aboutsummaryrefslogtreecommitdiffstats
path: root/common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc
diff options
context:
space:
mode:
Diffstat (limited to 'common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc')
-rw-r--r--common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc169
1 files changed, 169 insertions, 0 deletions
diff --git a/common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc b/common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc
new file mode 100644
index 00000000..3138ec93
--- /dev/null
+++ b/common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc
@@ -0,0 +1,169 @@
+patch 0001-x86-boot-Add-early-cmdline-parsing-for-options-with-.patch
+patch 0002-x86-mm-Add-the-nopcid-boot-option-to-turn-off-PCID.patch
+patch 0003-x86-mm-Enable-CR4.PCIDE-on-supported-systems.patch
+patch 0004-KAISER-Kernel-Address-Isolation.patch
+patch 0005-kaiser-merged-update.patch
+patch 0006-kaiser-do-not-set-_PAGE_NX-on-pgd_none.patch
+patch 0007-kaiser-stack-map-PAGE_SIZE-at-THREAD_SIZE-PAGE_SIZE.patch
+patch 0008-kaiser-fix-build-and-FIXME-in-alloc_ldt_struct.patch
+patch 0009-kaiser-KAISER-depends-on-SMP.patch
+patch 0010-kaiser-fix-regs-to-do_nmi-ifndef-CONFIG_KAISER.patch
+patch 0011-kaiser-fix-perf-crashes.patch
+patch 0012-kaiser-ENOMEM-if-kaiser_pagetable_walk-NULL.patch
+patch 0013-kaiser-tidied-up-asm-kaiser.h-somewhat.patch
+patch 0014-kaiser-tidied-up-kaiser_add-remove_mapping-slightly.patch
+patch 0015-kaiser-align-addition-to-x86-mm-Makefile.patch
+patch 0016-kaiser-cleanups-while-trying-for-gold-link.patch
+patch 0017-kaiser-name-that-0x1000-KAISER_SHADOW_PGD_OFFSET.patch
+patch 0018-kaiser-delete-KAISER_REAL_SWITCH-option.patch
+patch 0019-kaiser-vmstat-show-NR_KAISERTABLE-as-nr_overhead.patch
+patch 0020-kaiser-enhanced-by-kernel-and-user-PCIDs.patch
+patch 0021-kaiser-load_new_mm_cr3-let-SWITCH_USER_CR3-flush-use.patch
+patch 0022-kaiser-PCID-0-for-kernel-and-128-for-user.patch
+patch 0023-kaiser-x86_cr3_pcid_noflush-and-x86_cr3_pcid_user.patch
+patch 0024-kaiser-paranoid_entry-pass-cr3-need-to-paranoid_exit.patch
+patch 0025-kaiser-kaiser_remove_mapping-move-along-the-pgd.patch
+patch 0026-kaiser-fix-unlikely-error-in-alloc_ldt_struct.patch
+patch 0027-kaiser-add-nokaiser-boot-option-using-ALTERNATIVE.patch
+patch 0028-x86-kaiser-Rename-and-simplify-X86_FEATURE_KAISER-ha.patch
+patch 0029-x86-kaiser-Check-boottime-cmdline-params.patch
+patch 0030-kaiser-use-ALTERNATIVE-instead-of-x86_cr3_pcid_noflu.patch
+patch 0031-kaiser-drop-is_atomic-arg-to-kaiser_pagetable_walk.patch
+patch 0032-kaiser-asm-tlbflush.h-handle-noPGE-at-lower-level.patch
+patch 0033-kaiser-kaiser_flush_tlb_on_return_to_user-check-PCID.patch
+patch 0034-x86-paravirt-Dont-patch-flush_tlb_single.patch
+patch 0035-x86-kaiser-Reenable-PARAVIRT.patch
+patch 0036-kaiser-disabled-on-Xen-PV.patch
+patch 0037-x86-kaiser-Move-feature-detection-up.patch
+patch 0038-KPTI-Rename-to-PAGE_TABLE_ISOLATION.patch
+patch 0039-KPTI-Report-when-enabled.patch
+patch 0040-kaiser-Set-_PAGE_NX-only-if-supported.patch
+patch 0041-kaiser-Set-_PAGE_NX-only-if-supported.patch
+patch 0042-bpf-move-fixup_bpf_calls-function.patch
+patch 0043-bpf-refactor-fixup_bpf_calls.patch
+patch 0044-bpf-prevent-out-of-bounds-speculation.patch
+patch 0045-bpf-array-fix-overflow-in-max_entries-and-undefined-.patch
+patch 0046-x86-Documentation-Add-PTI-description.patch
+patch 0047-x86-cpu-Factor-out-application-of-forced-CPU-caps.patch
+patch 0048-x86-cpufeatures-Make-CPU-bugs-sticky.patch
+patch 0049-x86-cpufeatures-Add-X86_BUG_CPU_INSECURE.patch
+patch 0050-x86-pti-Rename-BUG_CPU_INSECURE-to-BUG_CPU_MELTDOWN.patch
+patch 0051-x86-cpufeatures-Add-X86_BUG_SPECTRE_V-12.patch
+patch 0052-x86-cpu-Merge-bugs.c-and-bugs_64.c.patch
+patch 0053-sysfs-cpu-Add-vulnerability-folder.patch
+patch 0054-x86-cpu-Implement-CPU-vulnerabilites-sysfs-functions.patch
+patch 0055-x86-cpu-AMD-Make-LFENCE-a-serializing-instruction.patch
+patch 0056-x86-cpu-AMD-Use-LFENCE_RDTSC-in-preference-to-MFENCE.patch
+patch 0057-sysfs-cpu-Fix-typos-in-vulnerability-documentation.patch
+patch 0058-x86-alternatives-Fix-optimize_nops-checking.patch
+patch 0059-x86-alternatives-Add-missing-n-at-end-of-ALTERNATIVE.patch
+patch 0060-x86-mm-32-Move-setup_clear_cpu_cap-X86_FEATURE_PCID-.patch
+patch 0061-objtool-modules-Discard-objtool-annotation-sections-.patch
+patch 0062-objtool-Detect-jumps-to-retpoline-thunks.patch
+patch 0063-objtool-Allow-alternatives-to-be-ignored.patch
+patch 0064-x86-asm-Use-register-variable-to-get-stack-pointer-v.patch
+patch 0065-x86-retpoline-Add-initial-retpoline-support.patch
+patch 0066-x86-spectre-Add-boot-time-option-to-select-Spectre-v.patch
+patch 0067-x86-retpoline-crypto-Convert-crypto-assembler-indire.patch
+patch 0068-x86-retpoline-entry-Convert-entry-assembler-indirect.patch
+patch 0069-x86-retpoline-ftrace-Convert-ftrace-assembler-indire.patch
+patch 0070-x86-retpoline-hyperv-Convert-assembler-indirect-jump.patch
+patch 0071-x86-retpoline-xen-Convert-Xen-hypercall-indirect-jum.patch
+patch 0072-x86-retpoline-checksum32-Convert-assembler-indirect-.patch
+patch 0073-x86-retpoline-irq32-Convert-assembler-indirect-jumps.patch
+patch 0074-x86-retpoline-Fill-return-stack-buffer-on-vmexit.patch
+patch 0075-x86-retpoline-Remove-compile-time-warning.patch
+patch 0076-objtool-Fix-retpoline-support-for-pre-ORC-objtool.patch
+patch 0077-x86-pti-efi-broken-conversion-from-efi-to-kernel-pag.patch
+patch 0078-x86-retpoline-Fill-RSB-on-context-switch-for-affecte.patch
+patch 0079-x86-retpoline-Add-LFENCE-to-the-retpoline-RSB-fillin.patch
+patch 0080-objtool-Improve-error-message-for-bad-file-argument.patch
+patch 0081-x86-cpufeature-Move-processor-tracing-out-of-scatter.patch
+patch 0082-module-Add-retpoline-tag-to-VERMAGIC.patch
+patch 0083-x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch
+patch 0084-x86-mce-Make-machine-check-speculation-protected.patch
+patch 0085-retpoline-Introduce-start-end-markers-of-indirect-th.patch
+patch 0086-kprobes-x86-Blacklist-indirect-thunk-functions-for-k.patch
+patch 0087-kprobes-x86-Disable-optimizing-on-the-function-jumps.patch
+patch 0088-x86-pti-Document-fix-wrong-index.patch
+patch 0089-x86-retpoline-Optimize-inline-assembler-for-vmexit_f.patch
+patch 0090-Revert-module-Add-retpoline-tag-to-VERMAGIC.patch
+patch 0091-Map-the-vsyscall-page-with-_PAGE_USER.patch
+patch 0092-vsyscall-Fix-permissions-for-emulate-mode-with-KAISE.patch
+patch 0093-bpf-fix-mixed-signed-unsigned-derived-min-max-value-.patch
+patch 0094-bpf-prevent-leaking-pointer-via-xadd-on-unpriviledge.patch
+patch 0095-x86-bpf_jit-small-optimization-in-emit_bpf_tail_call.patch
+patch 0096-bpf-fix-bpf_tail_call-x64-JIT.patch
+patch 0097-bpf-introduce-BPF_JIT_ALWAYS_ON-config.patch
+patch 0098-bpf-arsh-is-not-supported-in-32-bit-alu-thus-reject-.patch
+patch 0099-bpf-avoid-false-sharing-of-map-refcount-with-max_ent.patch
+patch 0100-bpf-fix-divides-by-zero.patch
+patch 0101-bpf-fix-32-bit-divide-by-zero.patch
+patch 0102-bpf-reject-stores-into-ctx-via-st-and-xadd.patch
+patch 0001-kaiser-fix-intel_bts-perf-crashes.patch
+patch 0002-x86-pti-Make-unpoison-of-pgd-for-trusted-boot-work-f.patch
+patch 0003-kaiser-allocate-pgd-with-order-0-when-pti-off.patch
+patch 0004-x86-asm-Fix-inline-asm-call-constraints-for-GCC-4.4.patch
+patch 0005-x86-microcode-AMD-Do-not-load-when-running-on-a-hype.patch
+patch 0006-x86-retpoline-Remove-the-esp-rsp-thunk.patch
+patch 0007-module-retpoline-Warn-about-missing-retpoline-in-mod.patch
+patch 0008-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch
+patch 0009-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch
+patch 0010-x86-cpufeatures-Add-AMD-feature-bits-for-Speculation.patch
+patch 0011-x86-msr-Add-definitions-for-new-speculation-control-.patch
+patch 0012-x86-pti-Do-not-enable-PTI-on-CPUs-which-are-not-vuln.patch
+patch 0013-x86-cpufeature-Blacklist-SPEC_CTRL-PRED_CMD-on-early.patch
+patch 0014-x86-speculation-Add-basic-IBPB-Indirect-Branch-Predi.patch
+patch 0015-x86-nospec-Fix-header-guards-names.patch
+patch 0016-x86-bugs-Drop-one-mitigation-from-dmesg.patch
+patch 0017-x86-cpu-bugs-Make-retpoline-module-warning-condition.patch
+patch 0018-x86-cpufeatures-Clean-up-Spectre-v2-related-CPUID-fl.patch
+patch 0019-x86-retpoline-Simplify-vmexit_fill_RSB.patch
+patch 0020-x86-spectre-Check-CONFIG_RETPOLINE-in-command-line-p.patch
+patch 0021-x86-entry-64-Remove-the-SYSCALL64-fast-path.patch
+patch 0022-x86-entry-64-Push-extra-regs-right-away.patch
+patch 0023-x86-asm-Move-status-from-thread_struct-to-thread_inf.patch
+patch 0024-Documentation-Document-array_index_nospec.patch
