kernel/Patchlist.changelog

157 lines
9.6 KiB
Plaintext
Raw Normal View History

"https://gitlab.com/cki-project/kernel-ark/-/commit"/b9dfa5218351f6286e97beba802c14813735f255
b9dfa5218351f6286e97beba802c14813735f255 Revert "block: freeze the queue earlier in del_gendisk"
"https://gitlab.com/cki-project/kernel-ark/-/commit"/3f1696ca1e6762e9774ecb4d0dedbc54dedb284d
3f1696ca1e6762e9774ecb4d0dedbc54dedb284d drivers/firmware: skip simpledrm if nvidia-drm.modeset=1 is set
"https://gitlab.com/cki-project/kernel-ark/-/commit"/7e71aedbf01514b3c8465e224532209c606c6a45
7e71aedbf01514b3c8465e224532209c606c6a45 Bluetooth: hci_event: Fix vendor (unknown) opcode status handling
"https://gitlab.com/cki-project/kernel-ark/-/commit"/a8c6f414c43838287e9b59923debd432dbe4c4c8
a8c6f414c43838287e9b59923debd432dbe4c4c8 Bluetooth: hci_sync: Fix resuming scan after suspend resume
"https://gitlab.com/cki-project/kernel-ark/-/commit"/4e3695b44c9dc069d2b3fbb530920e53094912fe
4e3695b44c9dc069d2b3fbb530920e53094912fe arm64: config: Enable DRM_V3D
"https://gitlab.com/cki-project/kernel-ark/-/commit"/2341d8a6beaf60736385ddaaca756e881af89781
2341d8a6beaf60736385ddaaca756e881af89781 ARM: configs: Enable DRM_V3D
"https://gitlab.com/cki-project/kernel-ark/-/commit"/1b1074d4ebff98afe3f72b458cd962c139ba39dd
1b1074d4ebff98afe3f72b458cd962c139ba39dd ARM: dts: bcm2711: Enable V3D
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f2142c5ce61ed3e56355ad8ae56f5fa70d1ae657
f2142c5ce61ed3e56355ad8ae56f5fa70d1ae657 drm/v3d: Add support for bcm2711
"https://gitlab.com/cki-project/kernel-ark/-/commit"/645ee8139e44ade7ee3c98d893103d33be8e158b
645ee8139e44ade7ee3c98d893103d33be8e158b drm/v3d: Get rid of pm code
"https://gitlab.com/cki-project/kernel-ark/-/commit"/3647ef3c2586cfedf37b0ae6d01e8b92cfe928d6
3647ef3c2586cfedf37b0ae6d01e8b92cfe928d6 dt-bindings: gpu: v3d: Add BCM2711's compatible
"https://gitlab.com/cki-project/kernel-ark/-/commit"/892aac5ebdcc063fd7f09a37ee928a5a9ecd72fb
892aac5ebdcc063fd7f09a37ee928a5a9ecd72fb soc: bcm: bcm2835-power: Bypass power_on/off() calls
"https://gitlab.com/cki-project/kernel-ark/-/commit"/50e89be2e0d665781ca4e6b644fab7e1cfb67964
50e89be2e0d665781ca4e6b644fab7e1cfb67964 soc: bcm: bcm2835-power: Add support for BCM2711's RPiVid ASB
"https://gitlab.com/cki-project/kernel-ark/-/commit"/be14a2fbef5aa2f92bb3ac433c844cb7f375fe3c
be14a2fbef5aa2f92bb3ac433c844cb7f375fe3c soc: bcm: bcm2835-power: Resolve ASB register macros
"https://gitlab.com/cki-project/kernel-ark/-/commit"/4289bb18a0d9a86c9db0995f7ed606d9c839fb09
4289bb18a0d9a86c9db0995f7ed606d9c839fb09 soc: bcm: bcm2835-power: Refactor ASB control
"https://gitlab.com/cki-project/kernel-ark/-/commit"/d70b82903ad10563b8d0d7adb142f819c8a47cab
d70b82903ad10563b8d0d7adb142f819c8a47cab mfd: bcm2835-pm: Add support for BCM2711
"https://gitlab.com/cki-project/kernel-ark/-/commit"/a88abe0bbe3ddd0fc8382897b6d466c73da5ae21
a88abe0bbe3ddd0fc8382897b6d466c73da5ae21 mfd: bcm2835-pm: Use 'reg-names' to get resources
"https://gitlab.com/cki-project/kernel-ark/-/commit"/e9b6c9854d55dca6b9d1a1ae18487420aedf07b5
e9b6c9854d55dca6b9d1a1ae18487420aedf07b5 ARM: dts: bcm2711: Use proper compatible in PM/Watchdog node
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f201eabc0f66996b5e6a10ab0b6a2a215168b29e
f201eabc0f66996b5e6a10ab0b6a2a215168b29e ARM: dts: bcm2835/bcm2711: Introduce reg-names in watchdog node
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/9468325b07e8ba299c8f01219e9d56f312d6c30c
9468325b07e8ba299c8f01219e9d56f312d6c30c dt-bindings: soc: bcm: bcm2835-pm: Add support for bcm2711
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/90de620e1461a3a167a2cd25683b277065370e42
90de620e1461a3a167a2cd25683b277065370e42 dt-bindings: soc: bcm: bcm2835-pm: Introduce reg-names
