From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
stable@vger.kernel.org, torvalds@linux-foundation.org,
akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org,
patches@kernelci.org, lkft-triage@lists.linaro.org,
pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com,
sudipm.mukherjee@gmail.com, slade@sladewatkins.com
Subject: [PATCH 5.15 00/89] 5.15.57-rc1 review
Date: Fri, 22 Jul 2022 11:10:34 +0200 [thread overview]
Message-ID: <20220722091133.320803732@linuxfoundation.org> (raw)
This is the start of the stable review cycle for the 5.15.57 release.
There are 89 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sun, 24 Jul 2022 09:10:51 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.15.57-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.15.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Linux 5.15.57-rc1
Peter Zijlstra <peterz@infradead.org>
x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds
Peter Zijlstra <peterz@infradead.org>
um: Add missing apply_returns()
Kim Phillips <kim.phillips@amd.com>
x86/bugs: Remove apostrophe typo
Arnaldo Carvalho de Melo <acme@redhat.com>
tools headers cpufeatures: Sync with the kernel sources
Arnaldo Carvalho de Melo <acme@redhat.com>
tools arch x86: Sync the msr-index.h copy with the kernel sources
Paolo Bonzini <pbonzini@redhat.com>
KVM: emulate: do not adjust size of fastop and setcc subroutines
Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
x86/kvm: fix FASTOP_SIZE when return thunks are enabled
Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
efi/x86: use naked RET on mixed mode call wrapper
Nathan Chancellor <nathan@kernel.org>
x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
Jiri Slaby <jirislaby@kernel.org>
x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit
Ben Hutchings <ben@decadent.org.uk>
x86/xen: Fix initialisation in hypercall_page after rethunk
Thomas Gleixner <tglx@linutronix.de>
x86/static_call: Serialize __static_call_fixup() properly
Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
x86/speculation: Disable RRSBA behavior
Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
x86/kexec: Disable RET on kexec
Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
Peter Zijlstra <peterz@infradead.org>
x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry
Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
x86/bugs: Add Cannon lake to RETBleed affected CPU list
Peter Zijlstra <peterz@infradead.org>
x86/retbleed: Add fine grained Kconfig knobs
Andrew Cooper <andrew.cooper3@citrix.com>
x86/cpu/amd: Enumerate BTC_NO
Peter Zijlstra <peterz@infradead.org>
x86/common: Stamp out the stepping madness
Josh Poimboeuf <jpoimboe@kernel.org>
x86/speculation: Fill RSB on vmexit for IBRS
Josh Poimboeuf <jpoimboe@kernel.org>
KVM: VMX: Fix IBRS handling after vmexit
Josh Poimboeuf <jpoimboe@kernel.org>
KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
Josh Poimboeuf <jpoimboe@kernel.org>
KVM: VMX: Convert launched argument to flags
Josh Poimboeuf <jpoimboe@kernel.org>
KVM: VMX: Flatten __vmx_vcpu_run()
Josh Poimboeuf <jpoimboe@kernel.org>
objtool: Re-add UNWIND_HINT_{SAVE_RESTORE}
Josh Poimboeuf <jpoimboe@kernel.org>
x86/speculation: Remove x86_spec_ctrl_mask
Josh Poimboeuf <jpoimboe@kernel.org>
x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
Josh Poimboeuf <jpoimboe@kernel.org>
x86/speculation: Fix SPEC_CTRL write on SMT state change
Josh Poimboeuf <jpoimboe@kernel.org>
x86/speculation: Fix firmware entry SPEC_CTRL handling
Josh Poimboeuf <jpoimboe@kernel.org>
x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
Peter Zijlstra <peterz@infradead.org>
x86/cpu/amd: Add Spectral Chicken
Peter Zijlstra <peterz@infradead.org>
objtool: Add entry UNRET validation
Josh Poimboeuf <jpoimboe@kernel.org>
x86/bugs: Do IBPB fallback check only once
Peter Zijlstra <peterz@infradead.org>
x86/bugs: Add retbleed=ibpb
Peter Zijlstra <peterz@infradead.org>
x86/xen: Add UNTRAIN_RET
Peter Zijlstra <peterz@infradead.org>
x86/xen: Rename SYS* entry points
Peter Zijlstra <peterz@infradead.org>
objtool: Update Retpoline validation
Peter Zijlstra <peterz@infradead.org>
intel_idle: Disable IBRS during long idle
Peter Zijlstra <peterz@infradead.org>
x86/bugs: Report Intel retbleed vulnerability
Peter Zijlstra <peterz@infradead.org>
x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
Peter Zijlstra <peterz@infradead.org>
x86/bugs: Optimize SPEC_CTRL MSR writes
Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
x86/entry: Add kernel IBRS implementation
Peter Zijlstra <peterz@infradead.org>
x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
Kim Phillips <kim.phillips@amd.com>
x86/bugs: Enable STIBP for JMP2RET
Alexandre Chartre <alexandre.chartre@oracle.com>
x86/bugs: Add AMD retbleed= boot parameter
Alexandre Chartre <alexandre.chartre@oracle.com>
x86/bugs: Report AMD retbleed vulnerability
Peter Zijlstra <peterz@infradead.org>
x86: Add magic AMD return-thunk
Peter Zijlstra <peterz@infradead.org>
objtool: Treat .text.__x86.* as noinstr
Peter Zijlstra <peterz@infradead.org>
x86/entry: Avoid very early RET
Peter Zijlstra <peterz@infradead.org>
x86: Use return-thunk in asm code
Kim Phillips <kim.phillips@amd.com>
x86/sev: Avoid using __x86_return_thunk
Peter Zijlstra <peterz@infradead.org>
x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
Peter Zijlstra <peterz@infradead.org>
x86/kvm: Fix SETcc emulation for return thunks
Peter Zijlstra <peterz@infradead.org>
x86/bpf: Use alternative RET encoding
Peter Zijlstra <peterz@infradead.org>
x86/ftrace: Use alternative RET encoding
Peter Zijlstra <peterz@infradead.org>
x86,static_call: Use alternative RET encoding
Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
objtool: skip non-text sections when adding return-thunk sites
Peter Zijlstra <peterz@infradead.org>
x86,objtool: Create .return_sites
Peter Zijlstra <peterz@infradead.org>
x86: Undo return-thunk damage
Peter Zijlstra <peterz@infradead.org>
x86/retpoline: Use -mfunction-return
Peter Zijlstra <peterz@infradead.org>
x86/retpoline: Swizzle retpoline thunk
Peter Zijlstra <peterz@infradead.org>
x86/retpoline: Cleanup some #ifdefery
Peter Zijlstra <peterz@infradead.org>
x86/cpufeatures: Move RETPOLINE flags to word 11
Peter Zijlstra <peterz@infradead.org>
x86/kvm/vmx: Make noinstr clean
Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
x86/realmode: build with -D__DISABLE_EXPORTS
Peter Zijlstra <peterz@infradead.org>
x86/entry: Remove skip_r11rcx
Peter Zijlstra <peterz@infradead.org>
objtool: Default ignore INT3 for unreachable
Peter Zijlstra <peterz@infradead.org>
bpf,x86: Respect X86_FEATURE_RETPOLINE*
Peter Zijlstra <peterz@infradead.org>
bpf,x86: Simplify computing label offsets
Peter Zijlstra <peterz@infradead.org>
x86/alternative: Add debug prints to apply_retpolines()
Peter Zijlstra <peterz@infradead.org>
x86/alternative: Try inline spectre_v2=retpoline,amd
Peter Zijlstra <peterz@infradead.org>
x86/alternative: Handle Jcc __x86_indirect_thunk_\reg
Peter Zijlstra <peterz@infradead.org>
x86/alternative: Implement .retpoline_sites support
Peter Zijlstra <peterz@infradead.org>
x86/retpoline: Create a retpoline thunk array
Peter Zijlstra <peterz@infradead.org>
x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
Peter Zijlstra <peterz@infradead.org>
x86/asm: Fixup odd GEN-for-each-reg.h usage
Peter Zijlstra <peterz@infradead.org>
x86/asm: Fix register order
Peter Zijlstra <peterz@infradead.org>
x86/retpoline: Remove unused replacement symbols
Peter Zijlstra <peterz@infradead.org>
objtool: Introduce CFI hash
Peter Zijlstra <peterz@infradead.org>
objtool,x86: Replace alternatives with .retpoline_sites
Peter Zijlstra <peterz@infradead.org>
objtool: Shrink struct instruction
Peter Zijlstra <peterz@infradead.org>
objtool: Explicitly avoid self modifying code in .altinstr_replacement
Peter Zijlstra <peterz@infradead.org>
objtool: Classify symbols
Lai Jiangshan <jiangshan.ljs@antgroup.com>
x86/entry: Don't call error_entry() for XENPV
Lai Jiangshan <jiangshan.ljs@antgroup.com>
x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry()
Lai Jiangshan <jiangshan.ljs@antgroup.com>
x86/entry: Switch the stack after error_entry() returns
Lai Jiangshan <jiangshan.ljs@antgroup.com>
x86/traps: Use pt_regs directly in fixup_bad_iret()
-------------
Diffstat:
Documentation/admin-guide/kernel-parameters.txt | 25 +
Makefile | 11 +-
arch/um/kernel/um_arch.c | 8 +