+patch 0025-array_index_nospec-Sanitize-speculative-array-de-ref.patch
+patch 0026-x86-Implement-array_index_mask_nospec.patch
+patch 0027-x86-Introduce-barrier_nospec.patch
+patch 0028-x86-Introduce-__uaccess_begin_nospec-and-uaccess_try.patch
+patch 0029-x86-usercopy-Replace-open-coded-stac-clac-with-__uac.patch
+patch 0030-x86-uaccess-Use-__uaccess_begin_nospec-and-uaccess_t.patch
+patch 0031-x86-get_user-Use-pointer-masking-to-limit-speculatio.patch
+patch 0032-x86-syscall-Sanitize-syscall-table-de-references-und.patch
+patch 0033-vfs-fdtable-Prevent-bounds-check-bypass-via-speculat.patch
+patch 0034-x86-spectre-Report-get_user-mitigation-for-spectre_v.patch
+patch 0035-x86-spectre-Fix-spelling-mistake-vunerable-vulnerabl.patch
+patch 0036-x86-cpuid-Fix-up-virtual-IBRS-IBPB-STIBP-feature-bit.patch
+patch 0037-x86-retpoline-Avoid-retpolines-for-built-in-__init-f.patch
+patch 0038-x86-spectre-Simplify-spectre_v2-command-line-parsing.patch
+patch 0039-x86-pti-Mark-constant-arrays-as-__initconst.patch
+patch 0040-x86-speculation-Fix-typo-IBRS_ATT-which-should-be-IB.patch
+patch 0041-x86-microcode-Do-the-family-check-first.patch
+patch 0001-kaiser-fix-compile-error-without-vsyscall.patch
+patch 0002-x86-entry-64-compat-Clear-registers-for-compat-sysca.patch
+patch 0003-x86-speculation-Update-Speculation-Control-microcode.patch
+patch 0004-x86-speculation-Correct-Speculation-Control-microcod.patch
+patch 0005-x86-speculation-Clean-up-various-Spectre-related-det.patch
+patch 0006-x86-speculation-Fix-up-array_index_nospec_mask-asm-c.patch
+patch 0007-x86-speculation-Add-asm-msr-index.h-dependency.patch
+patch 0008-x86-cpu-Rename-cpu_data.x86_mask-to-cpu_data.x86_ste.patch
+patch 0009-x86-spectre-Fix-an-error-message.patch
+patch 0010-x86-cpu-Change-type-of-x86_cache_size-variable-to-un.patch
+patch 0011-x86-microcode-AMD-Change-load_microcode_amd-s-param-.patch
+patch 0012-x86-entry-64-Clear-extra-registers-beyond-syscall-ar.patch
+patch 0001-x86-mm-Remove-flush_tlb-and-flush_tlb_current_task.patch
+patch 0002-x86-mm-Make-flush_tlb_mm_range-more-predictable.patch
+patch 0003-x86-mm-Reimplement-flush_tlb_page-using-flush_tlb_mm.patch
+patch 0004-x86-mm-Remove-the-UP-asm-tlbflush.h-code-always-use-.patch
+patch 0005-x86-mm-Give-each-mm-TLB-flush-generation-a-unique-ID.patch
+patch 0006-x86-speculation-Use-Indirect-Branch-Prediction-Barri.patch
+patch 0007-bpf-x64-implement-retpoline-for-tail-call.patch
+patch 0008-x86-spectre_v2-Don-t-check-microcode-versions-when-r.patch
+patch 0009-Revert-x86-retpoline-Simplify-vmexit_fill_RSB.patch
+patch 0010-x86-speculation-Use-IBRS-if-available-before-calling.patch
+patch 0011-x86-retpoline-Support-retpoline-builds-with-Clang.patch
+patch 0012-x86-speculation-objtool-Annotate-indirect-calls-jump.patch
+patch 0013-x86-boot-objtool-Annotate-indirect-jump-in-secondary.patch
+patch 0014-x86-speculation-Move-firmware_restrict_branch_specul.patch