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/bad6aece146bda1a79df7fc848ad42be202c8884
bad6aece146bda1a79df7fc848ad42be202c8884 dt-bindings: soc: bcm: bcm2835-pm: Convert bindings to DT schema
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/9ef3260d80ae477ae67a2a07f8990d66bb03aa43
9ef3260d80ae477ae67a2a07f8990d66bb03aa43 drm: Prevent drm_copy_field() to attempt copying a NULL pointer
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/4f0669ea8d2ee562fa5699f95aff4df5dfd520f0
4f0669ea8d2ee562fa5699f95aff4df5dfd520f0 drm: Use size_t type for len variable in drm_copy_field()
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f63fa529dbf1547966b5fb979916df7870e9645e
f63fa529dbf1547966b5fb979916df7870e9645e net: phy: Add support for 1PPS out and external timestamps
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/4e0c2ae717e670ba594f1cc2948e99ae22cc5879
4e0c2ae717e670ba594f1cc2948e99ae22cc5879 net: phy: broadcom: Add PTP support for some Broadcom PHYs.
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/dc7c88b93e5198d19c30762b66854af8f03bdd3a
dc7c88b93e5198d19c30762b66854af8f03bdd3a net: phy: broadcom: Add Broadcom PTP hooks to bcm-phy-lib
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/88a0b4335c039716a4ba0c89ab841c103499a2ee
88a0b4335c039716a4ba0c89ab841c103499a2ee arm64: use common CONFIG_MAX_ZONEORDER for arm kernel
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/e5bfecafbd51bbf163d9353dafe245437657f2a7
e5bfecafbd51bbf163d9353dafe245437657f2a7 RHEL: disable io_uring support
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f17f7f65af22553f8cd7ba2ca994c47a4d01de28
f17f7f65af22553f8cd7ba2ca994c47a4d01de28 REDHAT: coresight: etm4x: Disable coresight on HPE Apollo 70
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/fff03208e2f556608e7b8371bc00206d5b35390e
fff03208e2f556608e7b8371bc00206d5b35390e KEYS: Make use of platform keyring for module signature verify
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/a02ac0771c65db45cae6518b6cd0571039614998
a02ac0771c65db45cae6518b6cd0571039614998 Input: rmi4 - remove the need for artificial IRQ in case of HID
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/4d44cde022478da06f3f41c6a777af10515a308e
4d44cde022478da06f3f41c6a777af10515a308e ARM: tegra: usb no reset
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/6dee6c964b4d9ee86b112fac7454f0041f26a691
6dee6c964b4d9ee86b112fac7454f0041f26a691 arm: make CONFIG_HIGHPTE optional without CONFIG_EXPERT
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f5c5cc300dd57fcbdd23a97b87afef29b4d75d2a
f5c5cc300dd57fcbdd23a97b87afef29b4d75d2a Add option of 13 for FORCE_MAX_ZONEORDER
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/8a6f0b0bc97e2d56249104d33ee89b13d9097364
8a6f0b0bc97e2d56249104d33ee89b13d9097364 s390: Lock down the kernel when the IPL secure flag is set
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/1f727ffd29c09ee6e99c3ab383e84bf1a7fd8af3
1f727ffd29c09ee6e99c3ab383e84bf1a7fd8af3 efi: Lock down the kernel if booted in secure boot mode
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/583e00d1bccdb63d9586bdad159f85ebb127e1e9
583e00d1bccdb63d9586bdad159f85ebb127e1e9 efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/1c37764bbfc3e91dfacd292b9f2e76690acd3403
1c37764bbfc3e91dfacd292b9f2e76690acd3403 security: lockdown: expose a hook to lock the kernel down
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/df38cada14c6f5721c9b041412fa7084d45f3154
df38cada14c6f5721c9b041412fa7084d45f3154 Make get_cert_list() use efi_status_to_str() to print error messages.
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/3b2a53a1c1dbbb048318652a60ddae3c96c8d212
3b2a53a1c1dbbb048318652a60ddae3c96c8d212 Add efi_status_to_str() and rework efi_status_to_err().
