معرفی شرکت ها


kernel-azure-devel-3.10.0-862.11.6.el7.azure.x86_64.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Development package for building kernel modules to match the kernel
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 7
مخزن Centos virt x86_64
نام بسته kernel-azure-devel
نام فایل بسته kernel-azure-devel-3.10.0-862.11.6.el7.azure.x86_64.rpm
نسخه بسته 3.10.0
انتشار بسته 862.11.6.el7.azure
معماری بسته x86_64
نگهدارنده -
تاریخ ساخت Fri Aug 17 05
هاست سازنده c1be.rdu2.centos.org
نوع بسته .rpm
آدرس صفحه اصلی http://www.kernel.org/
مجوز GPLv2
حجم دانلود 16M
حجم نصب 36.594M
This package provides kernel headers and makefiles sufficient to build modules against the kernel package.


جایگزین ها

بسته نسخه معماری مخزن
kernel-azure-devel-3.10.0-862.14.4.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1127.8.2.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1062.18.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1062.1.2.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1127.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1062.4.2.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-957.21.3.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-957.21.2.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1062.9.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-957.10.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1062.7.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-957.5.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1062.12.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1062.4.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1127.10.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-862.3.3.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1127.13.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-862.11.7.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-957.12.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1127.19.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-957.27.2.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1127.18.2.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1062.1.1.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-957.12.2.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-1062.4.3.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt
kernel-azure-devel-3.10.0-957.1.3.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt


نیازمندی

مقدار نام
- /usr/bin/find
- perl
- /bin/sh


ارائه دهنده

مقدار نام
= 3.10.0-862.11.6.el7.azure kernel-devel-x86_64
= 3.10.0-862.11.6.el7.azure.x86_64 kernel-devel-uname-r
= 3.10.0-862.11.6.el7.azure kernel-azure-devel
= 3.10.0-862.11.6.el7.azure kernel-azure-devel(x86-64)


نحوه نصب


نصب پکیج rpm kernel-azure-devel:

    sudo yum localinstall kernel-azure-devel-3.10.0-862.11.6.el7.azure.x86_64.rpm


فایل ها

مسیرها
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/.config
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/Kconfig
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/Makefile.qlock
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/Module.symvers
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/System.map
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/Kconfig
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/Kconfig
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/Kconfig.debug
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/boot
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/boot/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/kernel
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/kernel/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/lib
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/lib/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/math-emu
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/math-emu/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/mm
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/mm/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/oprofile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/alpha/oprofile/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/Kconfig
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/Kconfig.debug
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/boot
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/boot/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/boot/dts
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/boot/dts/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/kernel
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/kernel/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/lib
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/lib/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/mm
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/mm/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/oprofile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/oprofile/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/plat-arcfpga
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/plat-arcfpga/Kconfig
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/plat-arcfpga/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/plat-tb10x
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/plat-tb10x/Kconfig
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arc/plat-tb10x/Makefile
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arm
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arm/Kconfig
/usr/src/kernels/3.10.0-862.11.6.el7.azure.x86_64/arch/arm/Kconfig-nommu
... and 15466 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2018-08-14

Apply debranding changes

2018-08-10

[kernel] cpu/hotplug: Fix 'online' sysfs entry with 'nosmt' (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}

2018-08-09

[kernel] cpu/hotplug: Enable 'nosmt' as late as possible (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}

2018-08-07

[net] ipv6: fix nospec-related regression in ipv6_addr_prefix() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3693}

2018-08-06

[net] tcp: add tcp_ooo_try_coalesce() helper (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: call tcp_drop() from tcp_data_queue_ofo() (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: detect malicious patterns in tcp_collapse_ofo_queue() (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: avoid collapses in tcp_prune_queue() if possible (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: free batches of packets in tcp_prune_ofo_queue() (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] net: add rb_to_skb() and other rb tree helpers (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: fix a stale ooo_last_skb after a replace (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: use an RB tree for ooo receive queue (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: refine tcp_prune_ofo_queue() to not drop all packets (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: increment sk_drops for dropped rx packets (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[x86] x86/syscall: Fix regression when using the last syscall (pkey_free) (Lauro Ramos Venancio) [1589033 1589035] {CVE-2018-3693}

2018-07-26

[kernel] cpu: hotplug: detect SMT disabled by BIOS (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[documentation] l1tf: Fix typos (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Remove extra newline in vmentry_l1d_flush sysfs file (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Initialize the vmx_l1d_flush_pages' content (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation: l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[documentation] Add section about CPU vulnerabilities (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] bugs, kvm: introduce boot-time control of L1TF mitigations (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu: hotplug: Set CPU_SMT_NOT_SUPPORTED early (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu: hotplug: Expose SMT control init function (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Allow runtime control of L1D flush (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Serialize L1D flush parameter setter (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Add static key for flush always (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Move l1tf setup function (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Handle EPT disabled state proper (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Drop L1TF MSR list approach (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] litf: Introduce vmx status variable (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] bugs: Make cpu_show_common() static (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] bugs: Concentrate bug reporting into a separate function (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu: hotplug: Online siblings when SMT control is turned on (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Use MSR save list for IA32_FLUSH_CMD if required (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Extend add_atomic_switch_msr() to allow VMENTER only MSRs (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Separate the VMX AUTOLOAD guest/host number accounting (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Add find_msr() helper function (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Split the VMX MSR LOAD structures to have an host/guest numbers (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: mitigation for L1 cache terminal fault vulnerabilities, part 3 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Warn user if KVM is loaded SMT and L1TF CPU bug being present (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu: hotplug: Boot HT siblings at least once, part 2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation/l1tf: fix typo in l1tf mitigation string (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: protect _PAGE_FILE PTEs against speculation (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: mitigation for L1 cache terminal fault vulnerabilities, part 2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu/hotplug: Boot HT siblings at least once (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
Revert "x86/apic: Ignore secondary threads if nosmt=force" (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation/l1tf: Fix up pte->pfn conversion for PAE (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation/l1tf: Protect PAE swap entries against L1TF (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation/l1tf: Extend 64bit swap file size limit (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/AMD: Remove the pointless detect_ht() call (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] bugs: Move the l1tf function and define pr_fmt properly (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu/hotplug: Provide knobs to control SMT, part 2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] topology: Provide topology_smt_supported() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] smp: Provide topology_is_primary_thread(), part 2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] apic: Ignore secondary threads if nosmt=force (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/AMD: Evaluate smp_num_siblings early (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] CPU/AMD: Do not check CPUID max ext level before parsing SMP info (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/intel: Evaluate smp_num_siblings early (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/topology: Provide detect_extended_topology_early() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/common: Provide detect_ht_early() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu: Remove the pointless CPU printout (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu/hotplug: Provide knobs to control SMT (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu/hotplug: Split do_cpu_down() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] smp: Provide topology_is_primary_thread() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] CPU: Modify detect_extended_topology() to return result (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: fix build for CONFIG_NUMA_BALANCING=n (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: sync with latest L1TF patches (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: protect _PAGE_NUMA PTEs and PMDs against speculation (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[mm] l1tf: Disallow non privileged high MMIO PROT_NONE mappings (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Report if too much memory for L1TF workaround (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Limit swap file size to MAX_PA/2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Add sysfs reporting for l1tf (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Make sure the first page is always reserved (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Protect PROT_NONE PTEs against speculation (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Protect swap entries against L1TF (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Increase 32bit PAE __PHYSICAL_PAGE_MASK (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] mm: Fix swap entry comment and macro (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] spec_ctrl: sync with upstream cpu_set_bug_bits() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] add support for L1D flush MSR (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: mitigation for L1 cache terminal fault vulnerabilities (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}

2018-07-20

[tcmu] allow userspace to reset ring (Xiubo Li) [1599669 1562587]
[tcmu] remove commands_lock (Xiubo Li) [1599669 1562587]
[tcmu] move expired command completion to unmap thread (Xiubo Li) [1599669 1562587]
[tcmu] add cmd timeout handling wq (Xiubo Li) [1599669 1562587]
[tcmu] don't block submitting context for block waits (Xiubo Li) [1599669 1562587]
[tcmu] fix double se_cmd completion (Xiubo Li) [1599669 1562587]
[tcmu] replace spin lock with mutex (Xiubo Li) [1599669 1562587]
[target] add SAM_STAT_BUSY sense reason (Xiubo Li) [1599669 1562587]
[target] core: add device action configfs files (Xiubo Li) [1599669 1562587]
[target] Avoid mappedlun symlink creation during lun shutdown (Xiubo Li) [1599656 1585081]
[spectre] update Spectre v1 mitigation string (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[spectre] fix hiddev nospec issues (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] syscall: clarify clobbered registers in entry code (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[powerpc] add missing barrier_nospec() in __get_user64_nocheck() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[spectre] fix gadgets found by smatch scanner (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] rme9652: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] hdspm: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] asihpi: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] opl3: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] hda: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] seq: oss: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] seq: oss: Fix unbalanced use lock for synth MIDI device (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[net] atm: Fix potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[kernel] time: Protect posix clock array access against speculation (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[kernel] sys.c: fix potential Spectre v1 issue (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[sched] autogroup: Fix possible Spectre-v1 indexing for sched_prio_to_weight[] (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[perf] core: Fix possible Spectre-v1 indexing for ->aux_pages[] (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[sysvipc] sem: mitigate semnum index against spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] control: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[usbip] vhci_sysfs: fix potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[media] dvb_ca_en50221: prevent using slot_info for Spectre attacs (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[media] dvb_ca_en50221: sanity check slot number from userspace (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[atm] zatm: Fix potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] kvm: Update spectre-v1 mitigation (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] kvm: Add memory barrier on vmcs field lookup (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] perf/msr: Fix possible Spectre-v1 indexing in the MSR driver (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] perf: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[net] nl80211: Sanitize array index in parse_txq_params (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] vfs, fdtable: Prevent bounds-check bypass via speculative execution (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] syscall: Sanitize syscall table de-references under speculation (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[powerpc] Use barrier_nospec in copy_from_user() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] nospec: Introduce barrier_nospec for other arches (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] Introduce barrier_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] spectre_v1: Disable compiler optimizations over array_index_mask_nospec() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] Implement array_index_mask_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[documentation] Document array_index_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] nospec: Include <asm/barrier.h> dependency (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] nospec: Allow index argument to have const-qualified type (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] nospec: Kill array_index_nospec_mask_check() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] nospec: Move array_index_nospec() parameter checking into separate macro (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] array_index_nospec: Sanitize speculative array de-references (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] get_user: Use pointer masking to limit speculation (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] Introduce __uaccess_begin_nospec() and uaccess_try_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] usercopy: Replace open coded stac/clac with __uaccess_{begin, end} (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] reorganize SMAP handling in user space accesses (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] uaccess: Tell the compiler that uaccess is unlikely to fault (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] uaccess: fix sparse errors (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}

2018-07-04

[x86] add _TIF_UPROBE to _TIF_DO_NOTIFY_MASK (Oleg Nesterov) [1595155 1579521]
[x86] spec_ctrl: Always clear SPEC_CTRL MSRs when disabling IBRS (Radomir Vrbovsky) [1586150 1574730]
[sound] alsa: hda/realtek - Add headset mode support for Dell laptop (Jaroslav Kysela) [1588946 1528587]
[sound] alsa: hda/realtek - Support headset mode for ALC215/ALC285/ALC289 (Jaroslav Kysela) [1593586 1535427]
[mm] compaction: release zone irqlock in isolate_freepages_block (Andrea Arcangeli) [1596283 1582793]
[mm] compaction: change the timing to check to drop the spinlock (Andrea Arcangeli) [1596283 1582793]
[fs] dcache.c: add cond_resched() in shrink_dentry_list() (Aaron Tomlin) [1596184 1584693]
[misc] vmware balloon: Treat init like reset (Cathy Avery) [1595601 1540110]
[netdrv] qede: Fix ref-cnt usage count (Chad Dupuis) [1594700 1574847]
[x86] kvm: fix LAPIC timer drift when guest uses periodic mode ("Dr. David Alan Gilbert") [1594292 1584775]
[x86] kvm: remove APIC Timer periodic/oneshot spikes ("Dr. David Alan Gilbert") [1594292 1584775]
[netdrv] mlx4_en: Increase number of default RX rings (Erez Alfasi) [1594127 1520295]
[netdrv] mlx4_en: Limit the number of RX rings (Erez Alfasi) [1594127 1520295]
[netdrv] mlx4_en: Limit the number of TX rings (Erez Alfasi) [1594127 1520295]
[fs] ceph: don't set read_ahead_kb to 0 by default (Ilya Dryomov) [1590825 1579539]
[scsi] qla2xxx: Remove stale debug value for login_retry flag (Himanshu Madhani) [1588937 1578880]
[x86] topology: Update the 'cpu cores' field in /proc/cpuinfo correctly across CPU hotplug operations (Prarit Bhargava) [1588563 1582023]
[acpi] osi: Add OEM _OSI strings to disable NVidia RTD3 (Jaroslav Kysela) [1584685 1581391]
[hv] vmbus: Fix a rescind issue (Eduardo Otubo) [1582124 1518498]
[linux] libata: enable host-wide tags (Ewan Milne) [1581728 1491014]
[ata] libata: remove ATA_FLAG_LOWTAG (Ewan Milne) [1581728 1491014]
[ata] Add a new flag to destinguish sas controller (Ewan Milne) [1581728 1491014]
[ata] libata: make sata_sil24 use fifo tag allocator (Ewan Milne) [1581728 1491014]
[ata] libata: move sas ata tag allocation to libata-scsi.c (Ewan Milne) [1581728 1491014]
[ata] libata: use blk taging (Ewan Milne) [1581728 1491014]
[nvme] rdma: Use mr pool (David Milburn) [1581347 1547273]
[nvme] rdma: Check remotely invalidated rkey matches our expected rkey (David Milburn) [1581347 1547273]
[nvme] rdma: wait for local invalidation before completing a request (David Milburn) [1581347 1547273]
[nvme] rdma: don't complete requests before a send work request has completed (David Milburn) [1581347 1547273]
[nvme] rdma: don't suppress send completions (David Milburn) [1581347 1547273]
[x86] kvm: Fix loss of pending INIT due to race (Radim Krcmar) [1580467 1569473]
[mm] mempolicy: fix use after free when calling get_mempolicy (Augusto Caringi) [1576759 1576755] {CVE-2018-10675}
[sound] alsa: seq: Fix racy pool initializations (Jaroslav Kysela) [1550171 1593586 1550169 1535427] {CVE-2018-7566}
[crypto] algif_skcipher: Load TX SG list after waiting (Bruno Eduardo de Oliveira Meneguele) [1541870 1541875] {CVE-2017-13215}

2018-06-27

[iscsi-target] Fix iscsi_np reset hung task during parallel delete (Maurizio Lombardi) [1583593 1579217]

2018-06-15

[x86] always enable eager FPU by default on non-AMD processors (Paolo Bonzini) [1589051 1589048] {CVE-2018-3665}
[net] nf_reset: also clear nfctinfo bits (Florian Westphal) [1588458 1572983]
[x86] bugs: Switch the selection of mitigation from CPU vendor to CPU features (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] bugs: Add AMD's SPEC_CTRL MSR usage (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] bugs: Add AMD's variant of SSB_NO (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Fix VM guest SSBD problems (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Eliminate TIF_SSBD checks in IBRS on/off functions (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Disable SSBD update from scheduler if not user settable (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Make ssbd_enabled writtable (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Remove thread_info check in __wrmsr_on_cpu() (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Write per-thread SSBD state to spec_ctrl_pcp (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Add a read-only ssbd_enabled debugfs file (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] bugs/intel: Set proper CPU features and setup RDS (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] kvm: vmx: Emulate MSR_IA32_ARCH_CAPABILITIES (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] kvm: svm: Implement VIRT_SPEC_CTRL support for SSBD (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] bugs: Rework spec_ctrl base and mask logic (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Rework SPEC_CTRL update after late microcode loading (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Make sync_all_cpus_ibrs() write spec_ctrl_pcp value (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] bugs: Unify x86_spec_ctrl_{set_guest, restore_host} (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] speculation: Rework speculative_store_bypass_update() (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] speculation: Add virtualized speculative store bypass disable support (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] KVM: Rename KVM SPEC_CTRL MSR functions to match upstream (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] speculation: Handle HT correctly on AMD (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] cpufeatures: Add FEATURE_ZEN (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] cpufeatures: Disentangle SSBD enumeration (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] speculation: Use synthetic bits for IBRS/IBPB/STIBP (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[documentation] spec_ctrl: Do some minor cleanups (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] speculation: Make "seccomp" the default mode for Speculative Store Bypass (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] seccomp: Move speculation migitation control to arch code (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[kernel] seccomp: Add filter flag to opt-out of SSB mitigation (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[kernel] seccomp: Use PR_SPEC_FORCE_DISABLE (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] prctl: Add force disable speculation (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spectre_v2: No mitigation if CPU not affected and no command override (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] bug: Add X86_BUG_CPU_MELTDOWN and X86_BUG_SPECTRE_V[12] (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] pti: Rename CONFIG_KAISER to CONFIG_PAGE_TABLE_ISOLATION (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Sync up naming of SPEC_CTRL MSR bits with upstream (Waiman Long) [1584323 1584569] {CVE-2018-3639}
[x86] spec_ctrl: Sync up SSBD changes with upstream (Waiman Long) [1584323 1584569] {CVE-2018-3639}

2018-06-06

[linux] fsnotify: Fix fsnotify_mark_connector race (Miklos Szeredi) [1584684 1569921]

2018-06-04

[x86] microcode: Load microcode on all cpus (Prarit Bhargava) [1578047 1568249]
[x86] microcode: Fix CPU synchronization routine (Prarit Bhargava) [1578047 1568249]
[x86] microcode: Attempt late loading only when new microcode is present (Prarit Bhargava) [1578047 1568249]
[x86] microcode: Synchronize late microcode loading (Prarit Bhargava) [1578047 1568249]
[x86] microcode: Request microcode on the BSP (Prarit Bhargava) [1578047 1568249]
[x86] microcode: Do not upload microcode if CPUs are offline (Prarit Bhargava) [1578047 1568249]
[x86] microcode/intel: Writeback and invalidate caches before updating microcode (Prarit Bhargava) [1578047 1568249]
[x86] microcode/intel: Check microcode revision before updating sibling threads (Prarit Bhargava) [1578047 1568249]
[x86] microcode: Get rid of struct apply_microcode_ctx (Prarit Bhargava) [1578047 1568249]
[x86] cpu: Add a microcode loader callback (Prarit Bhargava) [1578047 1568249]
[x86] microcode: Propagate return value from updating functions (Prarit Bhargava) [1578047 1568249]
[x86] microcode/amd: Change load_microcode_amd()'s param to bool to fix preemptibility bug (Prarit Bhargava) [1578047 1568249]
[x86] microcode/intel: Add a helper which gives the microcode revision (Prarit Bhargava) [1578047 1568249]
[x86] cpu: Add native CPUID variants returning a single datum (Prarit Bhargava) [1578047 1568249]
[x86] microcode/amd: Move private inlines to .c and mark local functions static (Prarit Bhargava) [1578047 1568249]
[x86] microcode/intel: Simplify generic_load_microcode() (Prarit Bhargava) [1578047 1568249]
[x86] microcode/intel: Do not issue microcode updates messages on each CPU (Prarit Bhargava) [1578047 1568249]
[kernel] pidns: Don't have unshare(CLONE_NEWPID) imply CLONE_THREAD (Oleg Nesterov) [1578997 1577745]
[powerpc] 64s: Add support for a store forwarding barrier at kernel entry/exit (Mauricio Oliveira) [1581045 1581036] {CVE-2018-3639}
[powerpc] 64s: Move the data access exception out-of-line (Mauricio Oliveira) [1581045 1581036] {CVE-2018-3639}

2018-05-28

[netdrv] vmxnet3: use correct flag to indicate LRO feature (Neil Horman) [1567771 1558685]
[netdrv] vmxnet3: avoid xmit reset due to a race in vmxnet3 (Neil Horman) [1567771 1558685]
[kernel] ib/mlx5: Respect new UMR capabilities (Alaa Hleihel) [1579847 1573661]
[infiniband] ib/mlx5: Enable ECN capable bits for UD RoCE v2 QPs (Alaa Hleihel) [1579847 1573661]
[scsi] cdrom: do not call check_disk_change() inside cdrom_open() (Maurizio Lombardi) [1579834 1538362]
[hid] wacom: Fix reporting of touch toggle (WACOM_HID_WD_MUTE_DEVICE) events (Benjamin Tissoires) [1579192 1551776]
[hid] wacom: generic: Recognize WACOM_HID_WD_PEN as a type of pen collection (Benjamin Tissoires) [1579192 1551776]
[hid] wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (Benjamin Tissoires) [1579191 1551783]
[fs] eventpoll: fix uninitialized variable in epoll_ctl (Paul Moore) [1578734 1553256]
[fs] nfs41: do not return ENOMEM on LAYOUTUNAVAILABLE (Scott Mayhew) [1578458 1574002]
[net] sock_diag: request _diag module only when the family or proto has been registered (Xin Long) [1578272 1544898]
[target] Re-add missing SCF_ACK_KREF assignment in (Mike Christie) [1578048 1561851]
[gpu] drm/nouveau: Fix deadlock in nv50_mstm_register_connector() (Lyude Paul) [1577792 1571927]
[netdrv] vmxnet3: segCnt can be 1 for LRO packets (Neil Horman) [1577790 1426680]
[s390] correct nospec auto detection init order (Hendrik Brueckner) [1577767 1558325]
[s390] add sysfs attributes for spectre (Hendrik Brueckner) [1577767 1558325]
[s390] report spectre mitigation via syslog (Hendrik Brueckner) [1577767 1558325]
[s390] add automatic detection of the spectre defense (Hendrik Brueckner) [1577767 1558325]
[s390] move nobp parameter functions to nospec-branch.c (Hendrik Brueckner) [1577767 1558325]
[s390] do not bypass BPENTER for interrupt system calls (Hendrik Brueckner) [1577767 1558325]
[s390] introduce execute-trampolines for branches (Hendrik Brueckner) [1577767 1558325]
[s390] run user space and KVM guests with modified branch prediction (Hendrik Brueckner) [1577767 1558325]
[s390] add optimized array_index_mask_nospec (Hendrik Brueckner) [1577767 1558325]
[s390] entry.s: fix spurious zeroing of r0 (Hendrik Brueckner) [1577767 1558325]
[s390] scrub registers on kernel entry and KVM exit (Hendrik Brueckner) [1577767 1558325]
[s390] align and prepare spectre mitigation for upstream commits (Hendrik Brueckner) [1577767 1558325]
[s390] alternative: use a copy of the facility bit mask (Hendrik Brueckner) [1577767 1558325]
[gpu] drm/amdgpu: Fix deadlock on runtime suspend (Lyude Paul) [1577760 1563957]
[gpu] drm/radeon: Fix deadlock on runtime suspend (Lyude Paul) [1577760 1563957]
[gpu] drm/nouveau: Fix deadlock on runtime suspend (Lyude Paul) [1577760 1563957]
[gpu] drm: Allow determining if current task is output poll worker (Lyude Paul) [1577760 1563957]
[gpu] workqueue: Allow retrieval of current task's work struct (1/5) (Lyude Paul) [1577760 1563957]
[md] dm: remove fmode_t argument from .prepare_ioctl hook (Mike Snitzer) [1576508 1562960]
[md] dm: hold DM table for duration of ioctl rather than use blkdev_get (Mike Snitzer) [1576508 1562960]
[scsi] iscsi: respond to netlink with unicast when appropriate (Chris Leech) [1576293 1330865]
[netdrv] i40e: fix incorrect UP-TC mapping (Stefan Assmann) [1574371 1558159]
[powerpc] System reset avoid interleaving oops using die synchronisation (Mauricio Oliveira) [1574366 1564126]
[powerpc] Do not send system reset request through the oops path (Mauricio Oliveira) [1574366 1564126]
