stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-03-10 14:12:14 to 2022-03-10 14:33:25 UTC [more...]

[PATCH 5.4 00/33] 5.4.184-rc2 review
 2022-03-10 14:19 UTC  (20+ messages)
` [PATCH 5.4 01/33] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 5.4 02/33] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.4 04/33] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.4 05/33] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.4 06/33] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.4 07/33] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.4 10/33] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.4 11/33] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 5.4 14/33] ARM: early traps initialisation
` [PATCH 5.4 15/33] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.4 18/33] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.4 21/33] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.4 24/33] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.4 25/33] xen/netfront: "
` [PATCH 5.4 26/33] xen/scsifront: "
` [PATCH 5.4 27/33] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.4 28/33] xen: remove gnttab_query_foreign_access()
` [PATCH 5.4 29/33] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.4 32/33] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()

[PATCH 5.10 00/58] 5.10.105-rc2 review
 2022-03-10 14:19 UTC  (40+ messages)
` [PATCH 5.10 02/58] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.10 03/58] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.10 04/58] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.10 05/58] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.10 06/58] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.10 07/58] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.10 08/58] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.10 09/58] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.10 10/58] ARM: report Spectre v2 status through sysfs
` [PATCH 5.10 11/58] ARM: early traps initialisation
` [PATCH 5.10 12/58] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.10 13/58] ARM: Spectre-BHB workaround
` [PATCH 5.10 16/58] arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
` [PATCH 5.10 18/58] arm64: Add Cortex-A510 "
` [PATCH 5.10 19/58] arm64: Add HWCAP for self-synchronising virtual counter
` [PATCH 5.10 20/58] arm64: add ID_AA64ISAR2_EL1 sys register
` [PATCH 5.10 21/58] arm64: cpufeature: add HWCAP for FEAT_AFP
` [PATCH 5.10 22/58] arm64: cpufeature: add HWCAP for FEAT_RPRES
` [PATCH 5.10 24/58] arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
` [PATCH 5.10 25/58] arm64: entry: Make the trampoline cleanup optional
` [PATCH 5.10 26/58] arm64: entry: Free up another register on kptis tramp_exit path
` [PATCH 5.10 27/58] arm64: entry: Move the trampoline data page before the text page
` [PATCH 5.10 29/58] arm64: entry: Dont assume tramp_vectors is the start of the vectors
` [PATCH 5.10 30/58] arm64: entry: Move trampoline macros out of ifdefd section
` [PATCH 5.10 31/58] arm64: entry: Make the kpti trampolines kpti sequence optional
` [PATCH 5.10 33/58] arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
` [PATCH 5.10 34/58] arm64: entry: Add vectors that have the bhb mitigation sequences
` [PATCH 5.10 35/58] arm64: entry: Add macro for reading symbol addresses from the trampoline
` [PATCH 5.10 38/58] KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
` [PATCH 5.10 42/58] arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.10 43/58] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.10 44/58] ARM: fix co-processor register typo
` [PATCH 5.10 46/58] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.10 47/58] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.10 48/58] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.10 49/58] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.10 52/58] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.10 57/58] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
` [PATCH 5.10 58/58] Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE"

[PATCH 4.19 00/33] 4.19.234-rc2 review
 2022-03-10 14:18 UTC  (27+ messages)
` [PATCH 4.19 01/33] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.19 02/33] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.19 03/33] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.19 04/33] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.19 05/33] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.19 07/33] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.19 08/33] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.19 09/33] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.19 10/33] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.19 13/33] ARM: report Spectre v2 status through sysfs
` [PATCH 4.19 14/33] ARM: early traps initialisation
` [PATCH 4.19 15/33] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.19 16/33] ARM: Spectre-BHB workaround
` [PATCH 4.19 17/33] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.19 18/33] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 4.19 19/33] kbuild: add CONFIG_LD_IS_LLD
` [PATCH 4.19 20/33] ARM: fix co-processor register typo
` [PATCH 4.19 21/33] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 4.19 22/33] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 4.19 24/33] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 4.19 25/33] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 4.19 26/33] xen/netfront: "
` [PATCH 4.19 27/33] xen/scsifront: "
` [PATCH 4.19 29/33] xen: remove gnttab_query_foreign_access()
` [PATCH 4.19 31/33] xen/pvcalls: use alloc/free_pages_exact()
` [PATCH 4.19 32/33] xen/gnttab: fix gnttab_end_foreign_access() without page specified

[PATCH 5.15 00/58] 5.15.28-rc2 review
 2022-03-10 14:19 UTC  (7+ messages)
` [PATCH 5.15 01/58] slip: fix macro redefine warning
` [PATCH 5.15 02/58] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.15 04/58] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.15 15/58] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.15 16/58] arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
` [PATCH 5.15 18/58] arm64: Add Cortex-X2 "

[PATCH 4.14 00/31] 4.14.271-rc2 review
 2022-03-10 14:18 UTC  (32+ messages)
` [PATCH 4.14 01/31] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.14 02/31] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.14 03/31] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.14 04/31] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.14 05/31] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.14 06/31] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 4.14 07/31] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.14 08/31] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.14 09/31] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.14 10/31] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.14 11/31] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 4.14 12/31] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 4.14 13/31] ARM: report Spectre v2 status through sysfs
` [PATCH 4.14 14/31] ARM: early traps initialisation
` [PATCH 4.14 15/31] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.14 16/31] ARM: Spectre-BHB workaround
` [PATCH 4.14 17/31] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.14 18/31] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 4.14 19/31] ARM: fix co-processor register typo
` [PATCH 4.14 20/31] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 4.14 21/31] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 4.14 22/31] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 4.14 23/31] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 4.14 24/31] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 4.14 25/31] xen/netfront: "
` [PATCH 4.14 26/31] xen/scsifront: "
` [PATCH 4.14 27/31] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 4.14 28/31] xen: remove gnttab_query_foreign_access()
` [PATCH 4.14 29/31] xen/9p: use alloc/free_pages_exact()
` [PATCH 4.14 30/31] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 4.14 31/31] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()

[PATCH 4.9 00/38] 4.9.306-rc2 review
 2022-03-10 14:13 UTC  (39+ messages)
` [PATCH 4.9 01/38] x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant
` [PATCH 4.9 02/38] x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
` [PATCH 4.9 03/38] x86/retpoline: Remove minimal retpoline support
` [PATCH 4.9 04/38] Documentation: Add section about CPU vulnerabilities for Spectre
` [PATCH 4.9 05/38] Documentation: Add swapgs description to the Spectre v1 documentation
` [PATCH 4.9 06/38] Documentation: refer to config RANDOMIZE_BASE for kernel address-space randomization
` [PATCH 4.9 07/38] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.9 08/38] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.9 09/38] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.9 10/38] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.9 11/38] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.9 12/38] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 4.9 13/38] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.9 14/38] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.9 15/38] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.9 16/38] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.9 17/38] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 4.9 18/38] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 4.9 19/38] ARM: report Spectre v2 status through sysfs
` [PATCH 4.9 20/38] ARM: early traps initialisation
` [PATCH 4.9 21/38] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.9 22/38] ARM: Spectre-BHB workaround
` [PATCH 4.9 23/38] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.9 24/38] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 4.9 25/38] ARM: fix co-processor register typo
` [PATCH 4.9 26/38] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 4.9 27/38] x86/build: Fix compiler support check for CONFIG_RETPOLINE
` [PATCH 4.9 28/38] x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE
` [PATCH 4.9 29/38] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 4.9 30/38] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 4.9 31/38] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 4.9 32/38] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 4.9 33/38] xen/netfront: "
` [PATCH 4.9 34/38] xen/scsifront: "
` [PATCH 4.9 35/38] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 4.9 36/38] xen: remove gnttab_query_foreign_access()
` [PATCH 4.9 37/38] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 4.9 38/38] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()

[PATCH 5.16 00/53] 5.16.14-rc2 review
 2022-03-10 14:09 UTC  (38+ messages)
` [PATCH 5.16 07/53] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.16 09/53] ARM: report Spectre v2 status through sysfs
` [PATCH 5.16 10/53] ARM: early traps initialisation
` [PATCH 5.16 11/53] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.16 12/53] ARM: Spectre-BHB workaround
` [PATCH 5.16 13/53] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.16 14/53] arm64: add ID_AA64ISAR2_EL1 sys register
` [PATCH 5.16 15/53] arm64: cpufeature: add HWCAP for FEAT_AFP
` [PATCH 5.16 16/53] arm64: cpufeature: add HWCAP for FEAT_RPRES
` [PATCH 5.16 25/53] arm64: entry: Move trampoline macros out of ifdefd section
` [PATCH 5.16 27/53] arm64: entry: Allow the trampoline text to occupy multiple pages
` [PATCH 5.16 28/53] arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
` [PATCH 5.16 29/53] arm64: entry: Add vectors that have the bhb mitigation sequences
` [PATCH 5.16 30/53] arm64: entry: Add macro for reading symbol addresses from the trampoline
` [PATCH 5.16 31/53] arm64: Add percpu vectors for EL1
` [PATCH 5.16 32/53] arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
` [PATCH 5.16 33/53] arm64: Mitigate spectre style branch history side channels
` [PATCH 5.16 34/53] KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
` [PATCH 5.16 35/53] arm64: Use the clearbhb instruction in mitigations
` [PATCH 5.16 36/53] arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.16 37/53] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.16 38/53] ARM: fix co-processor register typo
` [PATCH 5.16 39/53] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 5.16 40/53] arm64: Do not include __READ_ONCE() block in assembly files
` [PATCH 5.16 41/53] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.16 42/53] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.16 43/53] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.16 44/53] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.16 45/53] xen/netfront: "
` [PATCH 5.16 46/53] xen/scsifront: "
` [PATCH 5.16 47/53] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.16 48/53] xen: remove gnttab_query_foreign_access()
` [PATCH 5.16 49/53] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.16 50/53] xen/pvcalls: "
` [PATCH 5.16 51/53] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 5.16 52/53] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
` [PATCH 5.16 53/53] Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE"


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).