diff options
Diffstat (limited to 'common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc')
-rw-r--r-- | common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc | 123 |
1 files changed, 62 insertions, 61 deletions
diff --git a/common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc b/common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc index 3138ec93..4f4e698c 100644 --- a/common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc +++ b/common/recipes-kernel/linux/linux-yocto-4.9.21/upstream-backports.scc @@ -39,67 +39,68 @@ patch 0038-KPTI-Rename-to-PAGE_TABLE_ISOLATION.patch patch 0039-KPTI-Report-when-enabled.patch patch 0040-kaiser-Set-_PAGE_NX-only-if-supported.patch patch 0041-kaiser-Set-_PAGE_NX-only-if-supported.patch -patch 0042-bpf-move-fixup_bpf_calls-function.patch -patch 0043-bpf-refactor-fixup_bpf_calls.patch -patch 0044-bpf-prevent-out-of-bounds-speculation.patch -patch 0045-bpf-array-fix-overflow-in-max_entries-and-undefined-.patch -patch 0046-x86-Documentation-Add-PTI-description.patch -patch 0047-x86-cpu-Factor-out-application-of-forced-CPU-caps.patch -patch 0048-x86-cpufeatures-Make-CPU-bugs-sticky.patch -patch 0049-x86-cpufeatures-Add-X86_BUG_CPU_INSECURE.patch -patch 0050-x86-pti-Rename-BUG_CPU_INSECURE-to-BUG_CPU_MELTDOWN.patch -patch 0051-x86-cpufeatures-Add-X86_BUG_SPECTRE_V-12.patch -patch 0052-x86-cpu-Merge-bugs.c-and-bugs_64.c.patch -patch 0053-sysfs-cpu-Add-vulnerability-folder.patch -patch 0054-x86-cpu-Implement-CPU-vulnerabilites-sysfs-functions.patch -patch 0055-x86-cpu-AMD-Make-LFENCE-a-serializing-instruction.patch -patch 0056-x86-cpu-AMD-Use-LFENCE_RDTSC-in-preference-to-MFENCE.patch -patch 0057-sysfs-cpu-Fix-typos-in-vulnerability-documentation.patch -patch 0058-x86-alternatives-Fix-optimize_nops-checking.patch -patch 0059-x86-alternatives-Add-missing-n-at-end-of-ALTERNATIVE.patch -patch 0060-x86-mm-32-Move-setup_clear_cpu_cap-X86_FEATURE_PCID-.patch -patch 0061-objtool-modules-Discard-objtool-annotation-sections-.patch -patch 0062-objtool-Detect-jumps-to-retpoline-thunks.patch -patch 0063-objtool-Allow-alternatives-to-be-ignored.patch -patch 0064-x86-asm-Use-register-variable-to-get-stack-pointer-v.patch -patch 0065-x86-retpoline-Add-initial-retpoline-support.patch -patch 0066-x86-spectre-Add-boot-time-option-to-select-Spectre-v.patch -patch 0067-x86-retpoline-crypto-Convert-crypto-assembler-indire.patch -patch 0068-x86-retpoline-entry-Convert-entry-assembler-indirect.patch -patch 0069-x86-retpoline-ftrace-Convert-ftrace-assembler-indire.patch -patch 0070-x86-retpoline-hyperv-Convert-assembler-indirect-jump.patch -patch 0071-x86-retpoline-xen-Convert-Xen-hypercall-indirect-jum.patch -patch 0072-x86-retpoline-checksum32-Convert-assembler-indirect-.patch -patch 0073-x86-retpoline-irq32-Convert-assembler-indirect-jumps.patch -patch 0074-x86-retpoline-Fill-return-stack-buffer-on-vmexit.patch -patch 0075-x86-retpoline-Remove-compile-time-warning.patch -patch 0076-objtool-Fix-retpoline-support-for-pre-ORC-objtool.patch -patch 0077-x86-pti-efi-broken-conversion-from-efi-to-kernel-pag.patch -patch 0078-x86-retpoline-Fill-RSB-on-context-switch-for-affecte.patch -patch 0079-x86-retpoline-Add-LFENCE-to-the-retpoline-RSB-fillin.patch -patch 0080-objtool-Improve-error-message-for-bad-file-argument.patch -patch 0081-x86-cpufeature-Move-processor-tracing-out-of-scatter.patch -patch 0082-module-Add-retpoline-tag-to-VERMAGIC.patch -patch 0083-x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch -patch 0084-x86-mce-Make-machine-check-speculation-protected.patch -patch 0085-retpoline-Introduce-start-end-markers-of-indirect-th.patch -patch 0086-kprobes-x86-Blacklist-indirect-thunk-functions-for-k.patch -patch 0087-kprobes-x86-Disable-optimizing-on-the-function-jumps.patch -patch 0088-x86-pti-Document-fix-wrong-index.patch -patch 0089-x86-retpoline-Optimize-inline-assembler-for-vmexit_f.patch -patch 0090-Revert-module-Add-retpoline-tag-to-VERMAGIC.patch -patch 0091-Map-the-vsyscall-page-with-_PAGE_USER.patch -patch 0092-vsyscall-Fix-permissions-for-emulate-mode-with-KAISE.patch -patch 0093-bpf-fix-mixed-signed-unsigned-derived-min-max-value-.patch -patch 0094-bpf-prevent-leaking-pointer-via-xadd-on-unpriviledge.patch -patch 0095-x86-bpf_jit-small-optimization-in-emit_bpf_tail_call.patch -patch 0096-bpf-fix-bpf_tail_call-x64-JIT.patch -patch 0097-bpf-introduce-BPF_JIT_ALWAYS_ON-config.patch -patch 0098-bpf-arsh-is-not-supported-in-32-bit-alu-thus-reject-.patch -patch 0099-bpf-avoid-false-sharing-of-map-refcount-with-max_ent.patch -patch 0100-bpf-fix-divides-by-zero.patch -patch 0101-bpf-fix-32-bit-divide-by-zero.patch -patch 0102-bpf-reject-stores-into-ctx-via-st-and-xadd.patch +patch 0042-bpf-adjust-insn_aux_data-when-patching-insns.patch +patch 0043-bpf-move-fixup_bpf_calls-function.patch +patch 0044-bpf-refactor-fixup_bpf_calls.patch +patch 0045-bpf-prevent-out-of-bounds-speculation.patch +patch 0046-bpf-array-fix-overflow-in-max_entries-and-undefined-.patch +patch 0047-x86-Documentation-Add-PTI-description.patch +patch 0048-x86-cpu-Factor-out-application-of-forced-CPU-caps.patch +patch 0049-x86-cpufeatures-Make-CPU-bugs-sticky.patch +patch 0050-x86-cpufeatures-Add-X86_BUG_CPU_INSECURE.patch +patch 0051-x86-pti-Rename-BUG_CPU_INSECURE-to-BUG_CPU_MELTDOWN.patch +patch 0052-x86-cpufeatures-Add-X86_BUG_SPECTRE_V-12.patch +patch 0053-x86-cpu-Merge-bugs.c-and-bugs_64.c.patch +patch 0054-sysfs-cpu-Add-vulnerability-folder.patch +patch 0055-x86-cpu-Implement-CPU-vulnerabilites-sysfs-functions.patch +patch 0056-x86-cpu-AMD-Make-LFENCE-a-serializing-instruction.patch +patch 0057-x86-cpu-AMD-Use-LFENCE_RDTSC-in-preference-to-MFENCE.patch +patch 0058-sysfs-cpu-Fix-typos-in-vulnerability-documentation.patch +patch 0059-x86-alternatives-Fix-optimize_nops-checking.patch +patch 0060-x86-alternatives-Add-missing-n-at-end-of-ALTERNATIVE.patch +patch 0061-x86-mm-32-Move-setup_clear_cpu_cap-X86_FEATURE_PCID-.patch +patch 0062-objtool-modules-Discard-objtool-annotation-sections-.patch +patch 0063-objtool-Detect-jumps-to-retpoline-thunks.patch +patch 0064-objtool-Allow-alternatives-to-be-ignored.patch +patch 0065-x86-asm-Use-register-variable-to-get-stack-pointer-v.patch +patch 0066-x86-retpoline-Add-initial-retpoline-support.patch +patch 0067-x86-spectre-Add-boot-time-option-to-select-Spectre-v.patch +patch 0068-x86-retpoline-crypto-Convert-crypto-assembler-indire.patch +patch 0069-x86-retpoline-entry-Convert-entry-assembler-indirect.patch +patch 0070-x86-retpoline-ftrace-Convert-ftrace-assembler-indire.patch +patch 0071-x86-retpoline-hyperv-Convert-assembler-indirect-jump.patch +patch 0072-x86-retpoline-xen-Convert-Xen-hypercall-indirect-jum.patch +patch 0073-x86-retpoline-checksum32-Convert-assembler-indirect-.patch +patch 0074-x86-retpoline-irq32-Convert-assembler-indirect-jumps.patch +patch 0075-x86-retpoline-Fill-return-stack-buffer-on-vmexit.patch +patch 0076-x86-retpoline-Remove-compile-time-warning.patch +patch 0077-objtool-Fix-retpoline-support-for-pre-ORC-objtool.patch +patch 0078-x86-pti-efi-broken-conversion-from-efi-to-kernel-pag.patch +patch 0079-x86-retpoline-Fill-RSB-on-context-switch-for-affecte.patch +patch 0080-x86-retpoline-Add-LFENCE-to-the-retpoline-RSB-fillin.patch +patch 0081-objtool-Improve-error-message-for-bad-file-argument.patch +patch 0082-x86-cpufeature-Move-processor-tracing-out-of-scatter.patch +patch 0083-module-Add-retpoline-tag-to-VERMAGIC.patch +patch 0084-x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch +patch 0085-x86-mce-Make-machine-check-speculation-protected.patch +patch 0086-retpoline-Introduce-start-end-markers-of-indirect-th.patch +patch 0087-kprobes-x86-Blacklist-indirect-thunk-functions-for-k.patch +patch 0088-kprobes-x86-Disable-optimizing-on-the-function-jumps.patch +patch 0089-x86-pti-Document-fix-wrong-index.patch +patch 0090-x86-retpoline-Optimize-inline-assembler-for-vmexit_f.patch +patch 0091-Revert-module-Add-retpoline-tag-to-VERMAGIC.patch +patch 0092-Map-the-vsyscall-page-with-_PAGE_USER.patch +patch 0093-vsyscall-Fix-permissions-for-emulate-mode-with-KAISE.patch +patch 0094-bpf-fix-mixed-signed-unsigned-derived-min-max-value-.patch +patch 0095-bpf-prevent-leaking-pointer-via-xadd-on-unpriviledge.patch +patch 0096-x86-bpf_jit-small-optimization-in-emit_bpf_tail_call.patch +patch 0097-bpf-fix-bpf_tail_call-x64-JIT.patch +patch 0098-bpf-introduce-BPF_JIT_ALWAYS_ON-config.patch +patch 0099-bpf-arsh-is-not-supported-in-32-bit-alu-thus-reject-.patch +patch 0100-bpf-avoid-false-sharing-of-map-refcount-with-max_ent.patch +patch 0101-bpf-fix-divides-by-zero.patch +patch 0102-bpf-fix-32-bit-divide-by-zero.patch +patch 0103-bpf-reject-stores-into-ctx-via-st-and-xadd.patch patch 0001-kaiser-fix-intel_bts-perf-crashes.patch patch 0002-x86-pti-Make-unpoison-of-pgd-for-trusted-boot-work-f.patch patch 0003-kaiser-allocate-pgd-with-order-0-when-pti-off.patch |