stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-03-10 12:29:59 to 2022-03-10 14:33:20 UTC [more...]

[PATCH 5.4 00/33] 5.4.184-rc2 review
 2022-03-10 14:19 UTC  (12+ messages)
` [PATCH 5.4 04/33] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.4 05/33] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.4 07/33] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.4 10/33] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.4 11/33] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 5.4 14/33] ARM: early traps initialisation
` [PATCH 5.4 15/33] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.4 18/33] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.4 28/33] xen: remove gnttab_query_foreign_access()
` [PATCH 5.4 29/33] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.4 32/33] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()

[PATCH 5.10 00/58] 5.10.105-rc2 review
 2022-03-10 14:19 UTC  (26+ messages)
` [PATCH 5.10 02/58] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.10 03/58] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.10 04/58] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.10 06/58] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.10 07/58] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.10 08/58] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.10 09/58] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.10 10/58] ARM: report Spectre v2 status through sysfs
` [PATCH 5.10 11/58] ARM: early traps initialisation
` [PATCH 5.10 12/58] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.10 13/58] ARM: Spectre-BHB workaround
` [PATCH 5.10 19/58] arm64: Add HWCAP for self-synchronising virtual counter
` [PATCH 5.10 20/58] arm64: add ID_AA64ISAR2_EL1 sys register
` [PATCH 5.10 21/58] arm64: cpufeature: add HWCAP for FEAT_AFP
` [PATCH 5.10 22/58] arm64: cpufeature: add HWCAP for FEAT_RPRES
` [PATCH 5.10 24/58] arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
` [PATCH 5.10 25/58] arm64: entry: Make the trampoline cleanup optional
` [PATCH 5.10 26/58] arm64: entry: Free up another register on kptis tramp_exit path
` [PATCH 5.10 35/58] arm64: entry: Add macro for reading symbol addresses from the trampoline
` [PATCH 5.10 43/58] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.10 44/58] ARM: fix co-processor register typo
` [PATCH 5.10 46/58] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.10 47/58] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.10 48/58] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.10 49/58] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status

[PATCH 5.15 00/58] 5.15.28-rc2 review
 2022-03-10 14:19 UTC  (5+ messages)
` [PATCH 5.15 01/58] slip: fix macro redefine warning
` [PATCH 5.15 02/58] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.15 04/58] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.15 18/58] arm64: Add Cortex-X2 CPU part definition

[PATCH 4.19 00/33] 4.19.234-rc2 review
 2022-03-10 14:18 UTC  (22+ messages)
` [PATCH 4.19 01/33] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.19 02/33] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.19 03/33] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.19 04/33] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.19 05/33] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.19 07/33] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.19 09/33] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.19 10/33] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.19 13/33] ARM: report Spectre v2 status through sysfs
` [PATCH 4.19 14/33] ARM: early traps initialisation
` [PATCH 4.19 15/33] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.19 16/33] ARM: Spectre-BHB workaround
` [PATCH 4.19 17/33] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.19 18/33] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 4.19 19/33] kbuild: add CONFIG_LD_IS_LLD
` [PATCH 4.19 20/33] ARM: fix co-processor register typo
` [PATCH 4.19 21/33] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 4.19 22/33] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 4.19 24/33] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 4.19 26/33] xen/netfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 4.19 31/33] xen/pvcalls: use alloc/free_pages_exact()

[PATCH 4.14 00/31] 4.14.271-rc2 review
 2022-03-10 14:18 UTC  (32+ messages)
` [PATCH 4.14 01/31] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.14 02/31] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.14 03/31] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.14 04/31] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.14 05/31] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.14 06/31] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 4.14 07/31] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.14 08/31] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.14 09/31] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.14 10/31] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.14 11/31] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 4.14 12/31] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 4.14 13/31] ARM: report Spectre v2 status through sysfs
` [PATCH 4.14 14/31] ARM: early traps initialisation
` [PATCH 4.14 15/31] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.14 16/31] ARM: Spectre-BHB workaround
` [PATCH 4.14 17/31] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.14 18/31] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 4.14 19/31] ARM: fix co-processor register typo
` [PATCH 4.14 20/31] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 4.14 21/31] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 4.14 22/31] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 4.14 23/31] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 4.14 24/31] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 4.14 25/31] xen/netfront: "
` [PATCH 4.14 26/31] xen/scsifront: "
` [PATCH 4.14 27/31] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 4.14 28/31] xen: remove gnttab_query_foreign_access()
` [PATCH 4.14 29/31] xen/9p: use alloc/free_pages_exact()
` [PATCH 4.14 30/31] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 4.14 31/31] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()