[powerpc] crash: Remove the test for cpu_online in the IPI callback (Mauricio Oliveira) [1574366 1564126]
[sound] hda: Fix a wrong FIXUP for alc289 on Dell machines (Jaroslav Kysela) [1571581 1548969]
[sound] hda: Fix headset mic detection problem for two Dell machines (Jaroslav Kysela) [1571581 1548969]
[firmware] fw_cfg: write vmcoreinfo details (Marc-Andre Lureau) [1571369 1533367]
[kernel] crash: export paddr_vmcoreinfo_note() (Marc-Andre Lureau) [1571369 1533367]
[firmware] fw_cfg: add DMA register (Marc-Andre Lureau) [1571369 1533367]
[firmware] fw_cfg: add a public uapi header (Marc-Andre Lureau) [1571369 1533367]
[firmware] fw_cfg: handle fw_cfg_read_blob() error (Marc-Andre Lureau) [1571369 1533367]
[firmware] fw_cfg: remove inline from fw_cfg_read_blob() (Marc-Andre Lureau) [1571369 1533367]
[firmware] fw_cfg: fix sparse warnings around FW_CFG_FILE_DIR read (Marc-Andre Lureau) [1571369 1533367]
[firmware] fw_cfg: fix sparse warning reading FW_CFG_ID (Marc-Andre Lureau) [1571369 1533367]
[firmware] fw_cfg: fix sparse warnings with fw_cfg_file (Marc-Andre Lureau) [1571369 1533367]
[firmware] fw_cfg: fix sparse warnings in fw_cfg_sel_endianness() (Marc-Andre Lureau) [1571369 1533367]
[firmware] revert "fw_cfg: add DMA register" (Marc-Andre Lureau) [1571369 1533367]
[firmware] revert "fw_cfg: do DMA read operation" (Marc-Andre Lureau) [1571369 1533367]
[firmware] revert "fw_cfg: write vmcoreinfo details" (Marc-Andre Lureau) [1571369 1533367]
[infiniband] mlx5: Set the default active rate and width to QDR and 4X (Honggang Li) [1570536 1554535]
[x86] spec_ctrl: disable IBRS in idle, part 2 (Josh Poimboeuf) [1570532 1558668]
[x86] platform/uv: Fix critical UV MMR address error (Frank Ramsay) [1570520 1562945]
[powerpc] pseries: Restore default security feature flags on setup (Mauricio Oliveira) [1570518 1561787]
[powerpc] Move default security feature flags (Mauricio Oliveira) [1570518 1561787]
[powerpc] pseries: Fix clearing of security feature flags (Mauricio Oliveira) [1570518 1561787]
[powerpc] 64s: Wire up cpu_show_spectre_v2() (Mauricio Oliveira) [1570518 1561787]
[powerpc] 64s: Wire up cpu_show_spectre_v1() (Mauricio Oliveira) [1570518 1561787]
[powerpc] pseries: Use the security flags in pseries_setup_rfi_flush() (Mauricio Oliveira) [1570518 1561787]
[powerpc] powernv: Use the security flags in pnv_setup_rfi_flush() (Mauricio Oliveira) [1570518 1561787]
[powerpc] 64s: Enhance the information in cpu_show_meltdown() (Mauricio Oliveira) [1570518 1561787]
[powerpc] 64s: Move cpu_show_meltdown() (Mauricio Oliveira) [1570518 1561787]
[powerpc] powernv: Set or clear security feature flags (Mauricio Oliveira) [1570518 1561787]
[powerpc] pseries: Set or clear security feature flags (Mauricio Oliveira) [1570518 1561787]
[powerpc] Add security feature flags for Spectre/Meltdown (Mauricio Oliveira) [1570518 1561787]
[powerpc] pseries: Add new H_GET_CPU_CHARACTERISTICS flags (Mauricio Oliveira) [1570518 1561787]
[powerpc] lib: seq: Add seq_buf_printf() (Mauricio Oliveira) [1570518 1561787]
[powerpc] rfi-flush: Call setup_rfi_flush() after LPM migration (Mauricio Oliveira) [1570509 1561785]
[powerpc] rfi-flush: Differentiate enabled and patched flush types (Mauricio Oliveira) [1570509 1561785]
[powerpc] rfi-flush: Always enable fallback flush on pseries (Mauricio Oliveira) [1570509 1561785]
[powerpc] rfi-flush: Make it possible to call setup_rfi_flush() again (Mauricio Oliveira) [1570509 1561785]
