end_foreign_access.patch
xen-netfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref.patch
xen-pvcalls-use-alloc-free_pages_exact.patch
xen-remove-gnttab_query_foreign_access.patch
xen-scsifront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-xenbus-don-t-let-xenbus_grant_ring-remove-grants-in-error-case.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:47:19 +0000 (13:47 +0100)]
5.15-stable patches
added patches:
xen-9p-use-alloc-free_pages_exact.patch
xen-blkfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-gntalloc-don-t-use-gnttab_query_foreign_access.patch
xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
xen-grant-table-add-gnttab_try_end_foreign_access.patch
xen-netfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref.patch
xen-pvcalls-use-alloc-free_pages_exact.patch
xen-remove-gnttab_query_foreign_access.patch
xen-scsifront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-xenbus-don-t-let-xenbus_grant_ring-remove-grants-in-error-case.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:47:10 +0000 (13:47 +0100)]
5.10-stable patches
added patches:
xen-9p-use-alloc-free_pages_exact.patch
xen-blkfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-gntalloc-don-t-use-gnttab_query_foreign_access.patch
xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
xen-grant-table-add-gnttab_try_end_foreign_access.patch
xen-netfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref.patch
xen-pvcalls-use-alloc-free_pages_exact.patch
xen-remove-gnttab_query_foreign_access.patch
xen-scsifront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-xenbus-don-t-let-xenbus_grant_ring-remove-grants-in-error-case.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:39:50 +0000 (13:39 +0100)]
5.16-stable patches
added patches:
xen-9p-use-alloc-free_pages_exact.patch
xen-blkfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-gntalloc-don-t-use-gnttab_query_foreign_access.patch
xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
xen-grant-table-add-gnttab_try_end_foreign_access.patch
xen-netfront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref.patch
xen-pvcalls-use-alloc-free_pages_exact.patch
xen-remove-gnttab_query_foreign_access.patch
xen-scsifront-don-t-use-gnttab_query_foreign_access-for-mapped-status.patch
xen-xenbus-don-t-let-xenbus_grant_ring-remove-grants-in-error-case.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:25:32 +0000 (13:25 +0100)]
fix up x86-speculation-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
for 5.4 and 4.19
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:14:44 +0000 (13:14 +0100)]
5.16-stable patches
added patches:
arm-fix-build-warning-in-proc-v7-bugs.c.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:14:36 +0000 (13:14 +0100)]
5.15-stable patches
added patches:
arm-fix-build-warning-in-proc-v7-bugs.c.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:14:28 +0000 (13:14 +0100)]
5.10-stable patches
added patches:
arm-fix-build-warning-in-proc-v7-bugs.c.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:14:21 +0000 (13:14 +0100)]
5.4-stable patches
added patches:
arm-fix-build-warning-in-proc-v7-bugs.c.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:14:13 +0000 (13:14 +0100)]
4.19-stable patches
added patches:
arm-fix-build-warning-in-proc-v7-bugs.c.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:14:05 +0000 (13:14 +0100)]
4.14-stable patches
added patches:
arm-fix-build-warning-in-proc-v7-bugs.c.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 12:13:58 +0000 (13:13 +0100)]
4.9-stable patches
added patches:
arm-fix-build-warning-in-proc-v7-bugs.c.patch
Greg Kroah-Hartman [Thu, 10 Mar 2022 11:48:58 +0000 (12:48 +0100)]
typo in commit message fixed up
Greg Kroah-Hartman [Thu, 10 Mar 2022 09:18:20 +0000 (10:18 +0100)]
4.19-stable patches
added patches:
kbuild-add-config_ld_is_lld.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:44:25 +0000 (23:44 +0100)]
5.16-stable patches
added patches:
arm64-do-not-include-__read_once-block-in-assembly-files.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:44:10 +0000 (23:44 +0100)]