[PATCH 4.9 00/38] 4.9.306-rc2 review
 2022-03-10 14:13 UTC  (39+ messages)
` [PATCH 4.9 01/38] x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant
` [PATCH 4.9 02/38] x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
` [PATCH 4.9 03/38] x86/retpoline: Remove minimal retpoline support
` [PATCH 4.9 04/38] Documentation: Add section about CPU vulnerabilities for Spectre
` [PATCH 4.9 05/38] Documentation: Add swapgs description to the Spectre v1 documentation
` [PATCH 4.9 06/38] Documentation: refer to config RANDOMIZE_BASE for kernel address-space randomization
` [PATCH 4.9 07/38] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.9 08/38] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.9 09/38] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.9 10/38] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.9 11/38] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.9 12/38] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 4.9 13/38] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.9 14/38] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.9 15/38] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.9 16/38] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.9 17/38] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 4.9 18/38] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 4.9 19/38] ARM: report Spectre v2 status through sysfs
` [PATCH 4.9 20/38] ARM: early traps initialisation
` [PATCH 4.9 21/38] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.9 22/38] ARM: Spectre-BHB workaround
` [PATCH 4.9 23/38] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.9 24/38] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 4.9 25/38] ARM: fix co-processor register typo
` [PATCH 4.9 26/38] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 4.9 27/38] x86/build: Fix compiler support check for CONFIG_RETPOLINE
` [PATCH 4.9 28/38] x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE
` [PATCH 4.9 29/38] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 4.9 30/38] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 4.9 31/38] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 4.9 32/38] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 4.9 33/38] xen/netfront: "
` [PATCH 4.9 34/38] xen/scsifront: "
` [PATCH 4.9 35/38] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 4.9 36/38] xen: remove gnttab_query_foreign_access()
` [PATCH 4.9 37/38] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 4.9 38/38] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()

[PATCH 5.16 00/53] 5.16.14-rc2 review
 2022-03-10 14:09 UTC  (54+ messages)
` [PATCH 5.16 01/53] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.16 02/53] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.16 03/53] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.16 04/53] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.16 05/53] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.16 06/53] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.16 07/53] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.16 08/53] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.16 09/53] ARM: report Spectre v2 status through sysfs
` [PATCH 5.16 10/53] ARM: early traps initialisation
` [PATCH 5.16 11/53] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.16 12/53] ARM: Spectre-BHB workaround
` [PATCH 5.16 13/53] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.16 14/53] arm64: add ID_AA64ISAR2_EL1 sys register
` [PATCH 5.16 15/53] arm64: cpufeature: add HWCAP for FEAT_AFP
` [PATCH 5.16 16/53] arm64: cpufeature: add HWCAP for FEAT_RPRES
` [PATCH 5.16 17/53] arm64: entry.S: Add ventry overflow sanity checks
` [PATCH 5.16 18/53] arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
` [PATCH 5.16 19/53] KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
` [PATCH 5.16 20/53] arm64: entry: Make the trampoline cleanup optional
` [PATCH 5.16 21/53] arm64: entry: Free up another register on kptis tramp_exit path
` [PATCH 5.16 22/53] arm64: entry: Move the trampoline data page before the text page
` [PATCH 5.16 23/53] arm64: entry: Allow tramp_alias to access symbols after the 4K boundary
` [PATCH 5.16 24/53] arm64: entry: Dont assume tramp_vectors is the start of the vectors
` [PATCH 5.16 25/53] arm64: entry: Move trampoline macros out of ifdefd section
` [PATCH 5.16 26/53] arm64: entry: Make the kpti trampolines kpti sequence optional
` [PATCH 5.16 27/53] arm64: entry: Allow the trampoline text to occupy multiple pages
` [PATCH 5.16 28/53] arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
` [PATCH 5.16 29/53] arm64: entry: Add vectors that have the bhb mitigation sequences
` [PATCH 5.16 30/53] arm64: entry: Add macro for reading symbol addresses from the trampoline
` [PATCH 5.16 31/53] arm64: Add percpu vectors for EL1
` [PATCH 5.16 32/53] arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
` [PATCH 5.16 33/53] arm64: Mitigate spectre style branch history side channels
` [PATCH 5.16 34/53] KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
` [PATCH 5.16 35/53] arm64: Use the clearbhb instruction in mitigations
` [PATCH 5.16 36/53] arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.16 37/53] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.16 38/53] ARM: fix co-processor register typo
` [PATCH 5.16 39/53] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 5.16 40/53] arm64: Do not include __READ_ONCE() block in assembly files
` [PATCH 5.16 41/53] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.16 42/53] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.16 43/53] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.16 44/53] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.16 45/53] xen/netfront: "
` [PATCH 5.16 46/53] xen/scsifront: "
` [PATCH 5.16 47/53] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.16 48/53] xen: remove gnttab_query_foreign_access()
` [PATCH 5.16 49/53] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.16 50/53] xen/pvcalls: "
` [PATCH 5.16 51/53] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 5.16 52/53] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
` [PATCH 5.16 53/53] Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE"

stable-rc/queue/5.10 build: 130 builds: 1 failed, 129 passed, 4 warnings (v5.10.104-57-g6d793b104fe2)
 2022-03-10 13:56 UTC 

stable-rc queue/4.19 x86 and i386 builds failed
 2022-03-10 13:46 UTC  (2+ messages)

Please revert commit 4287509b4d21e34dc492 from 5.16.y
 2022-03-10 13:45 UTC  (4+ messages)

stable-rc/queue/5.15 build: 125 builds: 2 failed, 123 passed, 10 errors, 1 warning (v5.15.27-46-g9a57fdc8261c)
 2022-03-10 13:00 UTC 

[PATCH] block: aoe: fix page fault in freedev()
 2022-03-10 12:55 UTC  (5+ messages)

stable-rc queue/5.4 x86 and i386 gcc-11 builds failed - bugs.c:973:41: error: implicit declaration of function 'unprivileged_ebpf_enabled'
 2022-03-10 12:50 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).