arch/x86/Kconfig | 103 +++-
arch/x86/Makefile | 2 +-
arch/x86/entry/Makefile | 2 +-
arch/x86/entry/calling.h | 72 ++-
arch/x86/entry/entry.S | 22 +
arch/x86/entry/entry_32.S | 2 -
arch/x86/entry/entry_64.S | 88 ++-
arch/x86/entry/entry_64_compat.S | 21 +-
arch/x86/entry/vdso/Makefile | 1 +
arch/x86/entry/vsyscall/vsyscall_emu_64.S | 9 +-
arch/x86/include/asm/GEN-for-each-reg.h | 14 +-
arch/x86/include/asm/alternative.h | 2 +
arch/x86/include/asm/asm-prototypes.h | 18 -
arch/x86/include/asm/cpufeatures.h | 12 +-
arch/x86/include/asm/disabled-features.h | 21 +-
arch/x86/include/asm/linkage.h | 8 +
arch/x86/include/asm/msr-index.h | 13 +
arch/x86/include/asm/nospec-branch.h | 134 ++---
arch/x86/include/asm/static_call.h | 17 +
arch/x86/include/asm/traps.h | 2 +-
arch/x86/include/asm/unwind_hints.h | 14 +-
arch/x86/kernel/alternative.c | 260 ++++++++-
arch/x86/kernel/cpu/amd.c | 46 +-
arch/x86/kernel/cpu/bugs.c | 475 +++++++++++++---
arch/x86/kernel/cpu/common.c | 61 ++-
arch/x86/kernel/cpu/cpu.h | 2 +
arch/x86/kernel/cpu/hygon.c | 6 +
arch/x86/kernel/cpu/scattered.c | 1 +
arch/x86/kernel/ftrace.c | 7 +-
arch/x86/kernel/head_32.S | 1 +
arch/x86/kernel/head_64.S | 5 +
arch/x86/kernel/module.c | 15 +-
arch/x86/kernel/process.c | 2 +-
arch/x86/kernel/relocate_kernel_32.S | 25 +-
arch/x86/kernel/relocate_kernel_64.S | 23 +-
arch/x86/kernel/static_call.c | 49 +-
arch/x86/kernel/traps.c | 19 +-
arch/x86/kernel/vmlinux.lds.S | 23 +-
arch/x86/kvm/emulate.c | 33 +-
arch/x86/kvm/svm/vmenter.S | 18 +
arch/x86/kvm/vmx/nested.c | 2 +-
arch/x86/kvm/vmx/run_flags.h | 8 +
arch/x86/kvm/vmx/vmenter.S | 164 +++---
arch/x86/kvm/vmx/vmx.c | 76 ++-
arch/x86/kvm/vmx/vmx.h | 6 +-
arch/x86/kvm/x86.c | 4 +-
arch/x86/lib/memmove_64.S | 7 +-
arch/x86/lib/retpoline.S | 133 +++--
arch/x86/mm/mem_encrypt_boot.S | 10 +-
arch/x86/net/bpf_jit_comp.c | 179 +++---
arch/x86/net/bpf_jit_comp32.c | 22 +-
arch/x86/platform/efi/efi_thunk_64.S | 5 +-
arch/x86/xen/setup.c | 6 +-
arch/x86/xen/xen-asm.S | 30 +-
arch/x86/xen/xen-head.S | 5 +-
arch/x86/xen/xen-ops.h | 6 +-
drivers/base/cpu.c | 8 +
drivers/idle/intel_idle.c | 43 +-
include/linux/cpu.h | 2 +
include/linux/kvm_host.h | 2 +-
include/linux/objtool.h | 9 +-
scripts/Makefile.build | 1 +
scripts/link-vmlinux.sh | 3 +
security/Kconfig | 11 -
tools/arch/x86/include/asm/cpufeatures.h | 12 +-
tools/arch/x86/include/asm/disabled-features.h | 21 +-
tools/arch/x86/include/asm/msr-index.h | 13 +
tools/include/linux/objtool.h | 9 +-
tools/objtool/arch/x86/decode.c | 145 +----
tools/objtool/builtin-check.c | 4 +-
tools/objtool/check.c | 701 ++++++++++++++++++++----
tools/objtool/elf.c | 84 ---
tools/objtool/include/objtool/arch.h | 3 +-
tools/objtool/include/objtool/builtin.h | 2 +-
tools/objtool/include/objtool/cfi.h | 2 +
tools/objtool/include/objtool/check.h | 10 +-
tools/objtool/include/objtool/elf.h | 9 +-
tools/objtool/include/objtool/objtool.h | 1 +
tools/objtool/objtool.c | 1 +
tools/objtool/orc_gen.c | 15 +-
tools/objtool/special.c | 8 -
84 files changed, 2520 insertions(+), 954 deletions(-)
next reply other threads:[~2022-07-22 9:21 UTC|newest]
Thread overview: 97+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-07-22 9:10 Greg Kroah-Hartman [this message]
2022-07-22 9:10 ` [PATCH 5.15 01/89] x86/traps: Use pt_regs directly in fixup_bad_iret() Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 02/89] x86/entry: Switch the stack after error_entry() returns Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 03/89] x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 04/89] x86/entry: Dont call error_entry() for XENPV Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 05/89] objtool: Classify symbols Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 06/89] objtool: Explicitly avoid self modifying code in .altinstr_replacement Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 07/89] objtool: Shrink struct instruction Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 08/89] objtool,x86: Replace alternatives with .retpoline_sites Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 09/89] objtool: Introduce CFI hash Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 10/89] x86/retpoline: Remove