[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190514180522.GA13164@kroah.com>
Date: Tue, 14 May 2019 20:05:22 +0200
From: Greg KH <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc: lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 4.19.43
I'm announcing the release of the 4.19.43 kernel.
All users of the 4.19 kernel series must upgrade.
The updated 4.19.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.19.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Documentation/ABI/testing/sysfs-devices-system-cpu | 4
Documentation/admin-guide/hw-vuln/index.rst | 13
Documentation/admin-guide/hw-vuln/l1tf.rst | 615 ++++++++++++++++++
Documentation/admin-guide/hw-vuln/mds.rst | 308 +++++++++
Documentation/admin-guide/index.rst | 6
Documentation/admin-guide/kernel-parameters.txt | 62 +
Documentation/admin-guide/l1tf.rst | 614 -----------------
Documentation/index.rst | 1
Documentation/x86/conf.py | 10
Documentation/x86/index.rst | 8
Documentation/x86/mds.rst | 225 ++++++
Makefile | 2
arch/powerpc/kernel/security.c | 6
arch/powerpc/kernel/setup_64.c | 2
arch/s390/kernel/nospec-branch.c | 3
arch/x86/entry/common.c | 3
arch/x86/events/intel/core.c | 20
arch/x86/events/intel/cstate.c | 8
arch/x86/events/intel/rapl.c | 4
arch/x86/events/msr.c | 8
arch/x86/include/asm/cpufeatures.h | 3
arch/x86/include/asm/intel-family.h | 33
arch/x86/include/asm/irqflags.h | 4
arch/x86/include/asm/msr-index.h | 39 -
arch/x86/include/asm/mwait.h | 7
arch/x86/include/asm/nospec-branch.h | 50 +
arch/x86/include/asm/processor.h | 6
arch/x86/kernel/cpu/bugs.c | 146 ++++
arch/x86/kernel/cpu/common.c | 116 +--
arch/x86/kernel/cpu/intel_rdt_pseudo_lock.c | 4
arch/x86/kernel/nmi.c | 4
arch/x86/kernel/traps.c | 8
arch/x86/kernel/tsc.c | 2
arch/x86/kernel/tsc_msr.c | 10
arch/x86/kvm/cpuid.c | 5
arch/x86/kvm/vmx.c | 7
arch/x86/mm/pti.c | 4
arch/x86/platform/atom/punit_atom_debug.c | 4
arch/x86/platform/intel-mid/device_libs/platform_bt.c | 2
drivers/acpi/acpi_lpss.c | 2
drivers/acpi/x86/utils.c | 2
drivers/base/cpu.c | 8
drivers/cpufreq/intel_pstate.c | 4
drivers/edac/pnd2_edac.c | 2
drivers/idle/intel_idle.c | 18
drivers/mmc/host/sdhci-acpi.c | 2
drivers/pci/pci-mid.c | 4
drivers/platform/x86/intel_int0002_vgpio.c | 2
drivers/platform/x86/intel_mid_powerbtn.c | 4
drivers/platform/x86/intel_telemetry_debugfs.c | 2
drivers/platform/x86/intel_telemetry_pltdrv.c | 2
drivers/powercap/intel_rapl.c | 10
drivers/thermal/intel_soc_dts_thermal.c | 2
include/linux/cpu.h | 26
kernel/cpu.c | 15
sound/soc/intel/boards/bytcr_rt5651.c | 2
tools/power/x86/turbostat/Makefile | 2
tools/power/x86/turbostat/turbostat.c | 46 -
tools/power/x86/x86_energy_perf_policy/Makefile | 2
59 files changed, 1730 insertions(+), 803 deletions(-)
Andi Kleen (2):
x86/speculation/mds: Add basic bug infrastructure for MDS
x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
Boris Ostrovsky (1):
x86/speculation/mds: Fix comment
Eduardo Habkost (1):
kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
Greg Kroah-Hartman (1):
Linux 4.19.43
Josh Poimboeuf (9):
x86/speculation/mds: Add mds=full,nosmt cmdline option
x86/speculation: Move arch_smt_update() call to after mitigation decisions
x86/speculation/mds: Add SMT warning message
cpu/speculation: Add 'mitigations=' cmdline option
x86/speculation: Support 'mitigations=' cmdline option
powerpc/speculation: Support 'mitigations=' cmdline option
s390/speculation: Support 'mitigations=' cmdline option
x86/speculation/mds: Add 'mitigations=' support for MDS
x86/speculation/mds: Fix documentation typo
Konrad Rzeszutek Wilk (1):
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
Peter Zijlstra (1):
x86/cpu: Sanitize FAM6_ATOM naming
Salvatore Bonaccorso (1):
Documentation/l1tf: Fix small spelling typo
Thomas Gleixner (12):
x86/msr-index: Cleanup bit defines
x86/speculation: Consolidate CPU whitelists
x86/speculation/mds: Add BUG_MSBDS_ONLY
x86/speculation/mds: Add mds_clear_cpu_buffers()
x86/speculation/mds: Clear CPU buffers on exit to user
x86/kvm/vmx: Add MDS protection when L1D Flush is not active
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
x86/speculation/mds: Add mitigation control for MDS
x86/speculation/mds: Add sysfs reporting for MDS
x86/speculation/mds: Add mitigation mode VMWERV
Documentation: Move L1TF to separate directory
Documentation: Add MDS vulnerability documentation
Tyler Hicks (1):
Documentation: Correct the possible MDS sysfs values
speck for Pawan Gupta (1):
x86/mds: Add MDSUM variant to the MDS documentation
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists