Comment 1 for bug 1830176

Revision history for this message
Juerg Haefliger (juergh) wrote :

List of previously applied patches:
  * selftests/net: correct the return value for run_netsocktests
  * x86/speculation/mds: Add 'mitigations=' support for MDS
  * x86/speculation: Support 'mitigations=' cmdline option
  * cpu/speculation: Add 'mitigations=' cmdline option
  * x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
  * x86/speculation/mds: Fix comment
  * x86/speculation/mds: Add SMT warning message
  * x86/speculation: Move arch_smt_update() call to after mitigation decisions
  * x86/speculation/mds: Add mitigation mode VMWERV
  * x86/speculation/mds: Add sysfs reporting for MDS
  * x86/speculation/mds: Add mitigation control for MDS
  * x86/speculation: Unify conditional spectre v2 print functions
  * x86/speculation: Reorder the spec_v2 code
  * x86/speculation: Rework SMT state change
  * x86/speculation/mds: Conditionally clear CPU buffers on idle entry
  * x86/speculation/mds: Clear CPU buffers on exit to user
  * locking/static_keys: Provide DECLARE and well as DEFINE macros
  * x86/speculation/mds: Add mds_clear_cpu_buffers()
  * x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
  * x86/speculation/mds: Add BUG_MSBDS_ONLY
  * x86/speculation/mds: Add basic bug infrastructure for MDS
  * x86/speculation: Consolidate CPU whitelists
  * x86/msr-index: Cleanup bit defines
  * locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
  * bitops: avoid integer overflow in GENMASK(_ULL)
  * kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
  * x86/cpu: Sanitize FAM6_ATOM naming
  * x86/speculation: Simplify the CPU bug detection logic
  * vfio/type1: Limit DMA mappings per container
  * igb: Fix WARN_ONCE on runtime suspend
  * KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled
  * x86/speculation: Support Enhanced IBRS on future CPUs
  * x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
  * powerpc/pseries: Restore default security feature flags on setup
  * powerpc: Move default security feature flags
  * powerpc/pseries: Fix clearing of security feature flags
  * powerpc/64s: Wire up cpu_show_spectre_v2()
  * powerpc/64s: Wire up cpu_show_spectre_v1()
  * powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
  * powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
  * powerpc/64s: Enhance the information in cpu_show_meltdown()
  * powerpc/64s: Move cpu_show_meltdown()
  * powerpc/powernv: Set or clear security feature flags
  * powerpc/pseries: Set or clear security feature flags
  * powerpc: Add security feature flags for Spectre/Meltdown
  * powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
  * powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
  * powerpc/rfi-flush: Differentiate enabled and patched flush types
  * powerpc/rfi-flush: Always enable fallback flush on pseries
  * powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
  * powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs code
  * powerpc/powernv: Support firmware disable of RFI flush
  * powerpc/pseries: Support firmware disable of RFI flush