]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commit
4.4-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 23 Jul 2018 09:22:42 +0000 (11:22 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 23 Jul 2018 09:22:42 +0000 (11:22 +0200)
commite9e21f07450fe07ffdf44909f1b9a4a8636f0fbc
treeb7628838b1689a933d5ffb336625bf625a1d43ce
parent63c633bade19b87525ba40d820c74f6a18d027b8
4.4-stable patches

added patches:
documentation-spec_ctrl-do-some-minor-cleanups.patch
nospec-allow-getting-setting-on-non-current-task.patch
prctl-add-force-disable-speculation.patch
prctl-add-speculation-control-prctls.patch
proc-provide-details-on-speculation-flaw-mitigations.patch
proc-use-underscores-for-ssbd-in-status.patch
seccomp-add-filter-flag-to-opt-out-of-ssb-mitigation.patch
seccomp-enable-speculation-flaw-mitigations.patch
seccomp-move-speculation-migitation-control-to-arch-code.patch
seccomp-use-pr_spec_force_disable.patch
selftest-seccomp-fix-the-flag-name-seccomp_filter_flag_tsync.patch
selftest-seccomp-fix-the-seccomp-2-signature.patch
x86-amd-don-t-set-x86_bug_sysret_ss_attrs-when-running-under-xen.patch
x86-asm-entry-32-simplify-pushes-of-zeroed-pt_regs-regs.patch
x86-bugs-amd-add-support-to-disable-rds-on-famh-if-requested.patch
x86-bugs-concentrate-bug-detection-into-a-separate-function.patch
x86-bugs-concentrate-bug-reporting-into-a-separate-function.patch
x86-bugs-expose-sys-..-spec_store_bypass.patch
x86-bugs-expose-x86_spec_ctrl_base-directly.patch
x86-bugs-fix-__ssb_select_mitigation-return-type.patch
x86-bugs-fix-the-parameters-alignment-and-missing-void.patch
x86-bugs-intel-set-proper-cpu-features-and-setup-rds.patch
x86-bugs-kvm-extend-speculation-control-for-virt_spec_ctrl.patch
x86-bugs-kvm-support-the-combination-of-guest-and-host-ibrs.patch
x86-bugs-make-cpu_show_common-static.patch
x86-bugs-provide-boot-parameters-for-the-spec_store_bypass_disable-mitigation.patch
x86-bugs-read-spec_ctrl-msr-during-boot-and-re-use-reserved-bits.patch
x86-bugs-remove-x86_spec_ctrl_set.patch
x86-bugs-rename-_rds-to-_ssbd.patch
x86-bugs-rename-ssbd_no-to-ssb_no.patch
x86-bugs-rework-spec_ctrl-base-and-mask-logic.patch
x86-bugs-unify-x86_spec_ctrl_-set_guest-restore_host.patch
x86-bugs-whitelist-allowed-spec_ctrl-msr-values.patch
x86-cpu-amd-fix-erratum-1076-cpb-bit.patch
x86-cpu-intel-add-knights-mill-to-intel-family.patch
x86-cpu-make-alternative_msr_write-work-for-32-bit-code.patch
x86-cpu-rename-merrifield2-to-moorefield.patch
x86-cpufeature-blacklist-spec_ctrl-pred_cmd-on-early-spectre-v2-microcodes.patch
x86-cpufeatures-add-amd-feature-bits-for-speculation-control.patch
x86-cpufeatures-add-cpuid_7_edx-cpuid-leaf.patch
x86-cpufeatures-add-feature_zen.patch
x86-cpufeatures-add-intel-feature-bits-for-speculation-control.patch
x86-cpufeatures-add-x86_feature_rds.patch
x86-cpufeatures-clean-up-spectre-v2-related-cpuid-flags.patch
x86-cpufeatures-disentangle-msr_spec_ctrl-enumeration-from-ibrs.patch
x86-cpufeatures-disentangle-ssbd-enumeration.patch
x86-cpuid-fix-up-virtual-ibrs-ibpb-stibp-feature-bits-on-intel.patch
x86-entry-64-compat-clear-registers-for-compat-syscalls-to-reduce-speculation-attack-surface.patch
x86-mm-factor-out-ldt-init-from-context-init.patch
