commit 9e845488abba60246620531847ed2608c1bbac5c
OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=810
This commit is contained in:
parent
531dbf4264
commit
706577b49b
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-aarch64
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-armv6l
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -31,7 +31,7 @@
|
||||
Name: dtb-armv7l
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -33,7 +33,7 @@ License: GPL-2.0
|
||||
Group: Documentation/Man
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -59,7 +59,7 @@ License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -38,7 +38,7 @@ License: GPL-2.0
|
||||
Group: SLES
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -32,7 +32,7 @@ License: GPL-2.0
|
||||
Group: Development/Sources
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -27,7 +27,7 @@ Group: Development/Sources
|
||||
Version: 4.14.15
|
||||
%if %using_buildservice
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,105 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:47:49 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- Delete patches.suse/orc-fix-retpolines-segfaults.patch.
|
||||
No longer needed.
|
||||
- commit 9e84548
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 21:46:34 CET 2018 - jslaby@suse.cz
|
||||
|
||||
- x86/cpufeatures: Add Intel feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeatures: Add AMD feature bits for Speculation Control
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/pti: Do not enable PTI on processors which are not
|
||||
vulnerable to Meltdown (bsc#1068032 CVE-2017-5715).
|
||||
- x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2
|
||||
microcodes (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBPB (Indirect Branch Prediction
|
||||
Barrier) support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/kvm: Add IBPB support (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Use Indirect Branch Prediction Barrier in
|
||||
context switch (bsc#1068032 CVE-2017-5715).
|
||||
- x86/mm: Only flush indirect branches when switching into non
|
||||
dumpable process (bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add basic IBRS support infrastructure
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/speculation: Add inlines to control Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86: Simplify spectre_v2 command line parsing (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/idle: Control Indirect Branch Speculation in idle
|
||||
(bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Create macros to restrict/unrestrict Indirect Branch
|
||||
Speculation (bsc#1068032 CVE-2017-5715).
|
||||
- x86/enter: Use IBRS on syscall and interrupts (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- x86/ibrs: Add new helper macros to save/restore
|
||||
MSR_IA32_SPEC_CTRL (bsc#1068032 CVE-2017-5715).
|
||||
- x86/vmx: Direct access to MSR_IA32_SPEC_CTRL (bsc#1068032
|
||||
CVE-2017-5715).
|
||||
- Delete
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch.
|
||||
- Delete
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch.
|
||||
- Delete
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch.
|
||||
- Delete
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch.
|
||||
- Delete
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch.
|
||||
- Delete
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch.
|
||||
- Delete
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch.
|
||||
- Delete
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch.
|
||||
- Delete
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch.
|
||||
- Delete
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch.
|
||||
- Delete
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch.
|
||||
- Delete
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch.
|
||||
- Delete
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch.
|
||||
- Delete
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch.
|
||||
- Delete
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch.
|
||||
- Delete
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch.
|
||||
- Delete
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch.
|
||||
- Delete
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch.
|
||||
- Delete
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch.
|
||||
- Delete
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch.
|
||||
- Delete
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
- Delete
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete patches.suse/0030-Use-the-ibrs_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch.
|
||||
- Delete
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch.
|
||||
- Delete
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch.
|
||||
- Delete
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch.
|
||||
- Delete patches.suse/0035-Use-the-ibpb_inuse-variable.patch.
|
||||
- Delete
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch.
|
||||
Update spectre_v1 to the upstream patches.