[powerpc] rfi-flush: Move the logic to avoid a redo into the debugfs code (Mauricio Oliveira) [1570509 1561785]
[fs] vfs: Remove incorrect debugging WARN in prepend_path (Frank Sorenson) [1568322 1481732]
[fs] xfs: fix transaction allocation deadlock in IO path (Eric Sandeen) [1568320 1551111]
[md] support to split big bio (Ming Lei) [1568070 1557434]
[block] introduce bio_split2() and bio_pair2_release() (Ming Lei) [1568070 1557434]
[netdrv] qed: Free reserved MR tid (Harish Patil) [1568069 1554217]
[netdrv] qed: Free RoCE ILT Memory on rmmod qedr (Harish Patil) [1568069 1554217]
[net] sctp: use right member as the param of list_for_each_entry (Xin Long) [1565983 1483445]
[net] sctp: reset owner sk for data chunks on out queues when migrating a sock (Xin Long) [1565983 1483445]
[net] xfrm: policy: check policy direction value (Bruno Eduardo de Oliveira Meneguele) [1479419 1479421] {CVE-2017-11600}
[x86] spec_ctrl: Fix late microcode problem with AMD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] entry: Add missing "$" in IBRS macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] spec_ctrl: Clean up entry code & remove unused APIs (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] spec_ctrl: Mask off SPEC_CTRL MSR bits that are managed by kernel (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[fs] proc: Use CamelCase for SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] bugs: Rename _RDS to _SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[kernel] seccomp: Enable speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[fs] proc: Provide details on speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] nospec: Allow getting/setting on non-current task (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] speculation: Add prctl for Speculative Store Bypass mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] process: Allow runtime control of Speculative Store Bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[uapi] prctl: Add speculation control prctls (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] kvm/vmx: Expose SPEC_CTRL Bit(2) to the guest (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] bugs/amd: Add support to disable RDS on Fam[15, 16, 17]h if requested (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] spec_ctrl: Sync up RDS setting with IBRS code (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] bugs: Expose /sys/../spec_store_bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] bugs: Read SPEC_CTRL MSR during boot and re-use (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] spec_ctrl: Use separate PCP variables for IBRS entry and exit (Waiman Long) [1566904 1566905] {CVE-2018-3639}
[x86] cpufeatures: Make CPU bugs sticky (Waiman Long) [1566904 1566905] {CVE-2018-3639}

2018-05-10

[powerpc] msi: Fix race condition in tearing down MSI interrupts (David Milburn) [1570511 1549680]

2018-05-10

[x86] kpti/kexec: fix wrong page address in clear_page (Dave Young) [1573173 1571162]
[x86] kvm: fix icebp instruction handling (Paolo Bonzini) [1566849 1566845] {CVE-2018-1087}
[x86] entry/64: Don't use IST entry for #BP stack (Paolo Bonzini) [1567084 1567083] {CVE-2018-8897}
[kernel] perf/hwbp: Simplify the perf-hwbp code, fix documentation (Eugene Syromiatnikov) [1569878 1569874] {CVE-2018-1000199}

2018-04-30

[md] dm: fix dropped return code from dm_get_bdev_for_ioctl (Mike Snitzer) [1567746 1562962]
[crypto] aesni: Add support for 192 & 256 bit keys to AESNI RFC4106 (Bruno Eduardo de Oliveira Meneguele) [1570537 1568167]