x86-mm-give-each-mm-tlb-flush-generation-a-unique-id.patch
x86-msr-add-definitions-for-new-speculation-control-msrs.patch
x86-nospec-simplify-alternative_msr_write.patch
x86-process-allow-runtime-control-of-speculative-store-bypass.patch
x86-process-correct-and-optimize-tif_blockstep-switch.patch
x86-process-optimize-tif-checks-in-__switch_to_xtra.patch
x86-process-optimize-tif_notsc-switch.patch
x86-pti-do-not-enable-pti-on-cpus-which-are-not-vulnerable-to-meltdown.patch
x86-pti-mark-constant-arrays-as-__initconst.patch
x86-spectre_v2-don-t-check-microcode-versions-when-running-under-hypervisors.patch
x86-speculation-add-asm-msr-index.h-dependency.patch
x86-speculation-add-basic-ibpb-indirect-branch-prediction-barrier-support.patch
x86-speculation-add-prctl-for-speculative-store-bypass-mitigation.patch
x86-speculation-add-virtualized-speculative-store-bypass-disable-support.patch
x86-speculation-clean-up-various-spectre-related-details.patch
x86-speculation-correct-speculation-control-microcode-blacklist-again.patch
x86-speculation-create-spec-ctrl.h-to-avoid-include-hell.patch
x86-speculation-fix-up-array_index_nospec_mask-asm-constraint.patch
x86-speculation-handle-ht-correctly-on-amd.patch
x86-speculation-kvm-implement-support-for-virt_spec_ctrl-ls_cfg.patch
x86-speculation-make-seccomp-the-default-mode-for-speculative-store-bypass.patch
x86-speculation-move-firmware_restrict_branch_speculation_-from-c-to-cpp.patch
x86-speculation-remove-skylake-c2-from-speculation-control-microcode-blacklist.patch
x86-speculation-rework-speculative_store_bypass_update.patch
x86-speculation-update-speculation-control-microcode-blacklist.patch
x86-speculation-use-ibrs-if-available-before-calling-into-firmware.patch
x86-speculation-use-indirect-branch-prediction-barrier-in-context-switch.patch
x86-speculation-use-synthetic-bits-for-ibrs-ibpb-stibp.patch
x86-xen-zero-msr_ia32_spec_ctrl-before-suspend.patch
xen-set-cpu-capabilities-from-xen_start_kernel.patch
80 files changed:
queue-4.4/documentation-spec_ctrl-do-some-minor-cleanups.patch [new file with mode: 0644]
queue-4.4/nospec-allow-getting-setting-on-non-current-task.patch [new file with mode: 0644]
queue-4.4/prctl-add-force-disable-speculation.patch [new file with mode: 0644]
queue-4.4/prctl-add-speculation-control-prctls.patch [new file with mode: 0644]
queue-4.4/proc-provide-details-on-speculation-flaw-mitigations.patch [new file with mode: 0644]
queue-4.4/proc-use-underscores-for-ssbd-in-status.patch [new file with mode: 0644]
queue-4.4/seccomp-add-filter-flag-to-opt-out-of-ssb-mitigation.patch [new file with mode: 0644]
queue-4.4/seccomp-enable-speculation-flaw-mitigations.patch [new file with mode: 0644]
queue-4.4/seccomp-move-speculation-migitation-control-to-arch-code.patch [new file with mode: 0644]
queue-4.4/seccomp-use-pr_spec_force_disable.patch [new file with mode: 0644]
queue-4.4/selftest-seccomp-fix-the-flag-name-seccomp_filter_flag_tsync.patch [new file with mode: 0644]
queue-4.4/selftest-seccomp-fix-the-seccomp-2-signature.patch [new file with mode: 0644]
queue-4.4/series
queue-4.4/x86-amd-don-t-set-x86_bug_sysret_ss_attrs-when-running-under-xen.patch [new file with mode: 0644]
queue-4.4/x86-asm-entry-32-simplify-pushes-of-zeroed-pt_regs-regs.patch [new file with mode: 0644]
queue-4.4/x86-bugs-amd-add-support-to-disable-rds-on-famh-if-requested.patch [new file with mode: 0644]
queue-4.4/x86-bugs-concentrate-bug-detection-into-a-separate-function.patch [new file with mode: 0644]
queue-4.4/x86-bugs-concentrate-bug-reporting-into-a-separate-function.patch [new file with mode: 0644]
queue-4.4/x86-bugs-expose-sys-..-spec_store_bypass.patch [new file with mode: 0644]
queue-4.4/x86-bugs-expose-x86_spec_ctrl_base-directly.patch [new file with mode: 0644]
queue-4.4/x86-bugs-fix-__ssb_select_mitigation-return-type.patch [new file with mode: 0644]
queue-4.4/x86-bugs-fix-the-parameters-alignment-and-missing-void.patch [new file with mode: 0644]
queue-4.4/x86-bugs-intel-set-proper-cpu-features-and-setup-rds.patch [new file with mode: 0644]
queue-4.4/x86-bugs-kvm-extend-speculation-control-for-virt_spec_ctrl.patch [new file with mode: 0644]
queue-4.4/x86-bugs-kvm-support-the-combination-of-guest-and-host-ibrs.patch [new file with mode: 0644]
queue-4.4/x86-bugs-make-cpu_show_common-static.patch [new file with mode: 0644]
queue-4.4/x86-bugs-provide-boot-parameters-for-the-spec_store_bypass_disable-mitigation.patch [new file with mode: 0644]
queue-4.4/x86-bugs-read-spec_ctrl-msr-during-boot-and-re-use-reserved-bits.patch [new file with mode: 0644]
queue-4.4/x86-bugs-remove-x86_spec_ctrl_set.patch [new file with mode: 0644]
queue-4.4/x86-bugs-rename-_rds-to-_ssbd.patch [new file with mode: 0644]
queue-4.4/x86-bugs-rename-ssbd_no-to-ssb_no.patch [new file with mode: 0644]
queue-4.4/x86-bugs-rework-spec_ctrl-base-and-mask-logic.patch [new file with mode: 0644]
queue-4.4/x86-bugs-unify-x86_spec_ctrl_-set_guest-restore_host.patch [new file with mode: 0644]
queue-4.4/x86-bugs-whitelist-allowed-spec_ctrl-msr-values.patch [new file with mode: 0644]
queue-4.4/x86-cpu-amd-fix-erratum-1076-cpb-bit.patch [new file with mode: 0644]
queue-4.4/x86-cpu-intel-add-knights-mill-to-intel-family.patch [new file with mode: 0644]
queue-4.4/x86-cpu-make-alternative_msr_write-work-for-32-bit-code.patch [new file with mode: 0644]
queue-4.4/x86-cpu-rename-merrifield2-to-moorefield.patch [new file with mode: 0644]
queue-4.4/x86-cpufeature-blacklist-spec_ctrl-pred_cmd-on-early-spectre-v2-microcodes.patch [new file with mode: 0644]
queue-4.4/x86-cpufeatures-add-amd-feature-bits-for-speculation-control.patch [new file with mode: 0644]
queue-4.4/x86-cpufeatures-add-cpuid_7_edx-cpuid-leaf.patch [new file with mode: 0644]
queue-4.4/x86-cpufeatures-add-feature_zen.patch [new file with mode: 0644]
queue-4.4/x86-cpufeatures-add-intel-feature-bits-for-speculation-control.patch [new file with mode: 0644]
queue-4.4/x86-cpufeatures-add-x86_feature_rds.patch [new file with mode: 0644]
queue-4.4/x86-cpufeatures-clean-up-spectre-v2-related-cpuid-flags.patch [new file with mode: 0644]
queue-4.4/x86-cpufeatures-disentangle-msr_spec_ctrl-enumeration-from-ibrs.patch [new file with mode: 0644]
queue-4.4/x86-cpufeatures-disentangle-ssbd-enumeration.patch [new file with mode: 0644]
queue-4.4/x86-cpuid-fix-up-virtual-ibrs-ibpb-stibp-feature-bits-on-intel.patch [new file with mode: 0644]
queue-4.4/x86-entry-64-compat-clear-registers-for-compat-syscalls-to-reduce-speculation-attack-surface.patch [new file with mode: 0644]