5.15-stable patches
added patches:
arm64-do-not-include-__read_once-block-in-assembly-files.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:39:01 +0000 (23:39 +0100)]
4.9-stable patches
added patches:
x86-build-fix-compiler-support-check-for-config_retpoline.patch
x86-modpost-replace-last-remnants-of-retpoline-with-config_retpoline.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:35:34 +0000 (23:35 +0100)]
4.14-stable patches
added patches:
arm-do-not-use-nocrossrefs-directive-with-ld.lld.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:35:21 +0000 (23:35 +0100)]
4.9-stable patches
added patches:
arm-do-not-use-nocrossrefs-directive-with-ld.lld.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:32:57 +0000 (23:32 +0100)]
4.19-stable patches
added patches:
arm-do-not-use-nocrossrefs-directive-with-ld.lld.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:32:42 +0000 (23:32 +0100)]
5.4-stable patches
added patches:
arm-do-not-use-nocrossrefs-directive-with-ld.lld.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:29:57 +0000 (23:29 +0100)]
5.16-stable patches
added patches:
arm-do-not-use-nocrossrefs-directive-with-ld.lld.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:29:45 +0000 (23:29 +0100)]
5.15-stable patches
added patches:
arm-do-not-use-nocrossrefs-directive-with-ld.lld.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 22:29:27 +0000 (23:29 +0100)]
5.10-stable patches
added patches:
arm-do-not-use-nocrossrefs-directive-with-ld.lld.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 21:20:13 +0000 (22:20 +0100)]
5.16-stable patches
added patches:
arm-fix-co-processor-register-typo.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 21:20:01 +0000 (22:20 +0100)]
5.15-stable patches
added patches:
arm-fix-co-processor-register-typo.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 21:19:50 +0000 (22:19 +0100)]
5.10-stable patches
added patches:
arm-fix-co-processor-register-typo.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 21:19:40 +0000 (22:19 +0100)]
5.4-stable patches
added patches:
arm-fix-co-processor-register-typo.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 21:19:29 +0000 (22:19 +0100)]
4.19-stable patches
added patches:
arm-fix-co-processor-register-typo.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 21:19:18 +0000 (22:19 +0100)]
4.14-stable patches
added patches:
arm-fix-co-processor-register-typo.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 21:19:07 +0000 (22:19 +0100)]
4.9-stable patches
added patches:
arm-fix-co-processor-register-typo.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 15:15:44 +0000 (16:15 +0100)]
4.9-stable patches
added patches:
documentation-add-section-about-cpu-vulnerabilities-for-spectre.patch
documentation-add-swapgs-description-to-the-spectre-v1-documentation.patch
documentation-hw-vuln-update-spectre-doc.patch
documentation-refer-to-config-randomize_base-for-kernel-address-space-randomization.patch
x86-bugs-unconditionally-allow-spectre_v2-retpoline-amd.patch
x86-retpoline-make-config_retpoline-depend-on-compiler-support.patch
x86-retpoline-remove-minimal-retpoline-support.patch
x86-speculation-add-eibrs-retpoline-options.patch
x86-speculation-add-retpoline_amd-support-to-the-inline-asm-call_nospec-variant.patch
x86-speculation-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
x86-speculation-merge-one-test-in-spectre_v2_user_select_mitigation.patch
x86-speculation-rename-retpoline_amd-to-retpoline_lfence.patch
x86-speculation-update-link-to-amd-speculation-whitepaper.patch
x86-speculation-use-generic-retpoline-by-default-on-amd.patch
x86-speculation-warn-about-eibrs-lfence-unprivileged-ebpf-smt.patch
x86-speculation-warn-about-spectre-v2-lfence-mitigation.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 15:03:46 +0000 (16:03 +0100)]
drop cpu-smt-create-and-export-cpu_smt_possible.patch from 4.14 and 4.19
not needed.
Greg Kroah-Hartman [Wed, 9 Mar 2022 14:57:23 +0000 (15:57 +0100)]
drop x86 spectre patches from 4.9
Greg Kroah-Hartman [Wed, 9 Mar 2022 13:37:22 +0000 (14:37 +0100)]
drop arm64 spectre patches from 5.4 again.