unused replacement symbols Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 11/89] x86/asm: Fix register order Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 12/89] x86/asm: Fixup odd GEN-for-each-reg.h usage Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 13/89] x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 14/89] x86/retpoline: Create a retpoline thunk array Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 15/89] x86/alternative: Implement .retpoline_sites support Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 16/89] x86/alternative: Handle Jcc __x86_indirect_thunk_\reg Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 17/89] x86/alternative: Try inline spectre_v2=retpoline,amd Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 18/89] x86/alternative: Add debug prints to apply_retpolines() Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 19/89] bpf,x86: Simplify computing label offsets Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 20/89] bpf,x86: Respect X86_FEATURE_RETPOLINE* Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 21/89] objtool: Default ignore INT3 for unreachable Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 22/89] x86/entry: Remove skip_r11rcx Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 23/89] x86/realmode: build with -D__DISABLE_EXPORTS Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 24/89] x86/kvm/vmx: Make noinstr clean Greg Kroah-Hartman
2022-07-22 9:10 ` [PATCH 5.15 25/89] x86/cpufeatures: Move RETPOLINE flags to word 11 Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 26/89] x86/retpoline: Cleanup some #ifdefery Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 27/89] x86/retpoline: Swizzle retpoline thunk Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 28/89] x86/retpoline: Use -mfunction-return Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 29/89] x86: Undo return-thunk damage Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 30/89] x86,objtool: Create .return_sites Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 31/89] objtool: skip non-text sections when adding return-thunk sites Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 32/89] x86,static_call: Use alternative RET encoding Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 33/89] x86/ftrace: " Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 34/89] x86/bpf: " Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 35/89] x86/kvm: Fix SETcc emulation for return thunks Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 36/89] x86/vsyscall_emu/64: Dont use RET in vsyscall emulation Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 37/89] x86/sev: Avoid using __x86_return_thunk Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 38/89] x86: Use return-thunk in asm code Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 39/89] x86/entry: Avoid very early RET Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 40/89] objtool: Treat .text.__x86.* as noinstr Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 41/89] x86: Add magic AMD return-thunk Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 42/89] x86/bugs: Report AMD retbleed vulnerability Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 43/89] x86/bugs: Add AMD retbleed= boot parameter Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 44/89] x86/bugs: Enable STIBP for JMP2RET Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 45/89] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 46/89] x86/entry: Add kernel IBRS implementation Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 47/89] x86/bugs: Optimize SPEC_CTRL MSR writes Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 48/89] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 49/89] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 50/89] x86/bugs: Report Intel retbleed vulnerability Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 51/89] intel_idle: Disable IBRS during long idle Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 52/89] objtool: Update Retpoline validation Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 53/89] x86/xen: Rename SYS* entry points Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 