|
||||
- commit 67b0a37
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jan 25 14:26:16 CET 2018 - jslaby@suse.cz
|
||||
|
||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
||||
Group: System/Kernel
|
||||
Version: 4.14.15
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.g5b3d0ce
|
||||
Release: <RELEASE>.g9e84548
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:e0b5ad2fae65d89cb16c16d9608c326740a587d19cbceaa5b0ef1cede8cd49ab
|
||||
size 80168
|
||||
oid sha256:8224e51f43a065a8ee174fa9fd7444b6312c4f4c1b4bbae5c26949f3bec56f2a
|
||||
size 78162
|
||||
|
53
series.conf
53
series.conf
@ -1551,41 +1551,24 @@
|
||||
patches.suse/0009-kvm-x86-update-spectre-v1-mitigation.patch
|
||||
patches.suse/0010-nl80211-sanitize-array-index-in-parse_txq_params.patch
|
||||
|
||||
patches.suse/0001-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch
|
||||
patches.suse/0002-x86-cpufeatures-Add-AMD-feature-bits-for-Prediction-.patch
|
||||
patches.suse/0003-x86-msr-Add-definitions-for-new-speculation-control-.patch
|
||||
|
||||
patches.suse/0004-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch
|
||||
patches.suse/0005-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch
|
||||
patches.suse/0006-x86-Add-macro-that-does-not-save-rax-rcx-rdx-on-stac.patch
|
||||
patches.suse/0007-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch
|
||||
patches.suse/0008-x86-spec_ctrl-save-IBRS-MSR-value-in-paranoid_entry.patch
|
||||
patches.suse/0009-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch
|
||||
patches.suse/0010-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch
|
||||
patches.suse/0011-x86-mm-Set-IBPB-upon-context-switch.patch
|
||||
patches.suse/0012-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch
|
||||
patches.suse/0013-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch
|
||||
patches.suse/0014-x86-syscall-Clear-unused-extra-registers-on-syscall-.patch
|
||||
patches.suse/0015-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch
|
||||
patches.suse/0016-x86-kvm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch
|
||||
patches.suse/0017-x86-kvm-Set-IBPB-when-switching-VM.patch
|
||||
patches.suse/0018-x86-kvm-Toggle-IBRS-on-VM-entry-and-exit.patch
|
||||
patches.suse/0021-x86-spec_ctrl-Add-sysctl-knobs-to-enable-disable-SPE.patch
|
||||
patches.suse/0022-x86-spec_ctrl-Add-lock-to-serialize-changes-to-ibrs-.patch
|
||||
patches.suse/0023-x86-Move-IBRS-IBPB-feature-detection-to-scattered.c.patch
|
||||
patches.suse/0024-x86-microcode-Recheck-IBRS-and-IBPB-feature-on-micro.patch
|
||||
patches.suse/0025-x86-cpu-AMD-Add-speculative-control-support-for-AMD.patch
|
||||
patches.suse/0028-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch
|
||||
patches.suse/0029-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch
|
||||
patches.suse/0030-Use-the-ibrs_inuse-variable.patch
|
||||
patches.suse/0031-Reverting-the-commit-e5247c4f209530-to-replace.patch
|
||||
patches.suse/0032-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch
|
||||
patches.suse/0033-KVM-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch
|
||||
patches.suse/0034-Remove-the-code-that-uses-MSR-save-restore-list.patch
|
||||
patches.suse/0035-Use-the-ibpb_inuse-variable.patch
|
||||
patches.suse/0037-Set-IBPB-when-running-a-different-VCPU.patch
|
||||
|
||||
patches.suse/orc-fix-retpolines-segfaults.patch
|
||||
patches.suse/0001-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch
|
||||
patches.suse/0002-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch
|
||||
patches.suse/0003-x86-cpufeatures-Add-AMD-feature-bits-for-Speculation.patch
|
||||
patches.suse/0004-x86-msr-Add-definitions-for-new-speculation-control-.patch
|
||||
patches.suse/0005-x86-pti-Do-not-enable-PTI-on-processors-which-are-no.patch
|
||||
patches.suse/0006-x86-cpufeature-Blacklist-SPEC_CTRL-on-early-Spectre-.patch
|
||||
patches.suse/0007-x86-speculation-Add-basic-IBPB-Indirect-Branch-Predi.patch
|
||||
patches.suse/0008-x86-kvm-Add-IBPB-support.patch
|
||||
patches.suse/0009-x86-speculation-Use-Indirect-Branch-Prediction-Barri.patch
|
||||
patches.suse/0010-x86-mm-Only-flush-indirect-branches-when-switching-i.patch
|
||||
patches.suse/0011-x86-speculation-Add-basic-IBRS-support-infrastructur.patch
|
||||
patches.suse/0012-x86-speculation-Add-inlines-to-control-Indirect-Bran.patch
|
||||
patches.suse/0013-x86-Simplify-spectre_v2-command-line-parsing.patch
|
||||
patches.suse/0014-x86-idle-Control-Indirect-Branch-Speculation-in-idle.patch
|
||||
patches.suse/0015-x86-enter-Create-macros-to-restrict-unrestrict-Indir.patch
|
||||
patches.suse/0016-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch
|
||||
patches.suse/0017-x86-ibrs-Add-new-helper-macros-to-save-restore-MSR_I.patch
|
||||
patches.suse/0018-x86-vmx-Direct-access-to-MSR_IA32_SPEC_CTRL.patch
|
||||
|
||||
########################################################
|
||||
# Architecture-specific patches. These used to be all
|
||||
|
@ -1,3 +1,3 @@
|
||||
2018-01-25 14:26:16 +0100
|
||||
GIT Revision: 5b3d0ced9505101bb6a7c1f0eb4978d8f7e9d005
|
||||
2018-01-25 21:47:49 +0100
|
||||
GIT Revision: 9e845488abba60246620531847ed2608c1bbac5c
|
||||
GIT Branch: stable
|
||||
|
Loading…
Reference in New Issue
Block a user