Greg Kroah-Hartman [Wed, 9 Mar 2022 13:08:41 +0000 (14:08 +0100)]
5.4-stable patches
added patches:
arm64-add-cortex-x2-cpu-part-definition.patch
arm64-add-id_aa64isar2_el1-sys-register.patch
arm64-add-neoverse-n2-cortex-a710-cpu-part-definition.patch
arm64-add-part-number-for-arm-cortex-a77.patch
arm64-add-percpu-vectors-for-el1.patch
arm64-entry-add-macro-for-reading-symbol-addresses-from-the-trampoline.patch
arm64-entry-add-non-kpti-__bp_harden_el1_vectors-for-mitigations.patch
arm64-entry-add-vectors-that-have-the-bhb-mitigation-sequences.patch
arm64-entry-allow-the-trampoline-text-to-occupy-multiple-pages.patch
arm64-entry-allow-tramp_alias-to-access-symbols-after-the-4k-boundary.patch
arm64-entry-don-t-assume-tramp_vectors-is-the-start-of-the-vectors.patch
arm64-entry-free-up-another-register-on-kpti-s-tramp_exit-path.patch
arm64-entry-make-the-kpti-trampoline-s-kpti-sequence-optional.patch
arm64-entry-make-the-trampoline-cleanup-optional.patch
arm64-entry-move-the-trampoline-data-page-before-the-text-page.patch
arm64-entry-move-trampoline-macros-out-of-ifdef-d-section.patch
arm64-entry.s-add-ventry-overflow-sanity-checks.patch
arm64-mitigate-spectre-style-branch-history-side-channels.patch
arm64-proton-pack-report-spectre-bhb-vulnerabilities-as-part-of-spectre-v2.patch
arm64-use-the-clearbhb-instruction-in-mitigations.patch
kvm-arm64-add-templates-for-bhb-mitigation-sequences.patch
kvm-arm64-allow-smccc_arch_workaround_3-to-be-discovered-and-migrated.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 13:05:53 +0000 (14:05 +0100)]
drop 5.4 arm64 spectra patches, got them all wrong...
Greg Kroah-Hartman [Wed, 9 Mar 2022 12:05:52 +0000 (13:05 +0100)]
5.4-stable patches
added patches:
arm64-add-cortex-x2-cpu-part-definition.patch
arm64-add-id_aa64isar2_el1-sys-register.patch
arm64-add-neoverse-n2-cortex-a710-cpu-part-definition.patch
arm64-add-part-number-for-arm-cortex-a77.patch
arm64-add-percpu-vectors-for-el1.patch
arm64-entry-add-macro-for-reading-symbol-addresses-from-the-trampoline.patch
arm64-entry-add-non-kpti-__bp_harden_el1_vectors-for-mitigations.patch
arm64-entry-add-vectors-that-have-the-bhb-mitigation-sequences.patch
arm64-entry-allow-the-trampoline-text-to-occupy-multiple-pages.patch
arm64-entry-allow-tramp_alias-to-access-symbols-after-the-4k-boundary.patch
arm64-entry-don-t-assume-tramp_vectors-is-the-start-of-the-vectors.patch
arm64-entry-free-up-another-register-on-kpti-s-tramp_exit-path.patch
arm64-entry-make-the-kpti-trampoline-s-kpti-sequence-optional.patch
arm64-entry-make-the-trampoline-cleanup-optional.patch
arm64-entry-move-the-trampoline-data-page-before-the-text-page.patch
arm64-entry-move-trampoline-macros-out-of-ifdef-d-section.patch
arm64-entry.s-add-ventry-overflow-sanity-checks.patch
arm64-mitigate-spectre-style-branch-history-side-channels.patch
arm64-proton-pack-report-spectre-bhb-vulnerabilities-as-part-of-spectre-v2.patch
arm64-use-the-clearbhb-instruction-in-mitigations.patch
kvm-arm64-add-templates-for-bhb-mitigation-sequences.patch
kvm-arm64-allow-smccc_arch_workaround_3-to-be-discovered-and-migrated.patch
Greg Kroah-Hartman [Wed, 9 Mar 2022 11:49:06 +0000 (12:49 +0100)]
5.15-stable patches
added patches:
block-drop-unused-includes-in-linux-genhd.h.patch
slip-fix-macro-redefine-warning.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 21:01:37 +0000 (22:01 +0100)]
5.16-stable patches
added patches:
arm-fix-build-error-when-bpf_syscall-is-disabled.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 21:01:30 +0000 (22:01 +0100)]
5.15-stable patches
added patches:
arm-fix-build-error-when-bpf_syscall-is-disabled.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 21:01:22 +0000 (22:01 +0100)]
5.10-stable patches
added patches:
arm-fix-build-error-when-bpf_syscall-is-disabled.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 21:01:15 +0000 (22:01 +0100)]
5.4-stable patches
added patches:
arm-fix-build-error-when-bpf_syscall-is-disabled.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 21:01:07 +0000 (22:01 +0100)]
4.19-stable patches
added patches:
arm-fix-build-error-when-bpf_syscall-is-disabled.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 21:00:56 +0000 (22:00 +0100)]
4.14-stable patches
added patches:
arm-fix-build-error-when-bpf_syscall-is-disabled.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 21:00:43 +0000 (22:00 +0100)]
4.9-stable patches
added patches:
arm-fix-build-error-when-bpf_syscall-is-disabled.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:49:29 +0000 (20:49 +0100)]
5.10-stable patches
added patches:
arm64-add-cortex-a510-cpu-part-definition.patch
arm64-add-cortex-x2-cpu-part-definition.patch
arm64-add-hwcap-for-self-synchronising-virtual-counter.patch
arm64-add-id_aa64isar2_el1-sys-register.patch
arm64-add-neoverse-n2-cortex-a710-cpu-part-definition.patch
arm64-add-percpu-vectors-for-el1.patch
arm64-cpufeature-add-hwcap-for-feat_afp.patch
arm64-cpufeature-add-hwcap-for-feat_rpres.patch
arm64-cputype-add-cpu-implementor-types-for-the-apple-m1-cores.patch
arm64-entry-add-macro-for-reading-symbol-addresses-from-the-trampoline.patch
arm64-entry-add-non-kpti-__bp_harden_el1_vectors-for-mitigations.patch
arm64-entry-add-vectors-that-have-the-bhb-mitigation-sequences.patch
arm64-entry-allow-the-trampoline-text-to-occupy-multiple-pages.patch
arm64-entry-allow-tramp_alias-to-access-symbols-after-the-4k-boundary.patch
arm64-entry-don-t-assume-tramp_vectors-is-the-start-of-the-vectors.patch
arm64-entry-free-up-another-register-on-kpti-s-tramp_exit-path.patch
arm64-entry-make-the-kpti-trampoline-s-kpti-sequence-optional.patch
arm64-entry-make-the-trampoline-cleanup-optional.patch
arm64-entry-move-the-trampoline-data-page-before-the-text-page.patch
arm64-entry-move-trampoline-macros-out-of-ifdef-d-section.patch
arm64-entry.s-add-ventry-overflow-sanity-checks.patch
arm64-mitigate-spectre-style-branch-history-side-channels.patch
arm64-proton-pack-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
arm64-proton-pack-report-spectre-bhb-vulnerabilities-as-part-of-spectre-v2.patch
arm64-spectre-rename-spectre_v4_patch_fw_mitigation_conduit.patch
arm64-use-the-clearbhb-instruction-in-mitigations.patch
kvm-arm64-allow-indirect-vectors-to-be-used-without-spectre_v3a.patch
kvm-arm64-allow-smccc_arch_workaround_3-to-be-discovered-and-migrated.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:48:04 +0000 (20:48 +0100)]
5.15-stable patches
added patches:
arm64-add-cortex-x2-cpu-part-definition.patch
arm64-add-hwcap-for-self-synchronising-virtual-counter.patch
arm64-add-id_aa64isar2_el1-sys-register.patch
arm64-add-neoverse-n2-cortex-a710-cpu-part-definition.patch
arm64-add-percpu-vectors-for-el1.patch
arm64-cpufeature-add-hwcap-for-feat_afp.patch
arm64-cpufeature-add-hwcap-for-feat_rpres.patch
arm64-entry-add-macro-for-reading-symbol-addresses-from-the-trampoline.patch
arm64-entry-add-non-kpti-__bp_harden_el1_vectors-for-mitigations.patch
arm64-entry-add-vectors-that-have-the-bhb-mitigation-sequences.patch
arm64-entry-allow-the-trampoline-text-to-occupy-multiple-pages.patch
arm64-entry-allow-tramp_alias-to-access-symbols-after-the-4k-boundary.patch
arm64-entry-don-t-assume-tramp_vectors-is-the-start-of-the-vectors.patch
arm64-entry-free-up-another-register-on-kpti-s-tramp_exit-path.patch
arm64-entry-make-the-kpti-trampoline-s-kpti-sequence-optional.patch
arm64-entry-make-the-trampoline-cleanup-optional.patch
arm64-entry-move-the-trampoline-data-page-before-the-text-page.patch
arm64-entry-move-trampoline-macros-out-of-ifdef-d-section.patch
arm64-entry.s-add-ventry-overflow-sanity-checks.patch
arm64-mitigate-spectre-style-branch-history-side-channels.patch
arm64-proton-pack-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
arm64-proton-pack-report-spectre-bhb-vulnerabilities-as-part-of-spectre-v2.patch
arm64-spectre-rename-spectre_v4_patch_fw_mitigation_conduit.patch
arm64-use-the-clearbhb-instruction-in-mitigations.patch
kvm-arm64-allow-indirect-vectors-to-be-used-without-spectre_v3a.patch
kvm-arm64-allow-smccc_arch_workaround_3-to-be-discovered-and-migrated.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:46:05 +0000 (20:46 +0100)]
5.16-stable patches
added patches:
arm64-add-id_aa64isar2_el1-sys-register.patch
arm64-add-percpu-vectors-for-el1.patch
arm64-cpufeature-add-hwcap-for-feat_afp.patch
arm64-cpufeature-add-hwcap-for-feat_rpres.patch
arm64-entry-add-macro-for-reading-symbol-addresses-from-the-trampoline.patch
arm64-entry-add-non-kpti-__bp_harden_el1_vectors-for-mitigations.patch
arm64-entry-add-vectors-that-have-the-bhb-mitigation-sequences.patch
arm64-entry-allow-the-trampoline-text-to-occupy-multiple-pages.patch
arm64-entry-allow-tramp_alias-to-access-symbols-after-the-4k-boundary.patch
arm64-entry-don-t-assume-tramp_vectors-is-the-start-of-the-vectors.patch
arm64-entry-free-up-another-register-on-kpti-s-tramp_exit-path.patch
arm64-entry-make-the-kpti-trampoline-s-kpti-sequence-optional.patch
arm64-entry-make-the-trampoline-cleanup-optional.patch
arm64-entry-move-the-trampoline-data-page-before-the-text-page.patch
arm64-entry-move-trampoline-macros-out-of-ifdef-d-section.patch
arm64-entry.s-add-ventry-overflow-sanity-checks.patch
arm64-mitigate-spectre-style-branch-history-side-channels.patch
arm64-proton-pack-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
arm64-proton-pack-report-spectre-bhb-vulnerabilities-as-part-of-spectre-v2.patch
arm64-spectre-rename-spectre_v4_patch_fw_mitigation_conduit.patch
arm64-use-the-clearbhb-instruction-in-mitigations.patch
kvm-arm64-allow-indirect-vectors-to-be-used-without-spectre_v3a.patch
kvm-arm64-allow-smccc_arch_workaround_3-to-be-discovered-and-migrated.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:41:54 +0000 (20:41 +0100)]
4.9-stable patches
added patches:
arm-arm64-provide-a-wrapper-for-smccc-1.1-calls.patch
arm-arm64-smccc-psci-add-arm_smccc_1_1_get_conduit.patch
arm-early-traps-initialisation.patch
arm-include-unprivileged-bpf-status-in-spectre-v2-reporting.patch
arm-report-spectre-v2-status-through-sysfs.patch
arm-spectre-bhb-workaround.patch
arm-use-loadaddr-to-get-load-address-of-sections.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:40:46 +0000 (20:40 +0100)]
4.14-stable patches
added patches:
arm-arm64-provide-a-wrapper-for-smccc-1.1-calls.patch
arm-arm64-smccc-psci-add-arm_smccc_1_1_get_conduit.patch
arm-early-traps-initialisation.patch
arm-include-unprivileged-bpf-status-in-spectre-v2-reporting.patch
arm-report-spectre-v2-status-through-sysfs.patch
arm-spectre-bhb-workaround.patch
arm-use-loadaddr-to-get-load-address-of-sections.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:38:22 +0000 (20:38 +0100)]
4.19-stable patches
added patches:
arm-arm64-provide-a-wrapper-for-smccc-1.1-calls.patch
arm-arm64-smccc-psci-add-arm_smccc_1_1_get_conduit.patch
arm-early-traps-initialisation.patch
arm-include-unprivileged-bpf-status-in-spectre-v2-reporting.patch
arm-report-spectre-v2-status-through-sysfs.patch
arm-spectre-bhb-workaround.patch
arm-use-loadaddr-to-get-load-address-of-sections.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:36:58 +0000 (20:36 +0100)]
5.4-stable patches
added patches:
arm-arm64-provide-a-wrapper-for-smccc-1.1-calls.patch
arm-arm64-smccc-psci-add-arm_smccc_1_1_get_conduit.patch
arm-early-traps-initialisation.patch
arm-include-unprivileged-bpf-status-in-spectre-v2-reporting.patch
arm-report-spectre-v2-status-through-sysfs.patch
arm-spectre-bhb-workaround.patch
arm-use-loadaddr-to-get-load-address-of-sections.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:34:53 +0000 (20:34 +0100)]