queue-4.4/x86-mm-factor-out-ldt-init-from-context-init.patch [new file with mode: 0644]
queue-4.4/x86-mm-give-each-mm-tlb-flush-generation-a-unique-id.patch [new file with mode: 0644]
queue-4.4/x86-msr-add-definitions-for-new-speculation-control-msrs.patch [new file with mode: 0644]
queue-4.4/x86-nospec-simplify-alternative_msr_write.patch [new file with mode: 0644]
queue-4.4/x86-process-allow-runtime-control-of-speculative-store-bypass.patch [new file with mode: 0644]
queue-4.4/x86-process-correct-and-optimize-tif_blockstep-switch.patch [new file with mode: 0644]
queue-4.4/x86-process-optimize-tif-checks-in-__switch_to_xtra.patch [new file with mode: 0644]
queue-4.4/x86-process-optimize-tif_notsc-switch.patch [new file with mode: 0644]
queue-4.4/x86-pti-do-not-enable-pti-on-cpus-which-are-not-vulnerable-to-meltdown.patch [new file with mode: 0644]
queue-4.4/x86-pti-mark-constant-arrays-as-__initconst.patch [new file with mode: 0644]
queue-4.4/x86-spectre_v2-don-t-check-microcode-versions-when-running-under-hypervisors.patch [new file with mode: 0644]
queue-4.4/x86-speculation-add-asm-msr-index.h-dependency.patch [new file with mode: 0644]
queue-4.4/x86-speculation-add-basic-ibpb-indirect-branch-prediction-barrier-support.patch [new file with mode: 0644]
queue-4.4/x86-speculation-add-prctl-for-speculative-store-bypass-mitigation.patch [new file with mode: 0644]
queue-4.4/x86-speculation-add-virtualized-speculative-store-bypass-disable-support.patch [new file with mode: 0644]
queue-4.4/x86-speculation-clean-up-various-spectre-related-details.patch [new file with mode: 0644]
queue-4.4/x86-speculation-correct-speculation-control-microcode-blacklist-again.patch [new file with mode: 0644]
queue-4.4/x86-speculation-create-spec-ctrl.h-to-avoid-include-hell.patch [new file with mode: 0644]
queue-4.4/x86-speculation-fix-up-array_index_nospec_mask-asm-constraint.patch [new file with mode: 0644]
queue-4.4/x86-speculation-handle-ht-correctly-on-amd.patch [new file with mode: 0644]
queue-4.4/x86-speculation-kvm-implement-support-for-virt_spec_ctrl-ls_cfg.patch [new file with mode: 0644]
queue-4.4/x86-speculation-make-seccomp-the-default-mode-for-speculative-store-bypass.patch [new file with mode: 0644]
queue-4.4/x86-speculation-move-firmware_restrict_branch_speculation_-from-c-to-cpp.patch [new file with mode: 0644]
queue-4.4/x86-speculation-remove-skylake-c2-from-speculation-control-microcode-blacklist.patch [new file with mode: 0644]
queue-4.4/x86-speculation-rework-speculative_store_bypass_update.patch [new file with mode: 0644]
queue-4.4/x86-speculation-update-speculation-control-microcode-blacklist.patch [new file with mode: 0644]
queue-4.4/x86-speculation-use-ibrs-if-available-before-calling-into-firmware.patch [new file with mode: 0644]
queue-4.4/x86-speculation-use-indirect-branch-prediction-barrier-in-context-switch.patch [new file with mode: 0644]
queue-4.4/x86-speculation-use-synthetic-bits-for-ibrs-ibpb-stibp.patch [new file with mode: 0644]
queue-4.4/x86-xen-zero-msr_ia32_spec_ctrl-before-suspend.patch [new file with mode: 0644]
queue-4.4/xen-set-cpu-capabilities-from-xen_start_kernel.patch [new file with mode: 0644]