54/89] x86/xen: Add UNTRAIN_RET Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 55/89] x86/bugs: Add retbleed=ibpb Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 56/89] x86/bugs: Do IBPB fallback check only once Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 57/89] objtool: Add entry UNRET validation Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 58/89] x86/cpu/amd: Add Spectral Chicken Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 59/89] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 60/89] x86/speculation: Fix firmware entry SPEC_CTRL handling Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 61/89] x86/speculation: Fix SPEC_CTRL write on SMT state change Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 62/89] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 63/89] x86/speculation: Remove x86_spec_ctrl_mask Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 64/89] objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 65/89] KVM: VMX: Flatten __vmx_vcpu_run() Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 66/89] KVM: VMX: Convert launched argument to flags Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 67/89] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 68/89] KVM: VMX: Fix IBRS handling after vmexit Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 69/89] x86/speculation: Fill RSB on vmexit for IBRS Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 70/89] x86/common: Stamp out the stepping madness Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 71/89] x86/cpu/amd: Enumerate BTC_NO Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 72/89] x86/retbleed: Add fine grained Kconfig knobs Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 73/89] x86/bugs: Add Cannon lake to RETBleed affected CPU list Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 74/89] x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 75/89] x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 76/89] x86/kexec: Disable RET on kexec Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 77/89] x86/speculation: Disable RRSBA behavior Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 78/89] x86/static_call: Serialize __static_call_fixup() properly Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 79/89] x86/xen: Fix initialisation in hypercall_page after rethunk Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 80/89] x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 81/89] x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 82/89] efi/x86: use naked RET on mixed mode call wrapper Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 83/89] x86/kvm: fix FASTOP_SIZE when return thunks are enabled Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 84/89] KVM: emulate: do not adjust size of fastop and setcc subroutines Greg Kroah-Hartman
2022-07-22 9:11 ` [PATCH 5.15 85/89] tools arch x86: Sync the msr-index.h copy with the kernel sources Greg Kroah-Hartman
2022-07-22 9:12 ` [PATCH 5.15 86/89] tools headers cpufeatures: Sync " Greg Kroah-Hartman
2022-07-22 9:12 ` [PATCH 5.15 87/89] x86/bugs: Remove apostrophe typo Greg Kroah-Hartman
2022-07-22 9:12 ` [PATCH 5.15 88/89] um: Add missing apply_returns() Greg Kroah-Hartman
2022-07-22 9:12 ` [PATCH 5.15 89/89] x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds Greg Kroah-Hartman
2022-07-22 12:14 ` [PATCH 5.15 00/89] 5.15.57-rc1 review Bagas Sanjaya
2022-07-22 17:58 ` Florian Fainelli
2022-07-22 19:36 ` Naresh Kamboju
2022-07-22 21:59 ` Guenter Roeck
2022-07-23 4:21 ` Ron Economos
2022-07-23 8:55 ` Sudip Mukherjee (Codethink)
2022-07-25 8:05 ` Jon Hunter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220722091133.320803732@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=akpm@linux-foundation.org \
--cc=f.fainelli@gmail.com \
--cc=jonathanh@nvidia.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux@roeck-us.net \
--cc=lkft-triage@lists.linaro.org \
--cc=patches@kernelci.org \
--cc=pavel@denx.de \
--cc=shuah@kernel.org \
--cc=slade@sladewatkins.com \
--cc=stable@vger.kernel.org \
--cc=sudipm.mukherjee@gmail.com \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.