From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.5 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_PASS, USER_AGENT_MUTT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 999C6C04AB7 for ; Tue, 14 May 2019 18:07:47 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 64E5320850 for ; Tue, 14 May 2019 18:07:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1557857267; bh=cBl17dKDCE701qysIFd3wYbG70L5NBjvORUz4ES3AvM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=qN3motzQdIWuDfiaIXI90yxTK7kD76Al/9P3j2ux5N8fLV/+ClwbgfR3icnEI5E6M E67KspBqWqAgH0TrLatrf5TweIxKu8QA67jwfDMOYbUsOA/bZJfBG8IOKvituFWq9q DeINNAj9Bxe+Iy6gs0aMtouhUA0FVQ7GMRFPdz94= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727520AbfENSHq (ORCPT ); Tue, 14 May 2019 14:07:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:36680 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726295AbfENSHq (ORCPT ); Tue, 14 May 2019 14:07:46 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1BD9520850; Tue, 14 May 2019 18:07:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1557857265; bh=cBl17dKDCE701qysIFd3wYbG70L5NBjvORUz4ES3AvM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=zviqZzZr09Hqnm0oihz7ygQcRmmYTsoHGshtyK5HJU75dQep6h17j3cRthqVuj17q j0Z4sDzB7fqDUvaoOUlQ+oh8jGcV+GucioCgpRggngsywf9xyYTSP5UHy8sqCE68wA GnY99dIJcczj34s3cdP5aXi9tPGj/ueRWfHlAT6M= Date: Tue, 14 May 2019 20:07:43 +0200 From: Greg KH To: linux-kernel@vger.kernel.org, Andrew Morton , torvalds@linux-foundation.org, stable@vger.kernel.org Cc: lwn@lwn.net, Jiri Slaby Subject: Re: Linux 5.1.2 Message-ID: <20190514180743.GA13519@kroah.com> References: <20190514180424.GA11131@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190514180424.GA11131@kroah.com> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 14, 2019 at 08:04:24PM +0200, Greg KH wrote: > I'm announcing the release of the 5.1.2 kernel. > > All users of the 5.1 kernel series must upgrade. Well, kind of, let me rephrase that... > > All users of Intel processors made since 2011 must upgrade. > > Note, this release, and the other stable releases that are all being > released right now at the same time, just went out all contain patches > that have only seen the "public eye" for about 5 minutes. So be > forwarned, they might break things, they might not build, but hopefully > they fix things. Odds are we will be fixing a number of small things in > this area for the next few weeks as things shake out on real hardware > and workloads. So don't think you are done updating your kernel, you > never are done with that :) > > As for what specifically these changes fix, I'll let the tech news sites > fill you in on the details. Or go read the excellently written Xen > Security Advisory 297: > https://xenbits.xen.org/xsa/advisory-297.html > That should give you a good idea of what a number of people have been > dealing with for many many many months now. Also see the new in-kernel documentation for how to handle all of this: https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html