5.15-stable patches
added patches:
arm-early-traps-initialisation.patch
arm-include-unprivileged-bpf-status-in-spectre-v2-reporting.patch
arm-report-spectre-v2-status-through-sysfs.patch
arm-spectre-bhb-workaround.patch
arm-use-loadaddr-to-get-load-address-of-sections.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:34:35 +0000 (20:34 +0100)]
5.10-stable patches
added patches:
arm-early-traps-initialisation.patch
arm-include-unprivileged-bpf-status-in-spectre-v2-reporting.patch
arm-report-spectre-v2-status-through-sysfs.patch
arm-spectre-bhb-workaround.patch
arm-use-loadaddr-to-get-load-address-of-sections.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 19:32:06 +0000 (20:32 +0100)]
5.16-stable patches
added patches:
arm-early-traps-initialisation.patch
arm-include-unprivileged-bpf-status-in-spectre-v2-reporting.patch
arm-report-spectre-v2-status-through-sysfs.patch
arm-spectre-bhb-workaround.patch
arm-use-loadaddr-to-get-load-address-of-sections.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:53:00 +0000 (19:53 +0100)]
4.9-stable patches
added patches:
cpu-smt-create-and-export-cpu_smt_possible.patch
documentation-hw-vuln-update-spectre-doc.patch
x86-bugs-unconditionally-allow-spectre_v2-retpoline-amd.patch
x86-speculation-add-eibrs-retpoline-options.patch
x86-speculation-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
x86-speculation-merge-one-test-in-spectre_v2_user_select_mitigation.patch
x86-speculation-rename-retpoline_amd-to-retpoline_lfence.patch
x86-speculation-use-generic-retpoline-by-default-on-amd.patch
x86-speculation-warn-about-eibrs-lfence-unprivileged-ebpf-smt.patch
x86-speculation-warn-about-spectre-v2-lfence-mitigation.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:51:07 +0000 (19:51 +0100)]
4.14-stable patches
added patches:
cpu-smt-create-and-export-cpu_smt_possible.patch
documentation-hw-vuln-update-spectre-doc.patch
x86-bugs-unconditionally-allow-spectre_v2-retpoline-amd.patch
x86-speculation-add-eibrs-retpoline-options.patch
x86-speculation-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
x86-speculation-merge-one-test-in-spectre_v2_user_select_mitigation.patch
x86-speculation-rename-retpoline_amd-to-retpoline_lfence.patch
x86-speculation-update-link-to-amd-speculation-whitepaper.patch
x86-speculation-use-generic-retpoline-by-default-on-amd.patch
x86-speculation-warn-about-eibrs-lfence-unprivileged-ebpf-smt.patch
x86-speculation-warn-about-spectre-v2-lfence-mitigation.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:49:01 +0000 (19:49 +0100)]
4.19-stable patches
added patches:
cpu-smt-create-and-export-cpu_smt_possible.patch
documentation-hw-vuln-update-spectre-doc.patch
x86-bugs-unconditionally-allow-spectre_v2-retpoline-amd.patch
x86-speculation-add-eibrs-retpoline-options.patch
x86-speculation-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
x86-speculation-merge-one-test-in-spectre_v2_user_select_mitigation.patch
x86-speculation-rename-retpoline_amd-to-retpoline_lfence.patch
x86-speculation-update-link-to-amd-speculation-whitepaper.patch
x86-speculation-use-generic-retpoline-by-default-on-amd.patch
x86-speculation-warn-about-eibrs-lfence-unprivileged-ebpf-smt.patch
x86-speculation-warn-about-spectre-v2-lfence-mitigation.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:46:51 +0000 (19:46 +0100)]
5.4-stable patches
added patches:
documentation-hw-vuln-update-spectre-doc.patch
x86-bugs-unconditionally-allow-spectre_v2-retpoline-amd.patch
x86-speculation-add-eibrs-retpoline-options.patch
x86-speculation-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
x86-speculation-merge-one-test-in-spectre_v2_user_select_mitigation.patch
x86-speculation-rename-retpoline_amd-to-retpoline_lfence.patch
x86-speculation-update-link-to-amd-speculation-whitepaper.patch
x86-speculation-use-generic-retpoline-by-default-on-amd.patch
x86-speculation-warn-about-eibrs-lfence-unprivileged-ebpf-smt.patch
x86-speculation-warn-about-spectre-v2-lfence-mitigation.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:45:28 +0000 (19:45 +0100)]
5.10-stable patches
added patches:
documentation-hw-vuln-update-spectre-doc.patch
x86-bugs-unconditionally-allow-spectre_v2-retpoline-amd.patch
x86-speculation-add-eibrs-retpoline-options.patch
x86-speculation-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
x86-speculation-rename-retpoline_amd-to-retpoline_lfence.patch
x86-speculation-update-link-to-amd-speculation-whitepaper.patch
x86-speculation-use-generic-retpoline-by-default-on-amd.patch
x86-speculation-warn-about-eibrs-lfence-unprivileged-ebpf-smt.patch
x86-speculation-warn-about-spectre-v2-lfence-mitigation.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:40:09 +0000 (19:40 +0100)]
5.15-stable patches
added patches:
documentation-hw-vuln-update-spectre-doc.patch
x86-bugs-unconditionally-allow-spectre_v2-retpoline-amd.patch
x86-speculation-add-eibrs-retpoline-options.patch
x86-speculation-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
x86-speculation-rename-retpoline_amd-to-retpoline_lfence.patch
x86-speculation-update-link-to-amd-speculation-whitepaper.patch
x86-speculation-use-generic-retpoline-by-default-on-amd.patch
x86-speculation-warn-about-eibrs-lfence-unprivileged-ebpf-smt.patch
x86-speculation-warn-about-spectre-v2-lfence-mitigation.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:36:33 +0000 (19:36 +0100)]
5.16-stable patches
added patches:
documentation-hw-vuln-update-spectre-doc.patch
x86-speculation-add-eibrs-retpoline-options.patch
x86-speculation-include-unprivileged-ebpf-status-in-spectre-v2-mitigation-reporting.patch
x86-speculation-rename-retpoline_amd-to-retpoline_lfence.patch
x86-speculation-update-link-to-amd-speculation-whitepaper.patch
x86-speculation-use-generic-retpoline-by-default-on-amd.patch
x86-speculation-warn-about-eibrs-lfence-unprivileged-ebpf-smt.patch
x86-speculation-warn-about-spectre-v2-lfence-mitigation.patch
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:15:41 +0000 (19:15 +0100)]
Linux 5.16.13
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:13:08 +0000 (19:13 +0100)]
Linux 5.15.27
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:09:55 +0000 (19:09 +0100)]
Linux 5.10.104
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:08:06 +0000 (19:08 +0100)]
Linux 5.4.183
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:04:25 +0000 (19:04 +0100)]
Linux 4.19.233
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:02:54 +0000 (19:02 +0100)]
Linux 4.14.270
Greg Kroah-Hartman [Tue, 8 Mar 2022 18:01:18 +0000 (19:01 +0100)]
Linux 4.9.305
Greg Kroah-Hartman [Mon, 7 Mar 2022 16:42:59 +0000 (17:42 +0100)]
5.15-stable patches
added patches:
hamradio-fix-macro-redefine-warning.patch
Greg Kroah-Hartman [Mon, 7 Mar 2022 16:42:50 +0000 (17:42 +0100)]
5.10-stable patches
added patches:
hamradio-fix-macro-redefine-warning.patch
Greg Kroah-Hartman [Mon, 7 Mar 2022 16:42:40 +0000 (17:42 +0100)]
5.4-stable patches
added patches:
hamradio-fix-macro-redefine-warning.patch
Greg Kroah-Hartman [Mon, 7 Mar 2022 16:42:30 +0000 (17:42 +0100)]
4.19-stable patches
added patches:
hamradio-fix-macro-redefine-warning.patch
Greg Kroah-Hartman [Mon, 7 Mar 2022 16:42:22 +0000 (17:42 +0100)]
4.14-stable patches
added patches:
hamradio-fix-macro-redefine-warning.patch
Greg Kroah-Hartman [Mon, 7 Mar 2022 16:42:13 +0000 (17:42 +0100)]
4.9-stable patches
added patches:
hamradio-fix-macro-redefine-warning.patch
Greg Kroah-Hartman [Mon, 7 Mar 2022 16:17:20 +0000 (17:17 +0100)]
drop queue-5.15/bpf-arm64-use-emit_addr_mov_i64-for-bpf_pseudo_func.patch and queue-5.15/drm-mediatek-mtk_dsi-avoid-eprobe_defer-loop-with-ex.patch