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/582aa8a5a87cc903357bdac041450fd3d9eb9f66
582aa8a5a87cc903357bdac041450fd3d9eb9f66 arm: aarch64: Drop the EXPERT setting from ARM64_FORCE_52BIT
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/c7c419e5d8ff0b6afbe50575312b8e583bbfb451
c7c419e5d8ff0b6afbe50575312b8e583bbfb451 iommu/arm-smmu: workaround DMA mode issues
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/8dacf789a4e58fb318ebedd7a800921d62625bfa
8dacf789a4e58fb318ebedd7a800921d62625bfa ipmi: do not configure ipmi for HPE m400
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f04bb5a80b991b9c60aa9a12f8e9082ea198cda8
f04bb5a80b991b9c60aa9a12f8e9082ea198cda8 ahci: thunderx2: Fix for errata that affects stop engine
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/5ba69404453c964ad762af1da02aff513515199b
5ba69404453c964ad762af1da02aff513515199b Vulcan: AHCI PCI bar fix for Broadcom Vulcan early silicon
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/1c8fff17321f18351ad3748a3bd77c577303502a
1c8fff17321f18351ad3748a3bd77c577303502a tags.sh: Ignore redhat/rpm
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/f5a5a76cd7952459d524743a9b3889ca03a0fbfc
f5a5a76cd7952459d524743a9b3889ca03a0fbfc aarch64: acpi scan: Fix regression related to X-Gene UARTs
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/6515b5c1e84e51b6c174867eb1a88ef585121674
6515b5c1e84e51b6c174867eb1a88ef585121674 ACPI / irq: Workaround firmware issue on X-Gene based m400
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/efaa9ec4055f79a03681d943684317aa11aa36db
efaa9ec4055f79a03681d943684317aa11aa36db ACPI: APEI: arm64: Ignore broken HPE moonshot APEI support
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/900cfefab1156d184d6911e375d4aa152891934e
900cfefab1156d184d6911e375d4aa152891934e Introduce CONFIG_RH_DISABLE_DEPRECATED
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/57e43effa27009c0ca1d82038b4ddf9e4ee39dd9
57e43effa27009c0ca1d82038b4ddf9e4ee39dd9 Pull the RHEL version defines out of the Makefile
kernel-5.18.11-100 * Tue Jul 12 2022 Justin M. Forbes <jforbes@fedoraproject.org> [5.18.11-0] - x86/static_call: Serialize __static_call_fixup() properly (Thomas Gleixner) - x86/speculation: Disable RRSBA behavior (Pawan Gupta) - x86/kexec: Disable RET on kexec (Konrad Rzeszutek Wilk) - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Peter Zijlstra) - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Pawan Gupta) - x86/retbleed: Add fine grained Kconfig knobs (Peter Zijlstra) - x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) - x86/common: Stamp out the stepping madness (Peter Zijlstra) - KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) - x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) - KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) - KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) - KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) - x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) - x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) - x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) - x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) - objtool: Add entry UNRET validation (Thadeu Lima de Souza Cascardo) - x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) - x86/bugs: Add retbleed=ibpb (Peter Zijlstra) - x86/xen: Add UNTRAIN_RET (Peter Zijlstra) - x86/xen: Rename SYS* entry points (Peter Zijlstra) - objtool: Update Retpoline validation (Peter Zijlstra) - intel_idle: Disable IBRS during long idle (Peter Zijlstra) - x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) - x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) - x86/entry: Add kernel IBRS implementation (Thadeu Lima de Souza Cascardo) - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) - x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) - x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) - x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) - x86: Add magic AMD return-thunk (Thadeu Lima de Souza Cascardo) - objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) - x86/entry: Avoid very early RET (Peter Zijlstra) - x86: Use return-thunk in asm code (Peter Zijlstra) - x86/sev: Avoid using __x86_return_thunk (Kim Phillips) - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) - x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) - x86/bpf: Use alternative RET encoding (Peter Zijlstra) - x86/ftrace: Use alternative RET encoding (Peter Zijlstra) - x86,static_call: Use alternative RET encoding (Peter Zijlstra) - objtool: skip non-text sections when adding return-thunk sites (Thadeu Lima de Souza Cascardo) - x86,objtool: Create .return_sites (Peter Zijlstra) - x86: Undo return-thunk damage (Peter Zijlstra) - x86/retpoline: Use -mfunction-return (Peter Zijlstra) - x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) - x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) - x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) - x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) - x86/entry: Remove skip_r11rcx (Peter Zijlstra) - x86/entry: Don't call error_entry() for XENPV (Lai Jiangshan) - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Lai Jiangshan) - x86/entry: Switch the stack after error_entry() returns (Lai Jiangshan) - x86/traps: Use pt_regs directly in fixup_bad_iret() (Lai Jiangshan) Resolves: Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
2022-07-12 22:26:55 +00:00
"https://gitlab.com/cki-project/kernel-ark/-/commit"/9426105b269790bd4fe1bda516f48df915ae7ab2
9426105b269790bd4fe1bda516f48df915ae7ab2 [initial commit] Add Red Hat variables in the top level makefile