]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commit
4.14-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 27 Apr 2018 08:57:11 +0000 (10:57 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 27 Apr 2018 08:57:11 +0000 (10:57 +0200)
commit603ac88f90f1e2083d05f2ff554aa5fae6aa3993
treec7cf7bd43a90c2b8f30a20c7109beaa1ac704fe7
parentd6c6d0e07a21597c07c0bc760eb6ddd6c1b087b5
4.14-stable patches

added patches:
kvm-s390-force-bp-isolation-for-vsie.patch
kvm-s390-wire-up-bpb-feature.patch
s390-add-automatic-detection-of-the-spectre-defense.patch
s390-add-optimized-array_index_mask_nospec.patch
s390-add-options-to-change-branch-prediction-behaviour-for-the-kernel.patch
s390-add-sysfs-attributes-for-spectre.patch
s390-alternative-use-a-copy-of-the-facility-bit-mask.patch
s390-correct-module-section-names-for-expoline-code-revert.patch
s390-correct-nospec-auto-detection-init-order.patch
s390-do-not-bypass-bpenter-for-interrupt-system-calls.patch
s390-enable-cpu-alternatives-unconditionally.patch
s390-entry.s-fix-spurious-zeroing-of-r0.patch
s390-introduce-cpu-alternatives.patch
s390-introduce-execute-trampolines-for-branches.patch
s390-move-nobp-parameter-functions-to-nospec-branch.c.patch
s390-replace-is_enabled-expoline_-with-is_enabled-config_expoline_.patch
s390-report-spectre-mitigation-via-syslog.patch
s390-run-user-space-and-kvm-guests-with-modified-branch-prediction.patch
s390-scrub-registers-on-kernel-entry-and-kvm-exit.patch
20 files changed:
queue-4.14/kvm-s390-force-bp-isolation-for-vsie.patch [new file with mode: 0644]
queue-4.14/kvm-s390-wire-up-bpb-feature.patch [new file with mode: 0644]
queue-4.14/s390-add-automatic-detection-of-the-spectre-defense.patch [new file with mode: 0644]
queue-4.14/s390-add-optimized-array_index_mask_nospec.patch [new file with mode: 0644]
queue-4.14/s390-add-options-to-change-branch-prediction-behaviour-for-the-kernel.patch [new file with mode: 0644]
queue-4.14/s390-add-sysfs-attributes-for-spectre.patch [new file with mode: 0644]
queue-4.14/s390-alternative-use-a-copy-of-the-facility-bit-mask.patch [new file with mode: 0644]
queue-4.14/s390-correct-module-section-names-for-expoline-code-revert.patch [new file with mode: 0644]
queue-4.14/s390-correct-nospec-auto-detection-init-order.patch [new file with mode: 0644]
queue-4.14/s390-do-not-bypass-bpenter-for-interrupt-system-calls.patch [new file with mode: 0644]
queue-4.14/s390-enable-cpu-alternatives-unconditionally.patch [new file with mode: 0644]
queue-4.14/s390-entry.s-fix-spurious-zeroing-of-r0.patch [new file with mode: 0644]
queue-4.14/s390-introduce-cpu-alternatives.patch [new file with mode: 0644]
queue-4.14/s390-introduce-execute-trampolines-for-branches.patch [new file with mode: 0644]
queue-4.14/s390-move-nobp-parameter-functions-to-nospec-branch.c.patch [new file with mode: 0644]
queue-4.14/s390-replace-is_enabled-expoline_-with-is_enabled-config_expoline_.patch [new file with mode: 0644]
queue-4.14/s390-report-spectre-mitigation-via-syslog.patch [new file with mode: 0644]
queue-4.14/s390-run-user-space-and-kvm-guests-with-modified-branch-prediction.patch [new file with mode: 0644]
queue-4.14/s390-scrub-registers-on-kernel-entry-and-kvm-exit.patch [new file with mode: 0644]
queue-4.14/series